@dblp

Optimal Strategies for Detecting Data Exfiltration by Internal and External Attackers.

, , , , , and . GameSec, volume 10575 of Lecture Notes in Computer Science, page 171-192. Springer, (2017)

Links and resources

Tags