UNDERLINE DOI: https://doi.org/10.48448/yxd6-g181
technical paper
Decoding the Imitation Security Game: Handling Attacker Imitative Behavior Deception
Would you like to see your presentation here, made available to a global audience of researchers?
Add your own presentation or have us affordably record your next conference.

