Incentive-based modeling and inference of attacker intent, objectives, and strategies release_dk4d2wqt7vhcven7xe3rsfmug4

by Peng Liu, Wanyu Zang

Published in Conference on Computer and Communications Security by ACM Press.

2003   p179-189

Archived Files and Locations

application/pdf   332.1 kB
file_ch6fuu33erhc7cajoptwjpywoa
www3.cis.gsu.edu (web)
web.archive.org (webarchive)
application/pdf   984.5 kB
file_dlveifnalras7gdr5jfmylue5u
bluehawk.monmouth.edu (web)
web.archive.org (webarchive)
application/pdf   267.0 kB
file_2cqukmizznhcppmz3btzyx46l4
web.archive.org (webarchive)
web.archive.org (webarchive)
web.archive.org (webarchive)
ist.psu.edu (web)
s2.ist.psu.edu (web)
Read Archived PDF
Preserved and Accessible
Type  paper-conference
Stage   published
Year   2003
Work Entity
access all versions, variants, and formats of this works (eg, pre-prints)
Catalog Record
Revision: 5e87af2f-5ed5-493c-bc72-6dab5ac0d852
API URL: JSON