Login / Signup

Asymptotic Behavior of Attack Graph Games.

George CybenkoGabriel Fortunato Stocco
Published in: From Database to Cyber Security (2018)
Keyphrases
  • attack graph
  • attack graphs
  • game theory
  • enterprise network
  • real time
  • computer games
  • video games
  • game play