Login / Signup

Duplicity Games for Deception Design With an Application to Insider Threat Mitigation.

Linan HuangQuanyan Zhu
Published in: IEEE Trans. Inf. Forensics Secur. (2021)
Keyphrases
  • design process
  • insider threat
  • databases
  • computational intelligence