Found: 12
Select item for more details and to access through your institution.
Defending Against Advanced Persistent Threats Using Game-Theory.
- Published in:
- PLoS ONE, 2017, v. 12, n. 1, p. 1, doi. 10.1371/journal.pone.0168675
- By:
- Publication type:
- Article
Decisions with Uncertain Consequences—A Total Ordering on Loss-Distributions.
- Published in:
- PLoS ONE, 2016, v. 11, n. 12, p. 1, doi. 10.1371/journal.pone.0168583
- By:
- Publication type:
- Article
Refining Stochastic Models of Critical Infrastructures by Observation.
- Published in:
- Reliability: Theory & Applications, 2019, v. 14, n. 3, p. 69
- By:
- Publication type:
- Article
Password Security as a Game of Entropies.
- Published in:
- Entropy, 2018, v. 20, n. 5, p. 312, doi. 10.3390/e20050312
- By:
- Publication type:
- Article
On Game-Theoretic Network Security Provisioning.
- Published in:
- Journal of Network & Systems Management, 2013, v. 21, n. 1, p. 47, doi. 10.1007/s10922-012-9229-1
- By:
- Publication type:
- Article
Building a Quantum Network: How to Optimize Security and Expenses.
- Published in:
- Journal of Network & Systems Management, 2010, v. 18, n. 3, p. 283, doi. 10.1007/s10922-010-9162-0
- By:
- Publication type:
- Article
Secure Communication over Software-Defined Networks.
- Published in:
- Mobile Networks & Applications, 2015, v. 20, n. 1, p. 105, doi. 10.1007/s11036-015-0582-7
- By:
- Publication type:
- Article
Games over Probability Distributions Revisited: New Equilibrium Models and Refinements.
- Published in:
- Games (20734336), 2022, v. 13, n. 6, p. 80, doi. 10.3390/g13060080
- By:
- Publication type:
- Article
Security from the Adversary's Inertia–Controlling Convergence Speed When Playing Mixed Strategy Equilibria.
- Published in:
- Games (20734336), 2018, v. 9, n. 3, p. 59, doi. 10.3390/g9030059
- By:
- Publication type:
- Article
Risk Assessment Uncertainties in Cybersecurity Investments.
- Published in:
- Games (20734336), 2018, v. 9, n. 2, p. 34, doi. 10.3390/g9020034
- By:
- Publication type:
- Article
Game-Theoretic Decision Support for Cyber Forensic Investigations.
- Published in:
- Sensors (14248220), 2021, v. 21, n. 16, p. 5300, doi. 10.3390/s21165300
- By:
- Publication type:
- Article
Private function evaluation by local two-party computation.
- Published in:
- EURASIP Journal on Information Security, 2015, v. 2015, p. 1, doi. 10.1186/s13635-015-0025-9
- By:
- Publication type:
- Article