game theory approach, behavioral decision-making, security analysis, attack graphs
Location
A hard-copy of this is in the Papers Cabinet
BibTex-formatted data
To refer to this entry, you may select and copy the text below and paste it into your BibTex document. Note that the text may not contain all macros that BibTex supports.