Computing Optimal Attack Strategies Using Unconstrained Influence Diagrams

Lisý, V., Píbil, R.

LISÝ, V. and R. PÍBIL. Computing Optimal Attack Strategies Using Unconstrained Influence Diagrams. In: Intelligence and Security Informatics. Pacific Asia Workshop on Intelligence and Security Informatics, Beijing, 2013-08-03. Heidelberg: Springer, 2013. p. 38-46. Lecture Notes in Computer Science. ISSN 0302-9743. ISBN 978-3-642-39692-2. DOI 10.1007/978-3-642-39693-9_5.

URL: http://link.springer.com/chapter/10.1007%2F978-3-642-39693-9_5