Login / Signup

Exploiting Adversary's Risk Profiles in Imperfect Information Security Games.

Gabriel Fortunato StoccoGeorge Cybenko
Published in: GameSec (2011)
Keyphrases