Filter your results
- 3
- 3
- 3
- 1
- 2
- 3
- 1
- 1
- 2
- 2
- 1
|
|
sorted by
|
|
Using the Conflicting Incentives Risk Analysis Method28th Security and Privacy Protection in Information Processing Systems (SEC), Jul 2013, Auckland, New Zealand. pp.315-329, ⟨10.1007/978-3-642-39218-4_24⟩
Conference papers
hal-01463835v1
|
||
|
Mapping between Classical Risk Management and Game Theoretical Approaches12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.147-154, ⟨10.1007/978-3-642-24712-5_12⟩
Conference papers
hal-01596184v1
|
||
|
Using Game Theory to Analyze Risk to Privacy: An Initial Insight6th International Summer School (ISS), Aug 2010, Helsingborg, Sweden. pp.41-51, ⟨10.1007/978-3-642-20769-3_4⟩
Conference papers
hal-01559468v1
|