File list
This special page shows all uploaded files.
Date | Name | Thumbnail | Size | User | Description | Versions |
---|---|---|---|---|---|---|
08:26, 30 August 2017 | Iotsec 0817.pdf (file) | 1.24 MB | Peder.Aursand | We demonstrate how evolutionary game theory can be used to model confidentiality in an advanced metering infrastructure. Theory is introduced and an example case study is presented. | 1 |