Gabriel Fortunato Stocco, George Cybenko. Exploiting Adversary's Risk Profiles in Imperfect Information Security Games. In John S. Baras, Jonathan Katz, Eitan Altman, editors, Decision and Game Theory for Security - Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011. Proceedings. Volume 7037 of Lecture Notes in Computer Science, pages 22-33, Springer, 2011. [doi]
@inproceedings{StoccoC11, title = {Exploiting Adversary's Risk Profiles in Imperfect Information Security Games}, author = {Gabriel Fortunato Stocco and George Cybenko}, year = {2011}, doi = {10.1007/978-3-642-25280-8_4}, url = {http://dx.doi.org/10.1007/978-3-642-25280-8_4}, researchr = {https://researchr.org/publication/StoccoC11}, cites = {0}, citedby = {0}, pages = {22-33}, booktitle = {Decision and Game Theory for Security - Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011. Proceedings}, editor = {John S. Baras and Jonathan Katz and Eitan Altman}, volume = {7037}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-642-25279-2}, }