Login / Signup
Harnessing the Power of Deception in Attack Graph-Based Security Games.
Stephanie Milani
Weiran Shen
Kevin S. Chan
Sridhar Venkatesan
Nandi O. Leslie
Charles A. Kamhoua
Fei Fang
Published in:
GameSec (2020)
Keyphrases
</>
power consumption
incomplete information
qualitative and quantitative
neural network
similarity measure
collective intelligence
countermeasures
databases
real world
artificial intelligence
active learning
secret key
malicious attacks