@inproceedings{fielder:hal-01370350, TITLE = {{Game Theory Meets Information Security Management}}, AUTHOR = {Fielder, Andrew and Panaousis, Emmanouil and Malacaria, Pasquale and Hankin, Chris and Smeraldi, Fabrizio}, URL = {https://inria.hal.science/hal-01370350}, NOTE = {Part 1: Intrusion Detection}, BOOKTITLE = {{29th IFIP International Information Security Conference (SEC)}}, ADDRESS = {Marrakech, Morocco}, EDITOR = {Nora Cuppens-Boulahia and Fr{\'e}d{\'e}ric Cuppens and Sushil Jajodia and Anas Abou El Kalam and Thierry Sans}, PUBLISHER = {{Springer}}, SERIES = {ICT Systems Security and Privacy Protection}, VOLUME = {AICT-428}, PAGES = {15-29}, YEAR = {2014}, MONTH = Jun, DOI = {10.1007/978-3-642-55415-5\_2}, KEYWORDS = {Information security management ; game theory ; cyber security}, PDF = {https://inria.hal.science/hal-01370350/file/978-3-642-55415-5_2_Chapter.pdf}, HAL_ID = {hal-01370350}, HAL_VERSION = {v1}, }