BibTeX
CSL-JSON
MLA
Harvard
Game theory meets network security and privacy
release_55ixmohvijaelflxqrrbtnvfuu
by
Mohammad Hossein Manshaei, Quanyan Zhu, Tansu Alpcan, Tamer Bacşar, Jean-Pierre Hubaux
Published
in ACM Computing Surveys by Association for Computing Machinery (ACM).
2013 Volume 45, p1-39
Archived Files and Locations
application/pdf 1.0 MB
file_zd7nxduxsrg7znaol6qxgcyofy
|
web.archive.org (webarchive) infoscience.epfl.ch (web) infoscience.epfl.ch:80 (web) web.archive.org (webarchive) |
application/pdf 815.8 kB
file_kue3rygp75eovhaobxfkzyaweu
|
web.archive.org (webarchive) publish.illinois.edu (web) |
Read Archived PDF
Preserved and Accessible
Work Entity
access all versions, variants, and formats of this works (eg, pre-prints)
access all versions, variants, and formats of this works (eg, pre-prints)
Cite This
Lookup Links
oaDOI/unpaywall (OA fulltext)
Crossref Metadata (via API)
Worldcat
SHERPA/RoMEO (journal policies)
wikidata.org
CORE.ac.uk
Semantic Scholar
Google Scholar
Crossref Metadata (via API)
Worldcat
SHERPA/RoMEO (journal policies)
wikidata.org
CORE.ac.uk
Semantic Scholar
Google Scholar