How to protect a city: strategic security placement in graph-based domains.
Jason TsaiZhengyu YinJun-young KwakDavid KempeChristopher KiekintveldMilind TambePublished in: AAMAS (2010)
Keyphrases
- data encryption
- security issues
- information security
- network security
- real world
- case study
- access control
- protection mechanisms
- intrusion detection
- decision making
- unauthorized access
- security level
- security requirements
- semi supervised
- security mechanisms
- graph theoretic
- data protection
- security threats
- information warfare
- key management
- computer security
- strategic planning
- security problems
- graph model
- e government