Searched for: subject%3A%22Demand%255C%252BResponse%22
(1 - 1 of 1)
document
Janssen, S.A.M. (author), Sharpanskykh, Alexei (author)
Security Risk Assessment is commonly performed by using traditional methods based on linear probabilistic tools and informal expert judgements. These methods lack the capability to take the inherent dynamic and intelligent nature of attackers into account. To partially address the limitations, researchers applied game theory to study security...
conference paper 2017