Harnessing the power of deception in attack graph-based security games

From MaRDI portal







Cited in
(21)






This page was built for publication: Harnessing the power of deception in attack graph-based security games

Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2056942)