Author:
Kundu Arkadeep,Ghosh Soumya K.
Publisher
Springer International Publishing
Reference13 articles.
1. Shapley, L.: Stochastic games. Proceedings of the National Academy of Sciences of the United States of America 39(10) (1953)
2. You, X., Shiyong, Z.: A kind of network security behavior model based on game theory. In: Proceedings of PDCAT, pp. 950–954. IEEE (2003)
3. Lye, K., Wing, J.: Game strategies in network security. International Journal of Information Security 4(1), 71–86 (2005)
4. Nguyen, K., Alpcan, T., Basar, T.: Security games with incomplete information. In: Proc. of ICC 2009, pp. 1–6. IEEE (2009)
5. Bloem, M., Alpcan, T., Basar, T.: Intrusion Response as a Resource Allocation Problem. In: Proc. of the 45th CDC, pp. 6283–6288. IEEE (2006)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献