Login / Signup
Security Game with Non-additive Utilities and Multiple Attacker Resources.
Sinong Wang
Ness B. Shroff
Published in:
CoRR (2017)
Keyphrases
</>
resource allocation
computer games
digital libraries
access control
intrusion detection
game theory
network security
limited resources
learning environment
video games
resource management
statistical databases
computing resources
nash equilibria