Optimal Network Security Hardening Using Attack Graph Games

Cite

Text

Durkota et al. "Optimal Network Security Hardening Using Attack Graph Games." International Joint Conference on Artificial Intelligence, 2015.

Markdown

[Durkota et al. "Optimal Network Security Hardening Using Attack Graph Games." International Joint Conference on Artificial Intelligence, 2015.](https://mlanthology.org/ijcai/2015/durkota2015ijcai-optimal/)

BibTeX

@inproceedings{durkota2015ijcai-optimal,
  title     = {{Optimal Network Security Hardening Using Attack Graph Games}},
  author    = {Durkota, Karel and Lisý, Viliam and Bosanský, Branislav and Kiekintveld, Christopher},
  booktitle = {International Joint Conference on Artificial Intelligence},
  year      = {2015},
  pages     = {526-532},
  url       = {https://mlanthology.org/ijcai/2015/durkota2015ijcai-optimal/}
}