Author:
Veksler Vladislav D.,Buchler Norbou,Hoffman Blaine E.,Cassenti Daniel N.,Sample Char,Sugrim Shridat
Reference74 articles.
1. Human adversaries in opportunistic crime security games: evaluating competing bounded rationality models;Abbasi,2015
2. Cyber-security: role of deception in cyber-attack detection;Aggarwal,2016
3. Network Security
4. Memory for goals: an activation-based model;Altmann;Cogn. Sci.,2002
5. How Can the Human Mind Occur in the Physical Universe?
Cited by
28 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献