Author of the publication

A Game Theoretic Approach for Deploying Intrusion Detection Agent.

, , and . PRIMA, volume 5044 of Lecture Notes in Computer Science, page 446-451. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Game Theoretic Framework for Multi-agent Deployment in Intrusion Detection Systems., , and . Security Informatics, volume 9 of Annals of Information Systems, Springer, (2010)A Game Theoretic Approach for Deploying Intrusion Detection Agent., , and . PRIMA, volume 5044 of Lecture Notes in Computer Science, page 446-451. Springer, (2007)A game theory approach for the reallocation of security forces against terrorist diversionary attacks., , and . ISI, page 89-94. IEEE, (2009)Why do amusement parks only charge a fixed admission fee?, and . Economics Letters, 95 (2): 180--185 (May 2007)A game theory approach for an emergency management security advisory system., , and . ISI, page 116-121. IEEE, (2008)