Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "Cyber-Threats Information Sharing in Cloud Computing: A Game Theoretic Approach"
@inproceedings{DBLP:conf/cscloud/KamhouaMTKHS15, author = {Charles A. Kamhoua and Andrew P. Martin and Deepak K. Tosh and Kevin A. Kwiat and Chad Heitzenrater and Shamik Sengupta}, title = {Cyber-Threats Information Sharing in Cloud Computing: {A} Game Theoretic Approach}, booktitle = {{IEEE} 2nd International Conference on Cyber Security and Cloud Computing, CSCloud 2015, New York, NY, USA, November 3-5, 2015}, pages = {382--389}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CSCloud.2015.80}, doi = {10.1109/CSCLOUD.2015.80}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cscloud/KamhouaMTKHS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.