Security protection design for deception and real system regimes: a model and analysis
From MaRDI portal
Publication:1037682
DOI10.1016/J.EJOR.2009.03.022zbMath1179.90193OpenAlexW2092321730MaRDI QIDQ1037682
Publication date: 16 November 2009
Published in: European Journal of Operational Research (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ejor.2009.03.022
Cites Work
- Location of terror response facilities: a game between state and terrorist
- A decisional framework system for computer network intrusion detection
- Efficient scheduling of periodic information monitoring requests
- Market Segmentation, Cannibalization, and the Timing of Product Introductions
- Optimal resource allocation with minimum activation levels and fixed costs
This page was built for publication: Security protection design for deception and real system regimes: a model and analysis