Crossref Citations
This Book has been
cited by the following publications. This list is generated based on data provided by Crossref.
Maillé, Patrick
Reichl, Peter
and
Tuffin, Bruno
2011.
Decision and Game Theory for Security.
Vol. 7037,
Issue. ,
p.
67.
Hao, Dong
Ren, Yizhi
and
Sakurai, Kouichi
2011.
Trusted Systems.
Vol. 6802,
Issue. ,
p.
237.
Kantarcioglu, Murat
Bensoussan, Alain
and
Hoe, Sing Ru
2011.
Impact of security risks on cloud computing adoption.
p.
670.
Alpcan, Tansu
Levi, Albert
and
Savaş, Erkay
2011.
Decision and Game Theory for Security.
Vol. 7037,
Issue. ,
p.
182.
Rass, Stefan
2011.
Towards a Rapid-Alert System for Security Incidents.
p.
122.
Chorppath, Anil Kumar
and
Alpcan, Tansu
2012.
Risk Management for IT Security: When Theory Meets Practice.
p.
1.
Tambe, Milind
Jain, Manish
Pita, James Adam
and
Jiang, Albert Xin
2012.
Game theory for security: Key algorithmic principles, deployed systems, lessons learned.
p.
1822.
An, Bo
and
Tambe, Milind
2012.
Multi-Agent Systems.
Vol. 7541,
Issue. ,
p.
17.
Bao, Ning
Kreidl, O. Patrick
and
Musacchio, John
2012.
Game Theory for Networks.
Vol. 75,
Issue. ,
p.
265.
Hao, Dong
and
Sakurai, Kouichi
2012.
A Differential Game Approach to Mitigating Primary User Emulation Attacks in Cognitive Radio Networks.
p.
495.
2012.
Distributed Strategic Learning for Wireless Engineers.
p.
443.
Ratliff, Lillian J.
Coogan, Samuel
Calderone, Daniel
and
Sastry, S. Shankar
2012.
Pricing in linear-quadratic dynamic games.
p.
1798.
Law, Yee Wei
Alpcan, Tansu
Palaniswami, Marimuthu
and
Dey, Subhrakanti
2012.
Decision and Game Theory for Security.
Vol. 7638,
Issue. ,
p.
281.
Naichao, Wang
Yitao, Xu
Zhang, Deng
and
Lin, Zhang
2012.
A game approach to combat primary user emulation attacks in multi-channel cognitive radio systems.
p.
1639.
Jain, Manish
An, Bo
and
Tambe, Milind
2012.
An Overview of Recent Application Trends at the AAMAS Conference: Security, Sustainability, and Safety.
AI Magazine,
Vol. 33,
Issue. 3,
p.
14.
Hao, Dong
Adhikari, Avishek
and
Sakurai, Kouichi
2012.
Trusted Systems.
Vol. 7222,
Issue. ,
p.
239.
Han, Yi
Alpcan, Tansu
Chan, Jeffrey
and
Leckie, Christopher
2013.
Decision and Game Theory for Security.
Vol. 8252,
Issue. ,
p.
99.
Alpcan, Tansu
2013.
Encyclopedia of Systems and Control.
p.
1.
Meamari, E.
Afhamisisi, Kh.
and
Shahhoseini, Hadi Shahriar
2013.
An analysis on interactions among secondary user and unknown jammer in cognitive radio systems by fictitious play.
p.
1.
Hankin, Chris
and
Malacaria, Pasquale
2013.
Computation, Logic, Games, and Quantum Foundations. The Many Facets of Samson Abramsky.
Vol. 7860,
Issue. ,
p.
69.