Cited By
View all- Colvett CPetty MBland JMaxwell KRosenhoover MOgden CGamess E(2022)Impact of the computer system user when creating cyber defense strategiesProceedings of the 2022 ACM Southeast Conference10.1145/3476883.3520208(74-81)Online publication date: 18-Apr-2022
- Singh MBorkotokey SLahcen RMohapatra R(2022)A generic scheme for cyber security in resource constraint network using incomplete information gameEvolutionary Intelligence10.1007/s12065-021-00684-w16:3(819-832)Online publication date: 17-Jun-2022
- Liu JWeng FZhang RGuo Y(2018)Network Security Situation Assessment Approach Based on Attack-Defense Stochastic Game ModelCloud Computing and Security10.1007/978-3-030-00012-7_15(161-173)Online publication date: 13-Sep-2018