000947063 000__ 00907cam\a2200325M\\4500 000947063 001__ 947063 000947063 005__ 20230306152650.0 000947063 006__ m\\\\\o\\d\\\\\\\\ 000947063 007__ cr\un\nnnunnun 000947063 008__ 201229s2021\\\\xx\\\\\\o\\\\\0||\0\eng\d 000947063 020__ $$a9783030647933$$q(electronic book) 000947063 020__ $$a3030647935$$q(electronic book) 000947063 020__ $$z3030647927 000947063 020__ $$z9783030647926 000947063 035__ $$aSP(OCoLC)on1238200778 000947063 035__ $$aSP(OCoLC)1238200778 000947063 040__ $$aYDX$$beng$$cYDX 000947063 049__ $$aISEA 000947063 24500 $$aDECISION AND GAME THEORY FOR SECURITY:$$b11th international conference, gamesec. 000947063 260__ $$a[S.l.] :$$bSPRINGER NATURE,$$c2021. 000947063 300__ $$a1 online resource 000947063 336__ $$atext$$btxt$$2rdacontent 000947063 337__ $$acomputer$$bc$$2rdamedia 000947063 338__ $$aonline resource$$bcr$$2rdacarrier 000947063 506__ $$aAccess limited to authorized users. 000947063 77608 $$iPrint version:$$z3030647927$$z9783030647926$$w(OCoLC)1202745740 000947063 852__ $$bebk 000947063 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-030-64793-3$$zOnline Access$$91397441.1 000947063 909CO $$ooai:library.usi.edu:947063$$pGLOBAL_SET 000947063 980__ $$aEBOOK 000947063 980__ $$aBIB 000947063 982__ $$aEbook 000947063 983__ $$aOnline 000947063 994__ $$a92$$bISE