Skip to main navigation
Skip to search
Skip to main content
Illinois Experts Home
LOGIN & Help
Link opens in a new tab
Search content at Illinois Experts
Home
Profiles
Research units
Research & Scholarship
Datasets
Honors
Press/Media
Activities
Network security configurations: A nonzero-sum stochastic game approach
Quanyan Zhu
, Hamidou Tembine
,
Tamer Başar
Electrical and Computer Engineering
Coordinated Science Lab
Research output
:
Chapter in Book/Report/Conference proceeding
›
Conference contribution
Overview
Fingerprint
Fingerprint
Dive into the research topics of 'Network security configurations: A nonzero-sum stochastic game approach'. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Keyphrases
Game Approach
100%
Network Security
100%
Stochastic Games
100%
Nonzero-sum
100%
Security Configuration
100%
Detection System
33%
Performance Limits
33%
Information Theory
33%
Nash Equilibrium
33%
Intruder
33%
Payoff
33%
Attacker
33%
Network Intrusion Detection System
33%
Value Iteration
33%
Reconfiguration Problem
33%
Yield Performance
33%
Shannon Capacity
33%
Mathematical Programming Method
33%
Security Target
33%
Security Capacity
33%
Stationary Nash Equilibrium
33%
Simultaneous Attack
33%
Computer Science
Network Security
100%
Security Configuration
100%
Nash Equilibrium
66%
Attackers
33%
Intrusion Detection System
33%
Information Theory
33%
Shannon Capacity
33%
Mathematical Programming
33%