@dblp

Secure or insure?: a game-theoretic analysis of information security games.

, , and . WWW, page 209-218. ACM, (2008)

Links and resources

Tags