Optimal Strategies for Detecting Data Exfiltration by Internal and External Attackers

Durkota, K., Lisý, V., Kiekintveld, C., Horák, K., Bošanský, B., Pevný, T.

DURKOTA, K., et al. Optimal Strategies for Detecting Data Exfiltration by Internal and External Attackers. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8th Conference on Decision and Game Theory for Security, Vienna, 2017-10-23/2017-10-25. Düsseldorf: Springer VDI Verlag, 2017. p. 171-192. ISSN 0302-9743. ISBN 978-3-319-68710-0. DOI 10.1007/978-3-319-68711-7_10.

URL: https://link.springer.com/chapter/10.1007/978-3-319-68711-7_10