GTM: Game Theoretic Methodology for optimal cybersecurity defending strategies and investments

Summary

This is a publication. If there is no link to the publication on this page, you can try the pre-formated search via the search engines listed on this page.

Authors: Ioannis Kalderemidis; Aristeidis Farao; Panagiotis Bountakas; Sakshyam Panda; Christos Xenakis

Journal publisher: ACM

Published year: 2022

DOI identifier: 10.1145/3538969.3544431