Jin Shi, Yin Lu, Li Xie. Game Theory Based Optimization of Security Configuration. In Computational Intelligence and Security, International Conference, CIS 2007, Harbin, Heilongjiang, China, December 15-19, 2007. pages 799-803, IEEE Computer Society, 2007. [doi]
@inproceedings{ShiLX07, title = {Game Theory Based Optimization of Security Configuration}, author = {Jin Shi and Yin Lu and Li Xie}, year = {2007}, doi = {10.1109/CIS.2007.25}, url = {http://doi.ieeecomputersociety.org/10.1109/CIS.2007.25}, tags = {optimization, rule-based, security}, researchr = {https://researchr.org/publication/ShiLX07}, cites = {0}, citedby = {0}, pages = {799-803}, booktitle = {Computational Intelligence and Security, International Conference, CIS 2007, Harbin, Heilongjiang, China, December 15-19, 2007}, publisher = {IEEE Computer Society}, isbn = {0-7695-3072-9}, }