z-logo
open-access-imgOpen Access
Attack detection and strategy optimization in game-theoretic trust models
Author(s) -
Meghan Galiardi,
Eric D. Vugrin,
Alexander V. Outkin,
Gregory Dane Wyss,
Brandon Eames
Publication year - 2019
Publication title -
osti oai (u.s. department of energy office of scientific and technical information)
Language(s) - English
Resource type - Reports
DOI - 10.2172/1569343
Subject(s) - computer science , set (abstract data type) , constraint (computer aided design) , process (computing) , representation (politics) , game theory , limiting , computer security , monte carlo method , attack model , mathematical economics , mathematics , engineering , mechanical engineering , statistics , geometry , political science , law , programming language , operating system , politics

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom