A game theoretical model for optimal distribution of network security resources
From MaRDI portal
Publication:1675456
DOI10.1007/978-3-319-68711-7_13zbMath1453.91009OpenAlexW2762511493MaRDI QIDQ1675456
Ziad Ismail, Christophe Kiennert, Lin Chen, Jean Leneutre
Publication date: 27 October 2017
Full work available at URL: https://doi.org/10.1007/978-3-319-68711-7_13
optimizationintrusion detectionnoncooperative game theoryresource constrained network security games
Noncooperative games (91A10) Applications of game theory (91A80) Resource and cost allocation (including fair division, apportionment, etc.) (91B32)
This page was built for publication: A game theoretical model for optimal distribution of network security resources