Game theoretic risk analysis of security threats
Material type:
- 978-0-387-87766-2
- 519.3 B588
Item type | Current library | Call number | Status | Date due | Barcode | Item holds | |
---|---|---|---|---|---|---|---|
Books | ISI Library, Kolkata | 519.3 B588 (Browse shelf(Opens below)) | Available | 130278 |
Total holds: 0
Browsing ISI Library, Kolkata shelves Close shelf browser (Hides shelf browser)
No cover image available | No cover image available | |||||||
519.3 B476 Logic in games / | 519.3 B551 Constrained optimization and lagrange multiplier methods | 519.3 B575 Essays on cooperative behaviour and collective action | 519.3 B588 Game theoretic risk analysis of security threats | 519.3 B588 Optimization : principles and algorithms / | 519.3 B613 Game theory and the social contract | 519.3 B613 Game theory and the social contract |
There are no comments on this title.
Log in to your account to post a comment.