LEADER 01339oam 2200445 450 001 9910484867303321 005 20210625213304.0 010 $a3-030-66065-6 035 $a(CKB)4900000000508924 035 $a(MiAaPQ)EBC6466134 035 $a(PPN)253254299 035 $a(EXLCZ)994900000000508924 100 $a20210625d2021 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aGame theory for cyber deception $efrom theory to applications /$fJeffrey Pawlick and Quanyan Zhu 210 1$aCham, Switzerland :$cBirkhäuser,$d[2021] 210 4$d©2021 215 $a1 online resource (192 pages) $cillustrations 311 $a3-030-66064-8 320 $aIncludes bibliographical references and index. 606 $aGame theory 606 $aComputer networks$xSecurity measures 606 $aComputer security 615 0$aGame theory. 615 0$aComputer networks$xSecurity measures. 615 0$aComputer security. 676 $a005.8 700 $aPawlick$b Jeffrey$01221086 702 $aZhu$b Quanyan 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bUtOrBLW 906 $aBOOK 912 $a9910484867303321 996 $aGame theory for cyber deception$92831129 997 $aUNINA