Languages
Covers
Jump To : Overview | Titles | Subjects

Zhu, Quanyan.

Overview
Works: 4 works in 1 publications in 1 languages
Titles
Game Theory for Cyber Deception = From Theory to Applications / by: Zhu, Quanyan.; Pawlick, Jeffrey.; SpringerLink (Online service) (Language materials, printed) , [http://id.loc.gov/vocabulary/relators/aut]
IoT Supply Chain Security Risk Analysis and Mitigation = Modeling, Computations, and Software Tools / by: SpringerLink (Online service); Zhu, Quanyan.; Kieras, Timothy.; Farooq, Junaid. (Language materials, printed) , [http://id.loc.gov/vocabulary/relators/aut]
Cyber-Security in Critical Infrastructures = A Game-Theoretic Approach / by: Rass, Stefan.; Schauer, Stefan.; König, Sandra.; Zhu, Quanyan.; SpringerLink (Online service) (Language materials, printed) , [http://id.loc.gov/vocabulary/relators/aut]
Decision and Game Theory for Security = 11th International Conference, GameSec 2020, College Park, MD, USA, October 28–30, 2020, Proceedings / by: Baras, John S.; Poovendran, Radha.; SpringerLink (Online service); Chen, Juntao.; Zhu, Quanyan. (Language materials, printed) , [http://id.loc.gov/vocabulary/relators/edt]
Decision and Game Theory for Security = 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings / by: Alpcan, Tansu.; Panaousis, Emmanouil.; Casey, William.; SpringerLink (Online service); Tambe, Milind.; Zhu, Quanyan. (Language materials, printed) , [http://id.loc.gov/vocabulary/relators/edt]
Decision and game theory for security = 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016 : proceedings / by: Workshop on the Preservation of Stability under Discretization ((2001 :); Zhu, Quanyan.; SpringerLink (Online service) (Language materials, printed)
Security and Resilience of Control Systems = Theory and Applications / by: SpringerLink (Online service); Ishii, Hideaki.; Zhu, Quanyan. (Language materials, printed) , [http://id.loc.gov/vocabulary/relators/edt]
Cross-Layer Design for Secure and Resilient Cyber-Physical Systems = A Decision and Game Theoretic Approach / by: Zhu, Quanyan.; SpringerLink (Online service); Xu, Zhiheng. (Language materials, printed) , [http://id.loc.gov/vocabulary/relators/aut]
Cyber-Security Threats and Response Models in Nuclear Power Plants by: Diao, Xiaoxu.; Ray, Indrajit.; Zhu, Quanyan.; SpringerLink (Online service); Huang, Linan.; Smidts, Carol.; Vaddi, Pavan Kumar.; Pietrykowski, Michael C.; Zhao, Yunfei.; Talukdar, Rakibul. (Language materials, printed) , [http://id.loc.gov/vocabulary/relators/aut]
A Game- and Decision-Theoretic Approach to Resilient Interdependent Network Analysis and Design by: Zhu, Quanyan.; Chen, Juntao.; SpringerLink (Online service) (Language materials, printed) , [http://id.loc.gov/vocabulary/relators/aut]
Show more
Subjects
Computer science—Mathematics. Computer mathematics. Computer engineering. Systems and Data Security. Math Applications in Computer Science. Data protection. Artificial intelligence. Electrical Power Engineering. Computer Communication Networks. Electrical engineering. Security Science and Technology. Systems Theory, Control . Algorithms. Information Systems Applications (incl. Internet) Cooperating objects (Computer systems). Application software. Nuclear Energy. Security systems. Artificial Intelligence. Data encryption (Computer science). Internet of things. Embedded computer systems. Cyber-physical systems, IoT. System theory. Cybercrime. Computers. Computer networks. Game Theory, Economics, Social and Behav. Sciences. Control theory. Computer Imaging, Vision, Pattern Recognition and Graphics. Financial risk management. Nuclear engineering. Systems Theory, Control. Control and Systems Theory. Mobile and Network Security. Game Theory. Algorithm Analysis and Problem Complexity. Risk Management. Communications Engineering, Networks. Information Systems Applications (incl. Internet). Computer networks Electric power production. Game theory. Management of Computing and Information Systems. Computer communication systems. Computer security Security. Information Systems and Communication Service. Game theory Mathematical Applications in Computer Science. Computer crimes. Cryptology. System safety. Cyber-Physical Systems. Control engineering. Computer science. Management information systems. Optical data processing. Principles and Models of Security. Data and Information Security. Computer security.
 
 
Change password
Login