Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/ecai/NguyenVYN20
%A Nguyen, Thanh Hong
%A Vu, Nam
%A Yadav, Amulya
%A Nguyen, Uy
%B ECAI
%D 2020
%E Giacomo, Giuseppe De
%E Catalá, Alejandro
%E Dilkina, Bistra
%E Milano, Michela
%E Barro, Senén
%E Bugarín, Alberto
%E Lang, Jérôme
%I IOS Press
%K dblp
%P 179-186
%T Decoding the Imitation Security Game: Handling Attacker Imitative Behavior Deception.
%U http://dblp.uni-trier.de/db/conf/ecai/ecai2020.html#NguyenVYN20
%V 325
%@ 978-1-64368-101-6
@inproceedings{conf/ecai/NguyenVYN20,
added-at = {2021-01-29T00:00:00.000+0100},
author = {Nguyen, Thanh Hong and Vu, Nam and Yadav, Amulya and Nguyen, Uy},
biburl = {https://www.bibsonomy.org/bibtex/2c0a7696c19c16b86a761569d6d93483e/dblp},
booktitle = {ECAI},
crossref = {conf/ecai/2020},
editor = {Giacomo, Giuseppe De and Catalá, Alejandro and Dilkina, Bistra and Milano, Michela and Barro, Senén and Bugarín, Alberto and Lang, Jérôme},
ee = {https://doi.org/10.3233/FAIA200091},
interhash = {72c247dc8878b944517658a7f93cf841},
intrahash = {c0a7696c19c16b86a761569d6d93483e},
isbn = {978-1-64368-101-6},
keywords = {dblp},
pages = {179-186},
publisher = {IOS Press},
series = {Frontiers in Artificial Intelligence and Applications},
timestamp = {2024-04-09T18:45:29.000+0200},
title = {Decoding the Imitation Security Game: Handling Attacker Imitative Behavior Deception.},
url = {http://dblp.uni-trier.de/db/conf/ecai/ecai2020.html#NguyenVYN20},
volume = 325,
year = 2020
}