Exhilarate 发表于 2025-3-28 17:11:36
Cyber-Security in Critical Infrastructures978-3-030-46908-5Series ISSN 1613-5113 Series E-ISSN 2363-9466locus-ceruleus 发表于 2025-3-28 19:58:04
https://doi.org/10.1007/978-3-322-81373-2vital pillar of contemporary societies, and their protection is a top duty of governments and security research. Recent years have shown a paradigm shift of cyber-attacks from specific individual threat and attack scenarios, to a modern combination of various attack types and strategies to what we cEmbolic-Stroke 发表于 2025-3-29 02:15:11
http://reply.papertrans.cn/25/2419/241828/241828_43.png微不足道 发表于 2025-3-29 05:41:34
http://reply.papertrans.cn/25/2419/241828/241828_44.pngDOLT 发表于 2025-3-29 09:03:17
https://doi.org/10.1007/978-3-531-93123-4ng games, and games with distribution-valued payoffs. The latter build upon empirical methods and data science to construct games from data, but also reveals theoretic connections to multi-criteria optimization using lexicographic goal priorities (that classical games cannot deal with, but distribut试验 发表于 2025-3-29 13:11:31
http://reply.papertrans.cn/25/2419/241828/241828_46.png遗留之物 发表于 2025-3-29 18:10:07
Symmetric and Alternating Groupssk control. We observe similarities between risk management processes and extensive form games, accompanied by the possibility of using game-theoretic algorithms and methods in various steps of a risk management process. Examples include decision making for risk prioritization, choice of best risk m行业 发表于 2025-3-29 22:54:19
Springer Undergraduate Mathematics Seriesinsurance policy can reduce the number of successful cyber-attacks by incentivizing the adoption of preventative measures in return for more coverage and the implementation of best practices by pricing premiums based on an insured level of self-protection. This chapter introduces a bi-level game-the