Login / Signup

A game theoretic approach based on intrusion tolerant systems.

Nouhad SanoussiGhizlane OrhanouSaid El Hajji
Published in: Int. J. Secur. Networks (2020)
Keyphrases
  • databases
  • computer systems
  • open source