Show simple item record

dc.contributor.authorFielder, Aen_US
dc.contributor.authorPanaousis, Een_US
dc.contributor.authorMalacaria, Pen_US
dc.contributor.authorHankin, Cen_US
dc.contributor.authorSmeraldi, Fen_US
dc.date.accessioned2018-01-17T13:39:20Z
dc.date.issued2014en_US
dc.date.submitted2018-01-02T11:31:21.908Z
dc.identifier.issn1868-4238en_US
dc.identifier.urihttp://qmro.qmul.ac.uk/xmlui/handle/123456789/31355
dc.format.extent15 - 29en_US
dc.subjectInformation security managementen_US
dc.subjectgame theoryen_US
dc.subjectcyber securityen_US
dc.titleGame Theory Meets Information Security Managementen_US
dc.typeConference Proceeding
dc.rights.holder© IFIP International Federation for Information Processing 2014
pubs.author-urlhttp://gateway.webofknowledge.com/gateway/Gateway.cgi?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000364653800002&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=612ae0d773dcbdba3046f6df545e9f6aen_US
pubs.notesNo embargoen_US
pubs.publication-statusPublisheden_US
pubs.volume428en_US
qmul.funderGames and Abstraction: The Science of Cyber Security::EPSRCen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record