dc.contributor.author | Fielder, A | en_US |
dc.contributor.author | Panaousis, E | en_US |
dc.contributor.author | Malacaria, P | en_US |
dc.contributor.author | Hankin, C | en_US |
dc.contributor.author | Smeraldi, F | en_US |
dc.date.accessioned | 2018-01-17T13:39:20Z | |
dc.date.issued | 2014 | en_US |
dc.date.submitted | 2018-01-02T11:31:21.908Z | |
dc.identifier.issn | 1868-4238 | en_US |
dc.identifier.uri | http://qmro.qmul.ac.uk/xmlui/handle/123456789/31355 | |
dc.format.extent | 15 - 29 | en_US |
dc.subject | Information security management | en_US |
dc.subject | game theory | en_US |
dc.subject | cyber security | en_US |
dc.title | Game Theory Meets Information Security Management | en_US |
dc.type | Conference Proceeding | |
dc.rights.holder | © IFIP International Federation for Information Processing 2014 | |
pubs.author-url | http://gateway.webofknowledge.com/gateway/Gateway.cgi?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000364653800002&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=612ae0d773dcbdba3046f6df545e9f6a | en_US |
pubs.notes | No embargo | en_US |
pubs.publication-status | Published | en_US |
pubs.volume | 428 | en_US |
qmul.funder | Games and Abstraction: The Science of Cyber Security::EPSRC | en_US |