University of Aberdeen logo

AURA - Aberdeen University Research Archive

 

Automated Game-Theoretic Verification of Security Systems

dc.contributor.authorMu, Chunyan
dc.contributor.editorParker, David
dc.contributor.editorWolf, Verena
dc.contributor.institutionUniversity of Aberdeen.Computing Scienceen
dc.contributor.institutionUniversity of Aberdeen.Cybersecurity and Privacyen
dc.date.accessioned2023-01-13T13:03:01Z
dc.date.available2023-01-13T13:03:01Z
dc.date.issued2019-10-18
dc.format.extent18
dc.format.extent279288
dc.identifier225684574
dc.identifier859e2278-f1b8-4a92-8deb-61e08c1b0f16
dc.identifier85072870464
dc.identifier.citationMu, C 2019, Automated Game-Theoretic Verification of Security Systems. in D Parker & V Wolf (eds), 16th International Conference on Quantitative Evaluation of Systems (QEST). vol. 11785, Lecture Notes in Computer Science, vol. 11785, Springer , pp. 239-256. https://doi.org/10.1007/978-3-030-30281-8_14en
dc.identifier.doi10.1007/978-3-030-30281-8_14
dc.identifier.otherBibtex: DBLP:conf/qest/Mu19
dc.identifier.otherORCID: /0000-0002-2988-6939/work/126803936
dc.identifier.urihttps://hdl.handle.net/2164/19837
dc.language.isoeng
dc.publisherSpringer
dc.relation.ispartof16th International Conference on Quantitative Evaluation of Systems (QEST)en
dc.relation.ispartofseriesLecture Notes in Computer Scienceen
dc.titleAutomated Game-Theoretic Verification of Security Systemsen
dc.typeConference itemen

Files

Original bundle

Now showing 1 - 1 of 1
Thumbnail Image
Name:
main_nash.pdf
Size:
272.74 KB
Format:
Adobe Portable Document Format

Collections