Durkota, K., Lisý, V., Kiekintveld, C., Horák, K., Bošanský, B., Pevný, T.
DURKOTA, K., et al. Optimal Strategies for Detecting Data Exfiltration by Internal and External Attackers. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8th Conference on Decision and Game Theory for Security, Vienna, 2017-10-23/2017-10-25. Düsseldorf: Springer VDI Verlag, 2017. p. 171-192. ISSN 0302-9743. ISBN 978-3-319-68710-0. DOI 10.1007/978-3-319-68711-7_10.
URL: https://link.springer.com/chapter/10.1007/978-3-319-68711-7_10