Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/gamesec/FarhangG16
%A Farhang, Sadegh
%A Grossklags, Jens
%B GameSec
%D 2016
%E Zhu, Quanyan
%E Alpcan, Tansu
%E Panaousis, Emmanouil A.
%E Tambe, Milind
%E Casey, William
%I Springer
%K dblp
%P 195-214
%T FlipLeakage: A Game-Theoretic Approach to Protect Against Stealthy Attackers in the Presence of Information Leakage.
%U http://dblp.uni-trier.de/db/conf/gamesec/gamesec2016.html#FarhangG16
%V 9996
%@ 978-3-319-47412-0
@inproceedings{conf/gamesec/FarhangG16,
added-at = {2017-05-23T00:00:00.000+0200},
author = {Farhang, Sadegh and Grossklags, Jens},
biburl = {https://www.bibsonomy.org/bibtex/2a015a807821532ac47a1e54649f73eeb/dblp},
booktitle = {GameSec},
crossref = {conf/gamesec/2016},
editor = {Zhu, Quanyan and Alpcan, Tansu and Panaousis, Emmanouil A. and Tambe, Milind and Casey, William},
ee = {https://doi.org/10.1007/978-3-319-47413-7_12},
interhash = {527425d226c28d52978be5ae50440951},
intrahash = {a015a807821532ac47a1e54649f73eeb},
isbn = {978-3-319-47412-0},
keywords = {dblp},
pages = {195-214},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
timestamp = {2019-05-15T13:41:43.000+0200},
title = {FlipLeakage: A Game-Theoretic Approach to Protect Against Stealthy Attackers in the Presence of Information Leakage.},
url = {http://dblp.uni-trier.de/db/conf/gamesec/gamesec2016.html#FarhangG16},
volume = 9996,
year = 2016
}