<> <http://www.w3.org/2000/01/rdf-schema#comment> "The repository administrator has not yet configured an RDF license."^^<http://www.w3.org/2001/XMLSchema#string> .
<> <http://xmlns.com/foaf/0.1/primaryTopic> <https://discovery.ucl.ac.uk/id/eprint/10037804> .
<https://discovery.ucl.ac.uk/id/eprint/10037804> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://purl.org/ontology/bibo/AcademicArticle> .
<https://discovery.ucl.ac.uk/id/eprint/10037804> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://purl.org/ontology/bibo/Article> .
<https://discovery.ucl.ac.uk/id/eprint/10037804> <http://purl.org/dc/terms/title> "Toward Realistic Modeling Criteria of Games in Internet Security"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10037804> <http://purl.org/ontology/bibo/abstract> "There have been various attempts to apply game theory to various aspects of security situations. This article is particularly interested in security as relates to computers and the Internet. While there have been varying levels of success in describing different aspects of security in game-theoretic terms, there has been little success in describing the problem on a large scale that would be appropriate for making decisions about enterprise or Internet security policy. This article attempts to provide such a description."^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10037804> <http://purl.org/dc/terms/date> "2014-09-01" .
<https://discovery.ucl.ac.uk/id/document/536033> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://purl.org/ontology/bibo/Document> .
<https://discovery.ucl.ac.uk/id/eprint/10037804> <http://purl.org/ontology/bibo/volume> "2" .
<https://discovery.ucl.ac.uk/id/eprint/10037804> <http://purl.org/ontology/bibo/issue> "2" .
<https://discovery.ucl.ac.uk/id/org/ext-267c024243f645d553f155ce7a70eee4> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Organization> .
<https://discovery.ucl.ac.uk/id/org/ext-267c024243f645d553f155ce7a70eee4> <http://xmlns.com/foaf/0.1/name> "Cyber Security and Information Systems Information Analysis Center"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10037804> <http://purl.org/dc/terms/publisher> <https://discovery.ucl.ac.uk/id/org/ext-267c024243f645d553f155ce7a70eee4> .
<https://discovery.ucl.ac.uk/id/publication/ext-f413f18d6a3bd04fcc269d4898be7aa2> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://purl.org/ontology/bibo/Collection> .
<https://discovery.ucl.ac.uk/id/publication/ext-f413f18d6a3bd04fcc269d4898be7aa2> <http://xmlns.com/foaf/0.1/name> "Journal of Cyber Security and Information Systems"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10037804> <http://purl.org/dc/terms/isPartOf> <https://discovery.ucl.ac.uk/id/publication/ext-f413f18d6a3bd04fcc269d4898be7aa2> .
<https://discovery.ucl.ac.uk/id/eprint/10037804> <http://purl.org/ontology/bibo/status> <http://purl.org/ontology/bibo/status/published> .
<https://discovery.ucl.ac.uk/id/eprint/10037804> <http://purl.org/dc/terms/creator> <https://discovery.ucl.ac.uk/id/person/ext-39429eba5710fd27898782eb124537ea> .
<https://discovery.ucl.ac.uk/id/eprint/10037804> <http://purl.org/ontology/bibo/authorList> <https://discovery.ucl.ac.uk/id/eprint/10037804#authors> .
<https://discovery.ucl.ac.uk/id/eprint/10037804#authors> <http://www.w3.org/1999/02/22-rdf-syntax-ns#_1> <https://discovery.ucl.ac.uk/id/person/ext-39429eba5710fd27898782eb124537ea> .
<https://discovery.ucl.ac.uk/id/person/ext-39429eba5710fd27898782eb124537ea> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://xmlns.com/foaf/0.1/Person> .
<https://discovery.ucl.ac.uk/id/person/ext-39429eba5710fd27898782eb124537ea> <http://xmlns.com/foaf/0.1/givenName> "JM"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-39429eba5710fd27898782eb124537ea> <http://xmlns.com/foaf/0.1/familyName> "Spring"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/person/ext-39429eba5710fd27898782eb124537ea> <http://xmlns.com/foaf/0.1/name> "JM Spring"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10037804> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/EPrint> .
<https://discovery.ucl.ac.uk/id/eprint/10037804> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/ArticleEPrint> .
<https://discovery.ucl.ac.uk/id/eprint/10037804> <http://purl.org/dc/terms/isPartOf> <https://discovery.ucl.ac.uk/id/repository> .
<https://discovery.ucl.ac.uk/id/eprint/10037804> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/536033> .
<https://discovery.ucl.ac.uk/id/document/536033> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> .
<https://discovery.ucl.ac.uk/id/document/536033> <http://www.w3.org/2000/01/rdf-schema#label> "Toward Realistic Modeling Criteria of Games in Internet Security (Text)"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10037804> <http://purl.org/dc/elements/1.1/hasVersion> <https://discovery.ucl.ac.uk/id/document/536033> .
<https://discovery.ucl.ac.uk/id/eprint/10037804> <http://eprints.org/ontology/hasPublished> <https://discovery.ucl.ac.uk/id/document/536033> .
<https://discovery.ucl.ac.uk/id/document/536033> <http://eprints.org/ontology/hasFile> <https://discovery.ucl.ac.uk/id/eprint/10037804/1/spring_2014_games-and-internet-security.pdf> .
<https://discovery.ucl.ac.uk/id/document/536033> <http://purl.org/dc/terms/hasPart> <https://discovery.ucl.ac.uk/id/eprint/10037804/1/spring_2014_games-and-internet-security.pdf> .
<https://discovery.ucl.ac.uk/id/eprint/10037804/1/spring_2014_games-and-internet-security.pdf> <http://www.w3.org/2000/01/rdf-schema#label> "spring_2014_games-and-internet-security.pdf"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/eprint/10037804> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/536034> .
<https://discovery.ucl.ac.uk/id/document/536034> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> .
<https://discovery.ucl.ac.uk/id/document/536034> <http://www.w3.org/2000/01/rdf-schema#label> "Toward Realistic Modeling Criteria of Games in Internet Security (Other)"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/document/536034> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/536033> .
<https://discovery.ucl.ac.uk/id/document/536034> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/536033> .
<https://discovery.ucl.ac.uk/id/document/536034> <http://eprints.org/relation/islightboxThumbnailVersionOf> <https://discovery.ucl.ac.uk/id/document/536033> .
<https://discovery.ucl.ac.uk/id/eprint/10037804> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/536035> .
<https://discovery.ucl.ac.uk/id/document/536035> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> .
<https://discovery.ucl.ac.uk/id/document/536035> <http://www.w3.org/2000/01/rdf-schema#label> "Toward Realistic Modeling Criteria of Games in Internet Security (Other)"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/document/536035> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/536033> .
<https://discovery.ucl.ac.uk/id/document/536035> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/536033> .
<https://discovery.ucl.ac.uk/id/document/536035> <http://eprints.org/relation/ispreviewThumbnailVersionOf> <https://discovery.ucl.ac.uk/id/document/536033> .
<https://discovery.ucl.ac.uk/id/eprint/10037804> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/536036> .
<https://discovery.ucl.ac.uk/id/document/536036> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> .
<https://discovery.ucl.ac.uk/id/document/536036> <http://www.w3.org/2000/01/rdf-schema#label> "Toward Realistic Modeling Criteria of Games in Internet Security (Other)"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/document/536036> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/536033> .
<https://discovery.ucl.ac.uk/id/document/536036> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/536033> .
<https://discovery.ucl.ac.uk/id/document/536036> <http://eprints.org/relation/ismediumThumbnailVersionOf> <https://discovery.ucl.ac.uk/id/document/536033> .
<https://discovery.ucl.ac.uk/id/eprint/10037804> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/536037> .
<https://discovery.ucl.ac.uk/id/document/536037> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> .
<https://discovery.ucl.ac.uk/id/document/536037> <http://www.w3.org/2000/01/rdf-schema#label> "Toward Realistic Modeling Criteria of Games in Internet Security (Other)"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/document/536037> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/536033> .
<https://discovery.ucl.ac.uk/id/document/536037> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/536033> .
<https://discovery.ucl.ac.uk/id/document/536037> <http://eprints.org/relation/issmallThumbnailVersionOf> <https://discovery.ucl.ac.uk/id/document/536033> .
<https://discovery.ucl.ac.uk/id/eprint/10037804> <http://eprints.org/ontology/hasDocument> <https://discovery.ucl.ac.uk/id/document/536038> .
<https://discovery.ucl.ac.uk/id/document/536038> <http://www.w3.org/1999/02/22-rdf-syntax-ns#type> <http://eprints.org/ontology/Document> .
<https://discovery.ucl.ac.uk/id/document/536038> <http://www.w3.org/2000/01/rdf-schema#label> "Toward Realistic Modeling Criteria of Games in Internet Security (Other)"^^<http://www.w3.org/2001/XMLSchema#string> .
<https://discovery.ucl.ac.uk/id/document/536038> <http://eprints.org/relation/isVersionOf> <https://discovery.ucl.ac.uk/id/document/536033> .
<https://discovery.ucl.ac.uk/id/document/536038> <http://eprints.org/relation/isVolatileVersionOf> <https://discovery.ucl.ac.uk/id/document/536033> .
<https://discovery.ucl.ac.uk/id/document/536038> <http://eprints.org/relation/isIndexCodesVersionOf> <https://discovery.ucl.ac.uk/id/document/536033> .
<https://discovery.ucl.ac.uk/id/eprint/10037804> <http://www.w3.org/2000/01/rdf-schema#seeAlso> <https://discovery.ucl.ac.uk/id/eprint/10037804/> .
<https://discovery.ucl.ac.uk/id/eprint/10037804/> <http://purl.org/dc/elements/1.1/title> "HTML Summary of #10037804 \n\nToward Realistic Modeling Criteria of Games in Internet Security\n\n" .
<https://discovery.ucl.ac.uk/id/eprint/10037804/> <http://purl.org/dc/elements/1.1/format> "text/html" .
<https://discovery.ucl.ac.uk/id/eprint/10037804/> <http://xmlns.com/foaf/0.1/primaryTopic> <https://discovery.ucl.ac.uk/id/eprint/10037804> .