Decision and Game Theory for Security
Springer, Cham
Chapter title |
Optimal Strategies for Detecting Data Exfiltration by Internal and External Attackers
|
---|---|
Chapter number | 10 |
Book title |
Decision and Game Theory for Security
|
Published by |
Springer, Cham, October 2017
|
DOI | 10.1007/978-3-319-68711-7_10 |
Book ISBNs |
978-3-31-968710-0, 978-3-31-968711-7
|
Authors |
Karel Durkota, Viliam Lisý, Christopher Kiekintveld, Karel Horák, Branislav Bošanský, Tomáš Pevný |
Country | Count | As % |
---|---|---|
Nigeria | 1 | 100% |
Type | Count | As % |
---|---|---|
Members of the public | 1 | 100% |
Country | Count | As % |
---|---|---|
Unknown | 13 | 100% |
Readers by professional status | Count | As % |
---|---|---|
Student > Bachelor | 3 | 23% |
Student > Master | 3 | 23% |
Student > Ph. D. Student | 1 | 8% |
Lecturer > Senior Lecturer | 1 | 8% |
Unspecified | 1 | 8% |
Other | 0 | 0% |
Unknown | 4 | 31% |
Readers by discipline | Count | As % |
---|---|---|
Computer Science | 5 | 38% |
Unspecified | 1 | 8% |
Biochemistry, Genetics and Molecular Biology | 1 | 8% |
Engineering | 1 | 8% |
Unknown | 5 | 38% |