Inproceedings,

Decoding the Imitation Security Game: Handling Attacker Imitative Behavior Deception.

, , , and .
ECAI, volume 325 of Frontiers in Artificial Intelligence and Applications, page 179-186. IOS Press, (2020)

Meta data

Tags

Users

  • @dblp

Comments and Reviews