Bitte melden Sie sich an um selbst Rezensionen oder Kommentare zu erstellen.
Zitieren Sie diese Publikation
Mehr Zitationsstile
- bitte auswählen -
%0 Conference Paper
%1 conf/icdcit/CaseyMNSWWMM14
%A Casey, William
%A Morales, Jose Andre
%A Nguyen, Thomson
%A Spring, Jonathan M.
%A Weaver, Rhiannon
%A Wright, Evan
%A Metcalf, Leigh
%A Mishra, Bud
%B ICDCIT
%D 2014
%E Natarajan, Raja
%I Springer
%K dblp
%P 34-42
%T Cyber Security via Signaling Games: Toward a Science of Cyber Security.
%U http://dblp.uni-trier.de/db/conf/icdcit/icdcit2014.html#CaseyMNSWWMM14
%V 8337
%@ 978-3-319-04482-8
@inproceedings{conf/icdcit/CaseyMNSWWMM14,
added-at = {2017-05-25T00:00:00.000+0200},
author = {Casey, William and Morales, Jose Andre and Nguyen, Thomson and Spring, Jonathan M. and Weaver, Rhiannon and Wright, Evan and Metcalf, Leigh and Mishra, Bud},
biburl = {https://www.bibsonomy.org/bibtex/2706139442ed0a2a7e270286d70968301/dblp},
booktitle = {ICDCIT},
crossref = {conf/icdcit/2014},
editor = {Natarajan, Raja},
ee = {https://doi.org/10.1007/978-3-319-04483-5_4},
interhash = {ee00309c5869a3c39f40ca03086f74ba},
intrahash = {706139442ed0a2a7e270286d70968301},
isbn = {978-3-319-04482-8},
keywords = {dblp},
pages = {34-42},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
timestamp = {2019-05-15T19:08:13.000+0200},
title = {Cyber Security via Signaling Games: Toward a Science of Cyber Security.},
url = {http://dblp.uni-trier.de/db/conf/icdcit/icdcit2014.html#CaseyMNSWWMM14},
volume = 8337,
year = 2014
}