|
Volumn 2005, Issue , 2005, Pages 102-105
|
Using stochastic game theory to compute the expected behavior of attackers
|
Author keywords
[No Author keywords available]
|
Indexed keywords
COMPUTER CRIME;
COMPUTER NETWORKS;
GAME THEORY;
RANDOM PROCESSES;
MATHEMATICAL TOOLS;
NASH EQUILIBRIUM;
STOCHASTIC GAME THEORY;
NETWORK SECURITY;
|
EID: 33947173819
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: None Document Type: Conference Paper |
Times cited : (49)
|
References (10)
|