Login / Signup
Security Game with Non-additive Utilities and Multiple Attacker Resources.
Sinong Wang
Ness B. Shroff
Published in:
SIGMETRICS (Abstracts) (2017)
Keyphrases
</>
computer games
security policies
intrusion detection
resource allocation
game theory
virtual environment
video games
network security
nash equilibrium
game theoretic
limited resources
security measures
encryption scheme
security issues
computing resources
serious games
resource management
information security