Skip to main navigation
Skip to search
Skip to main content
Teesside University's Research Portal Home
Home
Profiles
Research units
TeesRep
Student theses
Projects
Datasets
Press/Media
Search by expertise, name or affiliation
Automated Game-Theoretic Verification of Security Systems
Chunyan Mu
Centre for Digital Innovation
Research output
:
Chapter in Book/Report/Conference proceeding
›
Conference contribution
275
Downloads (Pure)
Overview
Fingerprint
Fingerprint
Dive into the research topics of 'Automated Game-Theoretic Verification of Security Systems'. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Keyphrases
Game Analysis
100%
Security Verification
100%
Verification Method
100%
Security System
100%
Automated Verification
50%
Communication Networks
50%
Security Level
50%
Nash Equilibrium
50%
Quantitative Properties
50%
Formal Analysis
50%
Anonymity
50%
Communication Systems
50%
Game Theoretic Approach
50%
Temporal Logic
50%
PRISM Model Checker
50%
Parametric Markov Chain
50%
Stable Strategy
50%
Utility Function
50%
Anonymity Protocols
50%
Probabilistic Verification
50%
Communication Cost
50%
Computer Science
Anonymity
100%
Security Systems
100%
Communication Network
50%
Temporal Logic
50%
model checker
50%
Nash Equilibrium
50%
Communication Cost
50%
Theoretic Approach
50%
Utility Function
50%
Markov Chain
50%