Bitte melden Sie sich an um selbst Rezensionen oder Kommentare zu erstellen.
Zitieren Sie diese Publikation
Mehr Zitationsstile
- bitte auswählen -
%0 Conference Paper
%1 conf/bionetics/CaseyWMMWM14
%A Casey, William
%A Weaver, Rhiannon
%A Metcalf, Leigh
%A Morales, Jose Andre
%A Wright, Evan
%A Mishra, Bud
%B BICT
%D 2014
%E Suzuki, Junichi
%E Nakano, Tadashi
%I ICST
%K dblp
%T Cyber Security via Minority Games with Epistatic Signaling.
%U http://dblp.uni-trier.de/db/conf/bionetics/bict2014.html#CaseyWMMWM14
%@ 978-1-63190-053-2
@inproceedings{conf/bionetics/CaseyWMMWM14,
added-at = {2015-03-09T00:00:00.000+0100},
author = {Casey, William and Weaver, Rhiannon and Metcalf, Leigh and Morales, Jose Andre and Wright, Evan and Mishra, Bud},
biburl = {https://www.bibsonomy.org/bibtex/288102ad8c836792c97aa48e5e8773fb6/dblp},
booktitle = {BICT},
crossref = {conf/bionetics/2014},
editor = {Suzuki, Junichi and Nakano, Tadashi},
ee = {http://dx.doi.org/10.4108/icst.bict.2014.257967},
interhash = {f934bc495126431433d616bee680b443},
intrahash = {88102ad8c836792c97aa48e5e8773fb6},
isbn = {978-1-63190-053-2},
keywords = {dblp},
publisher = {ICST},
timestamp = {2015-06-18T23:29:23.000+0200},
title = {Cyber Security via Minority Games with Epistatic Signaling.},
url = {http://dblp.uni-trier.de/db/conf/bionetics/bict2014.html#CaseyWMMWM14},
year = 2014
}