Show simple item record

dc.contributor.authorMu, Chunyan
dc.contributor.editorParker, David
dc.contributor.editorWolf, Verena
dc.date.accessioned2023-10-06T23:03:06Z
dc.date.available2023-10-06T23:03:06Z
dc.date.issued2019-10-18
dc.identifier225684574
dc.identifier859e2278-f1b8-4a92-8deb-61e08c1b0f16
dc.identifier.citationMu , C 2019 , Automated Game-Theoretic Verification of Security Systems . in D Parker & V Wolf (eds) , 16th International Conference on Quantitative Evaluation of Systems (QEST) . vol. 11785 , Lecture Notes in Computer Science , vol. 11785 , Springer , pp. 239-256 . https://doi.org/10.1007/978-3-030-30281-8_14en
dc.identifier.otherBibtex: DBLP:conf/qest/Mu19
dc.identifier.otherORCID: /0000-0002-2988-6939/work/126803936
dc.identifier.urihttp://aura-test.abdn.ac.uk/handle/2164/19837
dc.format.extent18
dc.format.extent279288
dc.language.isoeng
dc.publisherSpringer
dc.relation.ispartof16th International Conference on Quantitative Evaluation of Systems (QEST)en
dc.relation.ispartofseriesLecture Notes in Computer Scienceen
dc.titleAutomated Game-Theoretic Verification of Security Systemsen
dc.typeConference itemen
dc.contributor.institutionUniversity of Aberdeen.Computing Scienceen
dc.contributor.institutionUniversity of Aberdeen.Cybersecurity and Privacyen
dc.identifier.doihttps://doi.org/10.1007/978-3-030-30281-8_14


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record