Last update: Sun Mar 31 02:50:04 MDT 2019
Top |
Symbols |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Pham:2012:WCM,
author = "Viet Pham and Carlos Cid",
title = "Are We Compromised? {Modelling} Security Assessment
Games",
journal = j-LECT-NOTES-COMP-SCI,
volume = "7638",
pages = "234--247",
year = "2012",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-34266-0_14",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Wed Dec 19 15:26:22 MST 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2012k.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-34266-0_14/",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-34266-0",
book-URL = "http://www.springerlink.com/content/978-3-642-34266-0",
fjournal = "Lecture Notes in Computer Science",
}
Related entries
- Assessment,
7612(0)25,
7612(0)210,
7612(0)235,
7613(0)79,
7632(0)129,
7638(0)186
- Game,
7624(0)1,
7624(0)101,
7624(0)117,
7624(0)262,
7634(0)126,
7638(0)60,
7638(0)78,
7638(0)118,
7638(0)138,
7638(0)152,
7638(0)201,
7638(0)281,
7638(0)308
- Modelling,
7600(0)76,
7613(0)190,
7616(0)1,
7620(0)1,
7620(0)172,
7622(0)41,
7622(0)55,
7623(0)112,
7637(0)31,
7639(0)116
- Security,
7612(0)25,
7612(0)137,
7612(0)246,
7613(0)209,
7613(0)234,
7617(0)17,
7617(0)47,
7617(0)61,
7617(0)73,
7617(0)89,
7618(0)202,
7618(0)239,
7622(0)41,
7622(0)55,
7622(0)161,
7622(0)172,
7622(0)188,
7631(0)216,
7631(0)260,
7638(0)186,
7638(0)248,
7638(0)264,
7638(0)281,
7638(0)308,
7645(0)72,
7645(0)100,
7645(0)263,
7645(0)276