|
Volumn , Issue , 2014, Pages 813-817
|
Stealthy attacks and observable defenses: A game theoretic model under strict resource constraints
a a a |
Author keywords
Security games; Stealthy attacks
|
Indexed keywords
FLOW MEASUREMENT;
INFORMATION SCIENCE;
MOBILE SECURITY;
CYBER SECURITY;
DEFENSE STRATEGY;
FEEDBACK STRUCTURE;
GAME-THEORETIC MODEL;
NASH EQUILIBRIA;
RESOURCE CONSTRAINT;
SECURITY GAMES;
STEALTHY ATTACKS;
GAME THEORY;
|
EID: 84949926542
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/GlobalSIP.2014.7032232 Document Type: Conference Paper |
Times cited : (26)
|
References (14)
|