A Survey of Game Theory as Applied to Network Security. Roy, S., Ellis, C., Shiva, S. G., Dasgupta, D., Shandilya, V., & Wu, Q. In HICSS, pages 1-10, 2010. IEEE Computer Society. Link Paper bibtex @inproceedings{conf/hicss/RoyESDSW10,
added-at = {2014-07-21T00:00:00.000+0200},
author = {Roy, Sankardas and Ellis, Charles and Shiva, Sajjan G. and Dasgupta, Dipankar and Shandilya, Vivek and Wu, Qishi},
biburl = {http://www.bibsonomy.org/bibtex/251b37bd153665616de960aae0f1c9be9/dblp},
booktitle = {HICSS},
crossref = {conf/hicss/2010},
ee = {http://doi.ieeecomputersociety.org/10.1109/HICSS.2010.35},
interhash = {ebcd7f63a4421d8115aaf58ebd479ce7},
intrahash = {51b37bd153665616de960aae0f1c9be9},
isbn = {978-0-7695-3869-3},
keywords = {dblp},
pages = {1-10},
publisher = {IEEE Computer Society},
timestamp = {2015-06-19T10:29:07.000+0200},
title = {A Survey of Game Theory as Applied to Network Security.},
url = {http://dblp.uni-trier.de/db/conf/hicss/hicss2010.html#RoyESDSW10},
year = 2010
}
Downloads: 0
{"_id":"ruQ532Nw52SH7fQPK","bibbaseid":"roy-ellis-shiva-dasgupta-shandilya-wu-asurveyofgametheoryasappliedtonetworksecurity-2010","downloads":0,"creationDate":"2016-02-09T06:00:32.681Z","title":"A Survey of Game Theory as Applied to Network Security.","author_short":["Roy, S.","Ellis, C.","Shiva, S. G.","Dasgupta, D.","Shandilya, V.","Wu, Q."],"year":2010,"bibtype":"inproceedings","biburl":"http://www.bibsonomy.org/bib/author/Vivek Krishnakumar?items=1000","bibdata":{"bibtype":"inproceedings","type":"inproceedings","added-at":"2014-07-21T00:00:00.000+0200","author":[{"propositions":[],"lastnames":["Roy"],"firstnames":["Sankardas"],"suffixes":[]},{"propositions":[],"lastnames":["Ellis"],"firstnames":["Charles"],"suffixes":[]},{"propositions":[],"lastnames":["Shiva"],"firstnames":["Sajjan","G."],"suffixes":[]},{"propositions":[],"lastnames":["Dasgupta"],"firstnames":["Dipankar"],"suffixes":[]},{"propositions":[],"lastnames":["Shandilya"],"firstnames":["Vivek"],"suffixes":[]},{"propositions":[],"lastnames":["Wu"],"firstnames":["Qishi"],"suffixes":[]}],"biburl":"http://www.bibsonomy.org/bibtex/251b37bd153665616de960aae0f1c9be9/dblp","booktitle":"HICSS","crossref":"conf/hicss/2010","ee":"http://doi.ieeecomputersociety.org/10.1109/HICSS.2010.35","interhash":"ebcd7f63a4421d8115aaf58ebd479ce7","intrahash":"51b37bd153665616de960aae0f1c9be9","isbn":"978-0-7695-3869-3","keywords":"dblp","pages":"1-10","publisher":"IEEE Computer Society","timestamp":"2015-06-19T10:29:07.000+0200","title":"A Survey of Game Theory as Applied to Network Security.","url":"http://dblp.uni-trier.de/db/conf/hicss/hicss2010.html#RoyESDSW10","year":"2010","bibtex":"@inproceedings{conf/hicss/RoyESDSW10,\n added-at = {2014-07-21T00:00:00.000+0200},\n author = {Roy, Sankardas and Ellis, Charles and Shiva, Sajjan G. and Dasgupta, Dipankar and Shandilya, Vivek and Wu, Qishi},\n biburl = {http://www.bibsonomy.org/bibtex/251b37bd153665616de960aae0f1c9be9/dblp},\n booktitle = {HICSS},\n crossref = {conf/hicss/2010},\n ee = {http://doi.ieeecomputersociety.org/10.1109/HICSS.2010.35},\n interhash = {ebcd7f63a4421d8115aaf58ebd479ce7},\n intrahash = {51b37bd153665616de960aae0f1c9be9},\n isbn = {978-0-7695-3869-3},\n keywords = {dblp},\n pages = {1-10},\n publisher = {IEEE Computer Society},\n timestamp = {2015-06-19T10:29:07.000+0200},\n title = {A Survey of Game Theory as Applied to Network Security.},\n url = {http://dblp.uni-trier.de/db/conf/hicss/hicss2010.html#RoyESDSW10},\n year = 2010\n}\n\n","author_short":["Roy, S.","Ellis, C.","Shiva, S. G.","Dasgupta, D.","Shandilya, V.","Wu, Q."],"key":"conf/hicss/RoyESDSW10","id":"conf/hicss/RoyESDSW10","bibbaseid":"roy-ellis-shiva-dasgupta-shandilya-wu-asurveyofgametheoryasappliedtonetworksecurity-2010","role":"author","urls":{"Link":"http://doi.ieeecomputersociety.org/10.1109/HICSS.2010.35","Paper":"http://dblp.uni-trier.de/db/conf/hicss/hicss2010.html#RoyESDSW10"},"keyword":["dblp"],"downloads":0},"search_terms":["survey","game","theory","applied","network","security","roy","ellis","shiva","dasgupta","shandilya","wu"],"keywords":["dblp"],"authorIDs":[],"dataSources":["MhetGwzdnqQv3dJWT"]}