Funder
Singapore-MIT Alliance for Research and Technology Centre
National Science Foundation
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computational Mathematics,Computational Theory and Mathematics,Computer Graphics and Computer-Aided Design,Computer Science Applications,Statistics and Probability,Economics and Econometrics
Reference49 articles.
1. Acemoglu D, Malekian A, Ozdaglar A (2016) Network security and contagion. J Econ Theory 166:536–585
2. Alderson DL, Brown GG, Carlyle WM, Wood RK (2011) Solving defender-attacker-defender models for infrastructure defense. Technical report, Naval Postgraduate School, Monterey, CA, Department of Operations Research
3. Alderson DL, Brown GG, Carlyle WM, Wood RK (2017) Assessing and improving the operational resilience of a large highway infrastructure system to worst-case losses. Transp Sci 52(4):739–1034
4. Alpcan T, Basar T (2003) A game theoretic approach to decision and analysis in network intrusion detection. In: Proceedings of the 42nd IEEE conference on decision and control, 2003, IEEE. 3:2595–2600
5. Alpcan T, Başar T (2010) Network security: a decision and game-theoretic approach. Cambridge University Press, Cambridge
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献