Login / Signup
Manipulating Adversary's Belief: A Dynamic Game Approach to Deception by Design for Proactive Network Security.
Karel Horák
Quanyan Zhu
Branislav Bosanský
Published in:
GameSec (2017)
Keyphrases
</>
network security
computer networks
intrusion detection
traffic analysis
risk assessment
intrusion detection system
dos attacks
case study
model selection
maximum likelihood
data analysis
real time
anomaly detection
information security
data processing
wireless sensor networks
network administrators