Showing 1 - 17 results of 17 for search 'Zhu, Quanyan', query time: 0.09s
Refine Results
-
1
Cross-layer design for secure and resilient cyber-physical systems : a decision and game theoretic approach / by Zhu, Quanyan, Xu, Zhiheng
Published 2020Call Number: Loading…Full Text (via Springer)
Located: Loading…
eBook -
2
A game- and decision-theoretic approach to resilient interdependent network analysis and design / by Chen, Juntao, Zhu, Quanyan
Published 2020Call Number: Loading…Full Text (via Springer)
Located: Loading…
eBook -
3
Resource management for on-demand mission-critical internet of things applications / by Farooq, Junaid, Zhu, Quanyan
Published 2021Call Number: Loading…Full Text (via IEEE)
Located: Loading…
eBook -
4
Cognitive security : a system-scientific approach / by Huang, Linan, Zhu, Quanyan
Published 2023Call Number: Loading…Full Text (via Springer)
Located: Loading…
Electronic eBook -
5
Game theory for cyber deception : from theory to applications / by Pawlick, Jeffrey, Zhu, Quanyan
Published 2021Call Number: Loading…Full Text (via Springer)
Located: Loading…
eBook -
6
Cyber-security in critical infrastructures : a game-theoretic approach / by Rass, Stefan, Schauer, Stefan, König, Sandra, Zhu, Quanyan
Published 2020Call Number: Loading…Full Text (via Skillsoft)
Located: Loading…
Electronic eBook -
7
Cyber-Security in Critical Infrastructures A Game-Theoretic Approach / by Rass, Stefan, Schauer, Stefan, König, Sandra, Zhu, Quanyan
Published 2020Call Number: Loading…Online Access (A-Z Journals and Newspapers)
Located: Loading…
Electronic eBook -
8
Cyber-security threats and response models in power plants by Smidts, Carol, Ray, Indrajit (Computer scientist), Zhu, Quanyan, Vaddi, Pavan Kumar, Zhao, Yunfei, 1980-, Huang, Linan, Diao, Xiaoxu, Talukdar, Rakibul, Pietrykowski, Michael C.
Published 2022Call Number: Loading…Full Text (via Springer)
Located: Loading…
Electronic eBook -
9
IoT supply chain security risk analysis and mitigation modeling, computations, and software tools / by Kieras, Timothy
Published 2022Other Authors:Call Number: Loading…Full Text (via Springer)
Located: Loading…
Electronic eBook -
10
Security and resilience of control systems : theory and applications /
Published 2022Other Authors:Call Number: Loading…Full Text (via Springer)
Located: Loading…
eBook -
11
Cyber-security in critical infrastructures a game-theoretic approach / by Rass, Stefan
Published 2020Other Authors:Call Number: Loading…Full Text (via Springer)
Located: Loading…
Electronic eBook -
12
Game Theory and Machine Learning for Cyber Security. by Kamhoua, Charles A.
Published 2021Other Authors:Call Number: Loading…Full Text (via ProQuest)
Located: Loading…
eBook -
13
Decision and Game Theory for Security : 11th International Conference, GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings /
Published 2020Other Authors: “…Zhu, Quanyan…”
Call Number: Loading…Full Text (via Springer)
Located: Loading…
Conference Proceeding eBook -
14
Network games, control, and optimization : proceedings of NETGCOOP 2018, New York, NY /
Published 2019Other Authors:Call Number: Loading…Full Text (via Springer)
Located: Loading…
Conference Proceeding eBook -
15
Game theory and machine learning for cyber security /
Published 2021Other Authors:Call Number: Loading…Full Text (via IEEE)
Located: Loading…
eBook -
16
Industrial control systems security and resiliency : practice and theory /
Published 2019Other Authors:Call Number: Loading…Full Text (via Springer)
Located: Loading…
eBook -
17
Decision and game theory for security 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings /
Published 2016Other Authors: “…Zhu, Quanyan…”
Call Number: Loading…Full Text (via Springer)
Located: Loading…
Electronic Conference Proceeding eBook
Search Tools:
RSS Feed
–
Save Search
Related Subjects
Computer networks
Security measures
Computer security
Game theory
Cooperating objects (Computer systems)
Internet of things
Algorithms
Artificial intelligence
Business enterprises
Business logistics
Computer crimes
Computer network resources
Computer science
Computers
Control theory
Cybercrime
Cyberinfrastructure
Data and Information Security
Data encryption (Computer science)
Data protection
Design and construction
Fault-tolerant computing
Game Theory
Games
Internet games
Machine learning
Management information systems
Mathematical optimization
Nuclear power plants
Optical data processing