BibTeX
CSL-JSON
MLA
Harvard
Incentive-based modeling and inference of attacker intent, objectives, and strategies
release_dk4d2wqt7vhcven7xe3rsfmug4
by
Peng Liu,
Wanyu Zang
Archived Files and Locations
application/pdf
332.1 kB
file_ch6fuu33erhc7cajoptwjpywoa
|
www3.cis.gsu.edu (web) web.archive.org (webarchive) |
application/pdf
984.5 kB
file_dlveifnalras7gdr5jfmylue5u
|
bluehawk.monmouth.edu (web) web.archive.org (webarchive) |
application/pdf
267.0 kB
file_2cqukmizznhcppmz3btzyx46l4
|
web.archive.org (webarchive) web.archive.org (webarchive) web.archive.org (webarchive) ist.psu.edu (web) s2.ist.psu.edu (web) |
Read Archived PDF
Preserved and Accessible
Type
Stage
Year 2003
paper-conference
Stage
published
Year 2003
Work Entity
access all versions, variants, and formats of this works (eg, pre-prints)
access all versions, variants, and formats of this works (eg, pre-prints)
Cite This
Lookup Links
oaDOI/unpaywall (OA fulltext)
Crossref Metadata (via API)
Worldcat
wikidata.org
CORE.ac.uk
Semantic Scholar
Google Scholar
Crossref Metadata (via API)
Worldcat
wikidata.org
CORE.ac.uk
Semantic Scholar
Google Scholar