File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Book Chapter: Cybersecurity with Attacker-Defender Models: Game-Theoretic Frameworks

TitleCybersecurity with Attacker-Defender Models: Game-Theoretic Frameworks
Authors
Issue Date23-Nov-2024
PublisherElsevier
Persistent Identifierhttp://hdl.handle.net/10722/359292

 

DC FieldValueLanguage
dc.contributor.authorCheung, Kam-Fung-
dc.contributor.authorYue, Man-Chung-
dc.contributor.authorBell, Michael-
dc.contributor.authorTseng, Chung-Li-
dc.date.accessioned2025-08-27T00:30:31Z-
dc.date.available2025-08-27T00:30:31Z-
dc.date.issued2024-11-23-
dc.identifier.urihttp://hdl.handle.net/10722/359292-
dc.languageeng-
dc.publisherElsevier-
dc.relation.ispartofEncyclopedia in Operations Management-
dc.titleCybersecurity with Attacker-Defender Models: Game-Theoretic Frameworks-
dc.typeBook_Chapter-
dc.identifier.doi10.1016/b978-0-443-28993-4.00081-0-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats