Moving Target Defense II: application of Game Theory and Adversarial Modeling
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
New York, NY [u.a.]
Springer
2013
|
Schriftenreihe: | Advances in Information Security
100 |
Schlagworte: | |
Online-Zugang: | BTU01 FHA01 FHM01 FHN01 FKE01 UBG01 UBR01 UBT01 UBW01 UER01 UPA01 Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource (XII, 203 S.) Ill., graph Darst., Kt. |
ISBN: | 9781461454168 |
DOI: | 10.1007/978-1-4614-5416-8 |
Internformat
MARC
LEADER | 00000nmm a2200000 cb4500 | ||
---|---|---|---|
001 | BV040512867 | ||
003 | DE-604 | ||
005 | 20130117 | ||
007 | cr|uuu---uuuuu | ||
008 | 121030s2013 |||| o||u| ||||||eng d | ||
020 | |a 9781461454168 |c Online |9 978-1-461-45416-8 | ||
024 | 7 | |a 10.1007/978-1-461-45416-8 |2 doi | |
035 | |a (OCoLC)812052241 | ||
035 | |a (DE-599)GBV728221926 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-473 |a DE-M347 |a DE-20 |a DE-703 |a DE-Aug4 |a DE-92 |a DE-29 |a DE-859 |a DE-634 |a DE-739 |a DE-355 | ||
050 | 0 | |a QA76.9.A25 | |
084 | |a ST 230 |0 (DE-625)143617: |2 rvk | ||
245 | 1 | 0 | |a Moving Target Defense II |b application of Game Theory and Adversarial Modeling |c Sushil Jajodia ... (eds.) |
264 | 1 | |a New York, NY [u.a.] |b Springer |c 2013 | |
300 | |a 1 Online-Ressource (XII, 203 S.) |b Ill., graph Darst., Kt. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Advances in Information Security |v 100 | |
533 | |a Online-Ausgabe |e Online-Ressource | ||
650 | 0 | 7 | |a Softwareschwachstelle |0 (DE-588)4752508-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Softwareschutz |0 (DE-588)4131649-6 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Softwareschwachstelle |0 (DE-588)4752508-3 |D s |
689 | 0 | 1 | |a Softwareschutz |0 (DE-588)4131649-6 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Jajodia, Sushil |d 1947- |e Sonstige |0 (DE-588)120551683 |4 oth | |
776 | 0 | 8 | |i Reproduktion von |t Moving Target Defense II |d 2013 |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-1-461-45415-1 |
830 | 0 | |a Advances in Information Security |v 100 |w (DE-604)BV022281064 |9 100 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-1-4614-5416-8 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025359359&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025359359&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-025359359 | ||
966 | e | |u https://doi.org/10.1007/978-1-4614-5416-8 |l BTU01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-5416-8 |l FHA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-5416-8 |l FHM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-5416-8 |l FHN01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-5416-8 |l FKE01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-5416-8 |l UBG01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-5416-8 |l UBR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-5416-8 |l UBT01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-5416-8 |l UBW01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-5416-8 |l UER01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-5416-8 |l UPA01 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804149592294424576 |
---|---|
adam_text | MOVING TARGET DEFENSE II
/
: 2013
TABLE OF CONTENTS / INHALTSVERZEICHNIS
GAME THEORETIC APPROACHES TO ATTACK SURFACE SHIFTING
SECURITY GAMES APPLIED TO REAL-WORLD
ADVERSARIAL DYNAMICS: THE CONFICKER CASE STUDY
FROM INDIVIDUAL DECISIONS FROM EXPERIENCE TO BEHAVIORAL GAME THEORY
CYBER MANEUVER AGAINST EXTERNAL ADVERSARIES AND COMPROMISED NODES
APPLYING SELF-SHIELDING DYNAMICS TO THE NETWORK ARCHITECTURE
MOVING TARGET DEFENSES IN THE HELIX SELF-REGENERATIVE ARCHITECTURE
DIVERSIFYING THE SOFTWARE STACK USING RANDOMIZED NOP INSERTION
PRACTICAL SOFTWARE DIVERSIFICATION USING IN-PLACE CODE RANDOMIZATION
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
MOVING TARGET DEFENSE II
/
: 2013
ABSTRACT / INHALTSTEXT
OUR CYBER DEFENSES ARE STATIC AND ARE GOVERNED BY LENGTHY PROCESSES,
E.G., FOR TESTING AND SECURITY PATCH DEPLOYMENT. ADVERSARIES COULD
PLAN THEIR ATTACKS CAREFULLY OVER TIME AND LAUNCH ATTACKS AT CYBER
SPEEDS AT ANY GIVEN MOMENT. WE NEED A NEW CLASS OF DEFENSIVE
STRATEGIES THAT WOULD FORCE ADVERSARIES TO CONTINUALLY ENGAGE IN
RECONNAISSANCE AND RE-PLANNING OF THEIR CYBER OPERATIONS. ONE SUCH
STRATEGY IS TO PRESENT ADVERSARIES WITH A MOVING TARGET WHERE THE ATTACK
SURFACE OF A SYSTEM KEEPS CHANGING. MOVING TARGET DEFENSE II:
APPLICATION OF GAME THEORY AND ADVERSARIAL MODELING INCLUDES
CONTRIBUTIONS FROM WORLD EXPERTS IN THE CYBER SECURITY FIELD. IN THE
FIRST VOLUME OF MTD, WE PRESENTED MTD APPROACHES BASED ON SOFTWARE
TRANSFORMATIONS, AND MTD APPROACHES BASED ON NETWORK AND SOFTWARE STACK
CONFIGURATIONS. IN THISSECOND VOLUME OF MTD, A GROUP OF LEADING
RESEARCHERS DESCRIBE GAME THEORETIC, CYBER MANEUVER, AND SOFTWARE
TRANSFORMATION APPROACHES FOR CONSTRUCTING AND ANALYZING MTD SYSTEMS.
DESIGNED AS A PROFESSIONAL BOOK FOR PRACTITIONERS AND RESEARCHERS
WORKING IN THE CYBER SECURITY FIELD, ADVANCED -LEVEL STUDENTS AND
RESEARCHERS FOCUSED ON COMPUTER SCIENCE WILL ALSO FIND THIS BOOK
VALUABLE AS A SECONDARY TEXT BOOK OR REFERENCE
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author_GND | (DE-588)120551683 |
building | Verbundindex |
bvnumber | BV040512867 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 230 |
collection | ZDB-2-SCS |
ctrlnum | (OCoLC)812052241 (DE-599)GBV728221926 |
discipline | Informatik |
doi_str_mv | 10.1007/978-1-4614-5416-8 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03335nmm a2200601 cb4500</leader><controlfield tag="001">BV040512867</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20130117 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">121030s2013 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781461454168</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-461-45416-8</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-1-461-45416-8</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)812052241</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)GBV728221926</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 230</subfield><subfield code="0">(DE-625)143617:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Moving Target Defense II</subfield><subfield code="b">application of Game Theory and Adversarial Modeling</subfield><subfield code="c">Sushil Jajodia ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XII, 203 S.)</subfield><subfield code="b">Ill., graph Darst., Kt.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Advances in Information Security</subfield><subfield code="v">100</subfield></datafield><datafield tag="533" ind1=" " ind2=" "><subfield code="a">Online-Ausgabe</subfield><subfield code="e">Online-Ressource</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwareschwachstelle</subfield><subfield code="0">(DE-588)4752508-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwareschutz</subfield><subfield code="0">(DE-588)4131649-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Softwareschwachstelle</subfield><subfield code="0">(DE-588)4752508-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Softwareschutz</subfield><subfield code="0">(DE-588)4131649-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jajodia, Sushil</subfield><subfield code="d">1947-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)120551683</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Reproduktion von</subfield><subfield code="t">Moving Target Defense II</subfield><subfield code="d">2013</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-1-461-45415-1</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Advances in Information Security</subfield><subfield code="v">100</subfield><subfield code="w">(DE-604)BV022281064</subfield><subfield code="9">100</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-1-4614-5416-8</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025359359&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025359359&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-025359359</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-5416-8</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-5416-8</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-5416-8</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-5416-8</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-5416-8</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-5416-8</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-5416-8</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-5416-8</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-5416-8</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-5416-8</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-5416-8</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV040512867 |
illustrated | Illustrated |
indexdate | 2024-07-10T00:25:27Z |
institution | BVB |
isbn | 9781461454168 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-025359359 |
oclc_num | 812052241 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-M347 DE-20 DE-703 DE-Aug4 DE-92 DE-29 DE-859 DE-634 DE-739 DE-355 DE-BY-UBR |
owner_facet | DE-473 DE-BY-UBG DE-M347 DE-20 DE-703 DE-Aug4 DE-92 DE-29 DE-859 DE-634 DE-739 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (XII, 203 S.) Ill., graph Darst., Kt. |
psigel | ZDB-2-SCS |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Springer |
record_format | marc |
series | Advances in Information Security |
series2 | Advances in Information Security |
spelling | Moving Target Defense II application of Game Theory and Adversarial Modeling Sushil Jajodia ... (eds.) New York, NY [u.a.] Springer 2013 1 Online-Ressource (XII, 203 S.) Ill., graph Darst., Kt. txt rdacontent c rdamedia cr rdacarrier Advances in Information Security 100 Online-Ausgabe Online-Ressource Softwareschwachstelle (DE-588)4752508-3 gnd rswk-swf Softwareschutz (DE-588)4131649-6 gnd rswk-swf (DE-588)4143413-4 Aufsatzsammlung gnd-content Softwareschwachstelle (DE-588)4752508-3 s Softwareschutz (DE-588)4131649-6 s DE-604 Jajodia, Sushil 1947- Sonstige (DE-588)120551683 oth Reproduktion von Moving Target Defense II 2013 Erscheint auch als Druckausgabe 978-1-461-45415-1 Advances in Information Security 100 (DE-604)BV022281064 100 https://doi.org/10.1007/978-1-4614-5416-8 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025359359&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025359359&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Moving Target Defense II application of Game Theory and Adversarial Modeling Advances in Information Security Softwareschwachstelle (DE-588)4752508-3 gnd Softwareschutz (DE-588)4131649-6 gnd |
subject_GND | (DE-588)4752508-3 (DE-588)4131649-6 (DE-588)4143413-4 |
title | Moving Target Defense II application of Game Theory and Adversarial Modeling |
title_auth | Moving Target Defense II application of Game Theory and Adversarial Modeling |
title_exact_search | Moving Target Defense II application of Game Theory and Adversarial Modeling |
title_full | Moving Target Defense II application of Game Theory and Adversarial Modeling Sushil Jajodia ... (eds.) |
title_fullStr | Moving Target Defense II application of Game Theory and Adversarial Modeling Sushil Jajodia ... (eds.) |
title_full_unstemmed | Moving Target Defense II application of Game Theory and Adversarial Modeling Sushil Jajodia ... (eds.) |
title_short | Moving Target Defense II |
title_sort | moving target defense ii application of game theory and adversarial modeling |
title_sub | application of Game Theory and Adversarial Modeling |
topic | Softwareschwachstelle (DE-588)4752508-3 gnd Softwareschutz (DE-588)4131649-6 gnd |
topic_facet | Softwareschwachstelle Softwareschutz Aufsatzsammlung |
url | https://doi.org/10.1007/978-1-4614-5416-8 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025359359&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025359359&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV022281064 |
work_keys_str_mv | AT jajodiasushil movingtargetdefenseiiapplicationofgametheoryandadversarialmodeling |