Exploiting Adversary's Risk Profiles in Imperfect Information Security Games

Gabriel Fortunato Stocco, George Cybenko. Exploiting Adversary's Risk Profiles in Imperfect Information Security Games. In John S. Baras, Jonathan Katz, Eitan Altman, editors, Decision and Game Theory for Security - Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011. Proceedings. Volume 7037 of Lecture Notes in Computer Science, pages 22-33, Springer, 2011. [doi]

@inproceedings{StoccoC11,
  title = {Exploiting Adversary's Risk Profiles in Imperfect Information Security Games},
  author = {Gabriel Fortunato Stocco and George Cybenko},
  year = {2011},
  doi = {10.1007/978-3-642-25280-8_4},
  url = {http://dx.doi.org/10.1007/978-3-642-25280-8_4},
  researchr = {https://researchr.org/publication/StoccoC11},
  cites = {0},
  citedby = {0},
  pages = {22-33},
  booktitle = {Decision and Game Theory for Security - Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011. Proceedings},
  editor = {John S. Baras and Jonathan Katz and Eitan Altman},
  volume = {7037},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  isbn = {978-3-642-25279-2},
}