File Download
There are no files associated with this item.
Supplementary
-
Citations:
- Appears in Collections:
Book Chapter: Cybersecurity with Attacker-Defender Models: Game-Theoretic Frameworks
| Title | Cybersecurity with Attacker-Defender Models: Game-Theoretic Frameworks |
|---|---|
| Authors | |
| Issue Date | 23-Nov-2024 |
| Publisher | Elsevier |
| Persistent Identifier | http://hdl.handle.net/10722/359292 |
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Cheung, Kam-Fung | - |
| dc.contributor.author | Yue, Man-Chung | - |
| dc.contributor.author | Bell, Michael | - |
| dc.contributor.author | Tseng, Chung-Li | - |
| dc.date.accessioned | 2025-08-27T00:30:31Z | - |
| dc.date.available | 2025-08-27T00:30:31Z | - |
| dc.date.issued | 2024-11-23 | - |
| dc.identifier.uri | http://hdl.handle.net/10722/359292 | - |
| dc.language | eng | - |
| dc.publisher | Elsevier | - |
| dc.relation.ispartof | Encyclopedia in Operations Management | - |
| dc.title | Cybersecurity with Attacker-Defender Models: Game-Theoretic Frameworks | - |
| dc.type | Book_Chapter | - |
| dc.identifier.doi | 10.1016/b978-0-443-28993-4.00081-0 | - |
