Game Theory Based Optimization of Security Configuration

Jin Shi, Yin Lu, Li Xie. Game Theory Based Optimization of Security Configuration. In Computational Intelligence and Security, International Conference, CIS 2007, Harbin, Heilongjiang, China, December 15-19, 2007. pages 799-803, IEEE Computer Society, 2007. [doi]

@inproceedings{ShiLX07,
  title = {Game Theory Based Optimization of Security Configuration},
  author = {Jin Shi and Yin Lu and Li Xie},
  year = {2007},
  doi = {10.1109/CIS.2007.25},
  url = {http://doi.ieeecomputersociety.org/10.1109/CIS.2007.25},
  tags = {optimization, rule-based, security},
  researchr = {https://researchr.org/publication/ShiLX07},
  cites = {0},
  citedby = {0},
  pages = {799-803},
  booktitle = {Computational Intelligence and Security, International Conference, CIS 2007, Harbin, Heilongjiang, China, December 15-19, 2007},
  publisher = {IEEE Computer Society},
  isbn = {0-7695-3072-9},
}