共 15 条
[1]
Ariu D, 2007, LECT NOTES ARTIF INT, V4571, P449
[3]
Using HMM in Strategic Games
[J].
ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE,
2014, (144)
:73-84
[4]
Deception-Based Game Theoretical Approach to Mitigate DoS Attacks
[J].
DECISION AND GAME THEORY FOR SECURITY, (GAMESEC 2016),
2016, 9996
:18-38
[5]
Chains Markov, 2001, QUEUEING NETWORKS MA, P35, DOI [10.1002/0471200581.ch2, DOI 10.1002/0471200581.CH2]
[6]
Fan G., 2013, 2013 IEEE International Conference on Services Computing, P659, DOI [DOI 10.1109/SCC.2013.110, 10.1109/SCC.2013.110]
[7]
HiddenMarkov Models, INTRO HIDDEN SEMIMAR, P29, DOI [10.1017/9781108377423.004, DOI 10.1017/9781108377423.004]
[8]
Jassim MR, 2017, INT C P2P PAR GRID C, P241, DOI DOI 10.1007/978-3-319-69835-9_23
[9]
Narwal P., 2017, 2017 INT C INF TECHN, DOI [10.1109/ICTUS.2017.8286057, DOI 10.1109/ICTUS.2017.8286057]
[10]
Narwal P., 2016, Proceedings of the 2nd International Conference on Information and Communication Technology for Competitive Strategies (ICTCS 2016). ACM, P5, DOI DOI 10.1145/2905055.2905152