Login / Signup
An Iterative Security Game for Computing Robust and Adaptive Network Flows.
Supriyo Ghosh
Patrick Jaillet
Published in:
CoRR (2019)
Keyphrases
</>
network flow
computer games
game theory
access control
intrusion detection
video games
game playing
minimum cost
security mechanisms
special case
security issues
statistical databases
serious games
educational games
nash equilibrium
network security
information security
complex networks
cloud computing