Login / Signup
Duplicity Games for Deception Design With an Application to Insider Threat Mitigation.
Linan Huang
Quanyan Zhu
Published in:
IEEE Trans. Inf. Forensics Secur. (2021)
Keyphrases
</>
design process
insider threat
databases
computational intelligence