Zhu, Quanyan.
Overview
Works: | 1 works in 8 publications in 1 languages |
---|
Titles
A game- and decision-theoretic approach to resilient interdependent network analysis and design
by:
Chen, Juntao.; SpringerLink (Online service); Zhu, Quanyan.
(Electronic resources)
Cognitive securitya system-scientific approach /
by:
Huang, Linan.; SpringerLink (Online service); Zhu, Quanyan.
(Electronic resources)
Decision and game theory for security11th International Conference, GameSec 2020, College Park, MD, USA, October 28-30, 2020 : proceedings /
by:
(1998 :); SpringerLink (Online service); Zhu, Quanyan.
(Electronic resources)
IoT supply chain security risk analysis and mitigationmodeling, computations, and software tools /
by:
Farooq, Junaid.; Kieras, Timothy.; SpringerLink (Online service); Zhu, Quanyan.
(Electronic resources)
Decision and game theory for security7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016 : proceedings /
by:
(1998 :); SpringerLink (Online service); Zhu, Quanyan.
(Electronic resources)
Security and resilience of control systemstheory and applications /
by:
Ishii, Hideaki.; SpringerLink (Online service); Zhu, Quanyan.
(Electronic resources)
Game theory for cyber deceptionfrom theory to applications /
by:
Pawlick, Jeffrey.; SpringerLink (Online service); Zhu, Quanyan.
(Electronic resources)
Cross-layer design for secure and resilient cyber-physical systemsa decision and game theoretic approach /
by:
SpringerLink (Online service); Xu, Zhiheng.; Zhu, Quanyan.
(Electronic resources)
Subjects
Computer security.
Communications Engineering, Networks.
Mobile and Network Security.
Cryptology.
Information Systems and Communication Service.
Data and Information Security.
Information Systems Applications (incl. Internet)
Algorithm Analysis and Problem Complexity.
Management of Computing and Information Systems.
Control and Systems Theory.
Cyber-physical systems, IoT.
Mathematical Applications in Computer Science.
Security Science and Technology.
Algorithms.
Principles and Models of Security.
Game theory
Management information systems.
Cyberinfrastructure.
Business logistics
Cyber-Physical Systems.
Computer security
Game theory.
Systems Theory, Control.
Artificial Intelligence.
Computer Imaging, Vision, Pattern Recognition and Graphics.
Electrical Power Engineering.
Privacy.
Computer science.
Computer networks.
Systems and Data Security.
Computer Communication Networks.
Game Theory, Economics, Social and Behav. Sciences.
Computer networks
Internet of things
Risk Management.
Cooperating objects (Computer systems)