Last update: Sun Mar 31 02:50:04 MDT 2019
Top |
Symbols |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Gueye:2012:GTF,
author = "Assane Gueye and Vladimir Marbukh",
title = "A Game-Theoretic Framework for Network Security
Vulnerability Assessment and Mitigation",
journal = j-LECT-NOTES-COMP-SCI,
volume = "7638",
pages = "186--200",
year = "2012",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-34266-0_11",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Wed Dec 19 15:26:22 MST 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2012k.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-34266-0_11/",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-34266-0",
book-URL = "http://www.springerlink.com/content/978-3-642-34266-0",
fjournal = "Lecture Notes in Computer Science",
}
Related entries
- Assessment,
7612(0)25,
7612(0)210,
7612(0)235,
7613(0)79,
7632(0)129,
7638(0)234
- framework,
7613(0)36,
7613(0)106,
7614(0)1,
7626(0)70,
7626(0)171,
7628(0)185,
7632(0)38,
7632(0)59,
7632(0)106,
7633(0)9,
7636(0)283,
7639(0)116
- Game-Theoretic,
7638(0)138
- Mitigation,
7612(0)37
- Network,
7603(0)72,
7608(0)111,
7611(0)91,
7611(0)106,
7611(0)136,
7611(0)151,
7611(0)166,
7611(0)223,
7611(0)238,
7611(0)253,
7612(0)49,
7620(0)172,
7625(0)26,
7632(0)1,
7633(0)59,
7634(0)73,
7634(0)151,
7637(0)149,
7638(0)152,
7638(0)171,
7638(0)201,
7638(0)264,
7639(0)106,
7645(0)1,
7645(0)44,
7645(0)180,
7645(0)192,
7645(0)276
- Security,
7612(0)25,
7612(0)137,
7612(0)246,
7613(0)209,
7613(0)234,
7617(0)17,
7617(0)47,
7617(0)61,
7617(0)73,
7617(0)89,
7618(0)202,
7618(0)239,
7622(0)41,
7622(0)55,
7622(0)161,
7622(0)172,
7622(0)188,
7631(0)216,
7631(0)260,
7638(0)234,
7638(0)248,
7638(0)264,
7638(0)281,
7638(0)308,
7645(0)72,
7645(0)100,
7645(0)263,
7645(0)276
- Theoretic, Game-,
7638(0)138
- Vulnerability,
7617(0)31