Cyber-security in critical infrastructures. A game-theoretic approach
From MaRDI portal
Publication:778898
DOI10.1007/978-3-030-46908-5zbMath1448.68012OpenAlexW4234421770MaRDI QIDQ778898
Quanyan Zhu, Sandra König, Stefan Schauer, Stefan Rass
Publication date: 20 July 2020
Published in: Advanced Sciences and Technologies for Security Applications (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-030-46908-5
Introductory exposition (textbooks, tutorial papers, etc.) pertaining to computer science (68-01) Applications of game theory (91A80) Computer security (68M25)
Related Items (2)
Games over probability distributions revisited: new equilibrium models and refinements ⋮ Computing mixed strategies equilibria in presence of switching costs by the solution of nonconvex QP problems
This page was built for publication: Cyber-security in critical infrastructures. A game-theoretic approach