"Game theoretic models for detecting network intrusions."

Hadi Otrok et al. (2008)

Details and statistics

DOI: 10.1016/J.COMCOM.2007.12.028

access: closed

type: Journal Article

metadata version: 2024-05-07

a service of  Schloss Dagstuhl - Leibniz Center for Informatics