Automated Game-Theoretic Verification of Security Systems
| dc.contributor.author | Mu, Chunyan | |
| dc.contributor.editor | Parker, David | |
| dc.contributor.editor | Wolf, Verena | |
| dc.contributor.institution | University of Aberdeen.Computing Science | en |
| dc.contributor.institution | University of Aberdeen.Cybersecurity and Privacy | en |
| dc.date.accessioned | 2023-01-13T13:03:01Z | |
| dc.date.available | 2023-01-13T13:03:01Z | |
| dc.date.issued | 2019-10-18 | |
| dc.format.extent | 18 | |
| dc.format.extent | 279288 | |
| dc.identifier | 225684574 | |
| dc.identifier | 859e2278-f1b8-4a92-8deb-61e08c1b0f16 | |
| dc.identifier | 85072870464 | |
| dc.identifier.citation | Mu, C 2019, Automated Game-Theoretic Verification of Security Systems. in D Parker & V Wolf (eds), 16th International Conference on Quantitative Evaluation of Systems (QEST). vol. 11785, Lecture Notes in Computer Science, vol. 11785, Springer , pp. 239-256. https://doi.org/10.1007/978-3-030-30281-8_14 | en |
| dc.identifier.doi | 10.1007/978-3-030-30281-8_14 | |
| dc.identifier.other | Bibtex: DBLP:conf/qest/Mu19 | |
| dc.identifier.other | ORCID: /0000-0002-2988-6939/work/126803936 | |
| dc.identifier.uri | https://hdl.handle.net/2164/19837 | |
| dc.language.iso | eng | |
| dc.publisher | Springer | |
| dc.relation.ispartof | 16th International Conference on Quantitative Evaluation of Systems (QEST) | en |
| dc.relation.ispartofseries | Lecture Notes in Computer Science | en |
| dc.title | Automated Game-Theoretic Verification of Security Systems | en |
| dc.type | Conference item | en |
Files
Original bundle
1 - 1 of 1
