Search dblp for Publications

export results for "toc:db/conf/gamesec/gamesec2014.bht:"

 download as .bib file

@inproceedings{DBLP:conf/gamesec/BhattacharyaBF14,
  author       = {Sourabh Bhattacharya and
                  Tamer Basar and
                  Maurizio Falcone},
  editor       = {Radha Poovendran and
                  Walid Saad},
  title        = {Surveillance for Security as a Pursuit-Evasion Game},
  booktitle    = {Decision and Game Theory for Security - 5th International Conference,
                  GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8840},
  pages        = {370--379},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12601-2\_23},
  doi          = {10.1007/978-3-319-12601-2\_23},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/BhattacharyaBF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/BrownHT14,
  author       = {Matthew Brown and
                  William B. Haskell and
                  Milind Tambe},
  editor       = {Radha Poovendran and
                  Walid Saad},
  title        = {Addressing Scalability and Robustness in Security Games with Multiple
                  Boundedly Rational Adversaries},
  booktitle    = {Decision and Game Theory for Security - 5th International Conference,
                  GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8840},
  pages        = {23--42},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12601-2\_2},
  doi          = {10.1007/978-3-319-12601-2\_2},
  timestamp    = {Mon, 30 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/BrownHT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/CuiJ14,
  author       = {Jinshu Cui and
                  Richard S. John},
  editor       = {Radha Poovendran and
                  Walid Saad},
  title        = {Empirical Comparisons of Descriptive Multi-objective Adversary Models
                  in Stackelberg Security Games},
  booktitle    = {Decision and Game Theory for Security - 5th International Conference,
                  GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8840},
  pages        = {309--318},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12601-2\_17},
  doi          = {10.1007/978-3-319-12601-2\_17},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/CuiJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/DjebailiKLC14,
  author       = {Brahim Djebaili and
                  Christophe Kiennert and
                  Jean Leneutre and
                  Lin Chen},
  editor       = {Radha Poovendran and
                  Walid Saad},
  title        = {Data Integrity and Availability Verification Game in Untrusted Cloud
                  Storage},
  booktitle    = {Decision and Game Theory for Security - 5th International Conference,
                  GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8840},
  pages        = {287--306},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12601-2\_16},
  doi          = {10.1007/978-3-319-12601-2\_16},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/DjebailiKLC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/FarhangMEZ14,
  author       = {Sadegh Farhang and
                  Mohammad Hossein Manshaei and
                  Milad Nasr Esfahani and
                  Quanyan Zhu},
  editor       = {Radha Poovendran and
                  Walid Saad},
  title        = {A Dynamic Bayesian Security Game Framework for Strategic Defense Mechanism
                  Design},
  booktitle    = {Decision and Game Theory for Security - 5th International Conference,
                  GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8840},
  pages        = {319--328},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12601-2\_18},
  doi          = {10.1007/978-3-319-12601-2\_18},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/FarhangMEZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/GuptaBS14,
  author       = {Abhishek Gupta and
                  Tamer Basar and
                  Galina A. Schwartz},
  editor       = {Radha Poovendran and
                  Walid Saad},
  title        = {A Three-Stage Colonel Blotto Game: When to Provide More Information
                  to an Adversary},
  booktitle    = {Decision and Game Theory for Security - 5th International Conference,
                  GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8840},
  pages        = {216--233},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12601-2\_12},
  doi          = {10.1007/978-3-319-12601-2\_12},
  timestamp    = {Wed, 25 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/GuptaBS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/KamhouaRK14,
  author       = {Charles A. Kamhoua and
                  Manuel Rodr{\'{\i}}guez and
                  Kevin A. Kwiat},
  editor       = {Radha Poovendran and
                  Walid Saad},
  title        = {Testing for Hardware Trojans: {A} Game-Theoretic Approach},
  booktitle    = {Decision and Game Theory for Security - 5th International Conference,
                  GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8840},
  pages        = {360--369},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12601-2\_22},
  doi          = {10.1007/978-3-319-12601-2\_22},
  timestamp    = {Thu, 29 Mar 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/KamhouaRK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/KhouzaniPC14,
  author       = {M. H. R. Khouzani and
                  Viet Pham and
                  Carlos Cid},
  editor       = {Radha Poovendran and
                  Walid Saad},
  title        = {Strategic Discovery and Sharing of Vulnerabilities in Competitive
                  Environments},
  booktitle    = {Decision and Game Theory for Security - 5th International Conference,
                  GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8840},
  pages        = {59--78},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12601-2\_4},
  doi          = {10.1007/978-3-319-12601-2\_4},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/KhouzaniPC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/KlimaKL14,
  author       = {Richard Kl{\'{\i}}ma and
                  Christopher Kiekintveld and
                  Viliam Lis{\'{y}}},
  editor       = {Radha Poovendran and
                  Walid Saad},
  title        = {Online Learning Methods for Border Patrol Resource Allocation},
  booktitle    = {Decision and Game Theory for Security - 5th International Conference,
                  GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8840},
  pages        = {340--349},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12601-2\_20},
  doi          = {10.1007/978-3-319-12601-2\_20},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/KlimaKL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/LaszkaHFB14,
  author       = {Aron Laszka and
                  G{\'{a}}bor Horv{\'{a}}th and
                  M{\'{a}}rk F{\'{e}}legyh{\'{a}}zi and
                  Levente Butty{\'{a}}n},
  editor       = {Radha Poovendran and
                  Walid Saad},
  title        = {FlipThem: Modeling Targeted Attacks with FlipIt for Multiple Resources},
  booktitle    = {Decision and Game Theory for Security - 5th International Conference,
                  GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8840},
  pages        = {175--194},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12601-2\_10},
  doi          = {10.1007/978-3-319-12601-2\_10},
  timestamp    = {Wed, 25 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/LaszkaHFB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/LeninB14,
  author       = {Aleksandr Lenin and
                  Ahto Buldas},
  editor       = {Radha Poovendran and
                  Walid Saad},
  title        = {Limiting Adversarial Budget in Quantitative Security Assessment},
  booktitle    = {Decision and Game Theory for Security - 5th International Conference,
                  GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8840},
  pages        = {155--174},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12601-2\_9},
  doi          = {10.1007/978-3-319-12601-2\_9},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/LeninB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/LiuB14,
  author       = {Ji Liu and
                  Tamer Basar},
  editor       = {Radha Poovendran and
                  Walid Saad},
  title        = {Toward Optimal Network Topology Design for Fast and Secure Distributed
                  Computation},
  booktitle    = {Decision and Game Theory for Security - 5th International Conference,
                  GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8840},
  pages        = {234--245},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12601-2\_13},
  doi          = {10.1007/978-3-319-12601-2\_13},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/LiuB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/PanaousisAFC14,
  author       = {Emmanouil A. Panaousis and
                  Tansu Alpcan and
                  Hossein Fereidooni and
                  Mauro Conti},
  editor       = {Radha Poovendran and
                  Walid Saad},
  title        = {Secure Message Delivery Games for Device-to-Device Communications},
  booktitle    = {Decision and Game Theory for Security - 5th International Conference,
                  GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8840},
  pages        = {195--215},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12601-2\_11},
  doi          = {10.1007/978-3-319-12601-2\_11},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/PanaousisAFC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/PanaousisFMHS14,
  author       = {Emmanouil A. Panaousis and
                  Andrew Fielder and
                  Pasquale Malacaria and
                  Chris Hankin and
                  Fabrizio Smeraldi},
  editor       = {Radha Poovendran and
                  Walid Saad},
  title        = {Cybersecurity Games and Investments: {A} Decision Support Approach},
  booktitle    = {Decision and Game Theory for Security - 5th International Conference,
                  GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8840},
  pages        = {266--286},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12601-2\_15},
  doi          = {10.1007/978-3-319-12601-2\_15},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/PanaousisFMHS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/PhamKC14,
  author       = {Viet Pham and
                  M. H. R. Khouzani and
                  Carlos Cid},
  editor       = {Radha Poovendran and
                  Walid Saad},
  title        = {Optimal Contracts for Outsourced Computation},
  booktitle    = {Decision and Game Theory for Security - 5th International Conference,
                  GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8840},
  pages        = {79--98},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12601-2\_5},
  doi          = {10.1007/978-3-319-12601-2\_5},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/PhamKC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/PuG14,
  author       = {Yu Pu and
                  Jens Grossklags},
  editor       = {Radha Poovendran and
                  Walid Saad},
  title        = {An Economic Model and Simulation Results of App Adoption Decisions
                  on Networks with Interdependent Privacy Consequences},
  booktitle    = {Decision and Game Theory for Security - 5th International Conference,
                  GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8840},
  pages        = {246--265},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12601-2\_14},
  doi          = {10.1007/978-3-319-12601-2\_14},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/PuG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/RasouliMT14,
  author       = {Mohammad Rasouli and
                  Erik Miehling and
                  Demosthenis Teneketzis},
  editor       = {Radha Poovendran and
                  Walid Saad},
  title        = {A Supervisory Control Approach to Dynamic Cyber-Security},
  booktitle    = {Decision and Game Theory for Security - 5th International Conference,
                  GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8840},
  pages        = {99--117},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12601-2\_6},
  doi          = {10.1007/978-3-319-12601-2\_6},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/RasouliMT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/RassR14,
  author       = {Stefan Rass and
                  Benjamin Rainer},
  editor       = {Radha Poovendran and
                  Walid Saad},
  title        = {Numerical Computation of Multi-goal Security Strategies},
  booktitle    = {Decision and Game Theory for Security - 5th International Conference,
                  GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8840},
  pages        = {118--133},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12601-2\_7},
  doi          = {10.1007/978-3-319-12601-2\_7},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/RassR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/SarabiNL14,
  author       = {Armin Sarabi and
                  Parinaz Naghizadeh and
                  Mingyan Liu},
  editor       = {Radha Poovendran and
                  Walid Saad},
  title        = {Can Less Be More? {A} Game-Theoretic Analysis of Filtering vs. Investment},
  booktitle    = {Decision and Game Theory for Security - 5th International Conference,
                  GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8840},
  pages        = {329--339},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12601-2\_19},
  doi          = {10.1007/978-3-319-12601-2\_19},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/SarabiNL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/WallrabensteinC14,
  author       = {John Ross Wallrabenstein and
                  Chris Clifton},
  editor       = {Radha Poovendran and
                  Walid Saad},
  title        = {Realizable Rational Multiparty Cryptographic Protocols},
  booktitle    = {Decision and Game Theory for Security - 5th International Conference,
                  GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8840},
  pages        = {134--154},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12601-2\_8},
  doi          = {10.1007/978-3-319-12601-2\_8},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/WallrabensteinC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/WellmanP14,
  author       = {Michael P. Wellman and
                  Achintya Prakash},
  editor       = {Radha Poovendran and
                  Walid Saad},
  title        = {Empirical Game-Theoretic Analysis of an Adaptive Cyber-Defense Scenario
                  (Preliminary Report)},
  booktitle    = {Decision and Game Theory for Security - 5th International Conference,
                  GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8840},
  pages        = {43--58},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12601-2\_3},
  doi          = {10.1007/978-3-319-12601-2\_3},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/WellmanP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/ZhangJCH14,
  author       = {Jianhua Zhang and
                  Prateek Jaipuria and
                  Aranya Chakrabortty and
                  Alefiya Hussain},
  editor       = {Radha Poovendran and
                  Walid Saad},
  title        = {A Distributed Optimization Algorithm for Attack-Resilient Wide-Area
                  Monitoring of Power Systems: Theoretical and Experimental Methods},
  booktitle    = {Decision and Game Theory for Security - 5th International Conference,
                  GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8840},
  pages        = {350--359},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12601-2\_21},
  doi          = {10.1007/978-3-319-12601-2\_21},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/ZhangJCH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/ZhangJSBT14,
  author       = {Chao Zhang and
                  Albert Xin Jiang and
                  Martin B. Short and
                  P. Jeffrey Brantingham and
                  Milind Tambe},
  editor       = {Radha Poovendran and
                  Walid Saad},
  title        = {Defending Against Opportunistic Criminals: New Game-Theoretic Frameworks
                  and Algorithms},
  booktitle    = {Decision and Game Theory for Security - 5th International Conference,
                  GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8840},
  pages        = {3--22},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12601-2\_1},
  doi          = {10.1007/978-3-319-12601-2\_1},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/ZhangJSBT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/gamesec/2014,
  editor       = {Radha Poovendran and
                  Walid Saad},
  title        = {Decision and Game Theory for Security - 5th International Conference,
                  GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8840},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12601-2},
  doi          = {10.1007/978-3-319-12601-2},
  isbn         = {978-3-319-12600-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics