Crossref Citations
This Book has been
cited by the following publications. This list is generated based on data provided by Crossref.
Hao, Dong
Ren, Yizhi
and
Sakurai, Kouichi
2011.
Trusted Systems.
Vol. 6802,
Issue. ,
p.
237.
Kantarcioglu, Murat
Bensoussan, Alain
and
Hoe, Sing Ru
2011.
Impact of security risks on cloud computing adoption.
p.
670.
Rass, Stefan
2011.
Towards a Rapid-Alert System for Security Incidents.
p.
122.
Alpcan, Tansu
Levi, Albert
and
Savaş, Erkay
2011.
Decision and Game Theory for Security.
Vol. 7037,
Issue. ,
p.
182.
Maillé, Patrick
Reichl, Peter
and
Tuffin, Bruno
2011.
Decision and Game Theory for Security.
Vol. 7037,
Issue. ,
p.
67.
An, Bo
and
Tambe, Milind
2012.
Multi-Agent Systems.
Vol. 7541,
Issue. ,
p.
17.
Hao, Dong
Adhikari, Avishek
and
Sakurai, Kouichi
2012.
Trusted Systems.
Vol. 7222,
Issue. ,
p.
239.
Hao, Dong
and
Sakurai, Kouichi
2012.
A Differential Game Approach to Mitigating Primary User Emulation Attacks in Cognitive Radio Networks.
p.
495.
2012.
Distributed Strategic Learning for Wireless Engineers.
p.
443.
Jain, Manish
An, Bo
and
Tambe, Milind
2012.
An Overview of Recent Application Trends at the AAMAS Conference: Security, Sustainability, and Safety.
AI Magazine,
Vol. 33,
Issue. 3,
p.
14.
Law, Yee Wei
Alpcan, Tansu
Palaniswami, Marimuthu
and
Dey, Subhrakanti
2012.
Decision and Game Theory for Security.
Vol. 7638,
Issue. ,
p.
281.
Ratliff, Lillian J.
Coogan, Samuel
Calderone, Daniel
and
Sastry, S. Shankar
2012.
Pricing in linear-quadratic dynamic games.
p.
1798.
Naichao, Wang
Yitao, Xu
Zhang, Deng
and
Lin, Zhang
2012.
A game approach to combat primary user emulation attacks in multi-channel cognitive radio systems.
p.
1639.
Chorppath, Anil Kumar
and
Alpcan, Tansu
2012.
Risk Management for IT Security: When Theory Meets Practice.
p.
1.
Tambe, Milind
Jain, Manish
Pita, James Adam
and
Jiang, Albert Xin
2012.
Game theory for security: Key algorithmic principles, deployed systems, lessons learned.
p.
1822.
Bao, Ning
Kreidl, O. Patrick
and
Musacchio, John
2012.
Game Theory for Networks.
Vol. 75,
Issue. ,
p.
265.
Rass, S.
Rainer, B.
Vavti, M.
and
Schauer, S.
2013.
A Network Modeling and Analysis Tool for Perfectly Secure Communication.
p.
267.
Jain, Manish
An, Bo
and
Tambe, Milind
2013.
Moving Target Defense II.
Vol. 100,
Issue. ,
p.
15.
Ma, Chris Y. T.
Yau, David K. Y.
Lou, Xin
and
Rao, Nageswara S. V.
2013.
Markov Game Analysis for Attack-Defense of Power Networks Under Possible Misinformation.
IEEE Transactions on Power Systems,
Vol. 28,
Issue. 2,
p.
1676.
Zhu, Quanyan
Bushnell, Linda
and
Başar, Tamer
2013.
Control of Cyber-Physical Systems.
Vol. 449,
Issue. ,
p.
301.