dc.contributor.author | Mu, Chunyan | |
dc.contributor.editor | Parker, David | |
dc.contributor.editor | Wolf, Verena | |
dc.date.accessioned | 2023-10-06T23:03:06Z | |
dc.date.available | 2023-10-06T23:03:06Z | |
dc.date.issued | 2019-10-18 | |
dc.identifier | 225684574 | |
dc.identifier | 859e2278-f1b8-4a92-8deb-61e08c1b0f16 | |
dc.identifier.citation | Mu , C 2019 , Automated Game-Theoretic Verification of Security Systems . in D Parker & V Wolf (eds) , 16th International Conference on Quantitative Evaluation of Systems (QEST) . vol. 11785 , Lecture Notes in Computer Science , vol. 11785 , Springer , pp. 239-256 . https://doi.org/10.1007/978-3-030-30281-8_14 | en |
dc.identifier.other | Bibtex: DBLP:conf/qest/Mu19 | |
dc.identifier.other | ORCID: /0000-0002-2988-6939/work/126803936 | |
dc.identifier.uri | http://aura-test.abdn.ac.uk/handle/2164/19837 | |
dc.format.extent | 18 | |
dc.format.extent | 279288 | |
dc.language.iso | eng | |
dc.publisher | Springer | |
dc.relation.ispartof | 16th International Conference on Quantitative Evaluation of Systems (QEST) | en |
dc.relation.ispartofseries | Lecture Notes in Computer Science | en |
dc.title | Automated Game-Theoretic Verification of Security Systems | en |
dc.type | Conference item | en |
dc.contributor.institution | University of Aberdeen.Computing Science | en |
dc.contributor.institution | University of Aberdeen.Cybersecurity and Privacy | en |
dc.identifier.doi | https://doi.org/10.1007/978-3-030-30281-8_14 | |