Login / Signup

Mitigating Covert Compromises - A Game-Theoretic Model of Targeted and Non-Targeted Covert Attacks.

Aron LaszkaBenjamin JohnsonJens Grossklags
Published in: WINE (2013)
Keyphrases
  • game theoretic
  • information flow
  • probabilistic model
  • np hard
  • game theory
  • lower bound
  • anomaly detection
  • resource allocation
  • simulation model