Computing Optimal Attack Strategies Using Unconstrained Influence Diagrams

Viliam Lisý, Radek Píbil. Computing Optimal Attack Strategies Using Unconstrained Influence Diagrams. In G. Alan Wang, Xiaolong Zheng, Michael Chau, Hsinchun Chen, editors, Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2013, Beijing, China, August 3, 2013. Proceedings. Volume 8039 of Lecture Notes in Computer Science, pages 38-46, Springer, 2013. [doi]

Abstract

Abstract is missing.