Login / Signup
Security Game with Non-additive Utilities and Multiple Attacker Resources.
Sinong Wang
Ness B. Shroff
Published in:
Proc. ACM Meas. Anal. Comput. Syst. (2017)
Keyphrases
</>
game playing
resource management
security requirements
access control
computer games
supply chain
intrusion detection
resource allocation
game theory
information security
game theoretic
limited resources
security properties