BibTeX record conf/paisi/LisyP13

download as .bib file

@inproceedings{DBLP:conf/paisi/LisyP13,
  author    = {Viliam Lis{\'{y}} and
               Radek P{\'{\i}}bil},
  title     = {Computing Optimal Attack Strategies Using Unconstrained Influence
               Diagrams},
  booktitle = {Intelligence and Security Informatics - Pacific Asia Workshop, {PAISI}
               2013, Beijing, China, August 3, 2013. Proceedings},
  pages     = {38--46},
  year      = {2013},
  crossref  = {DBLP:conf/paisi/2013},
  url       = {https://doi.org/10.1007/978-3-642-39693-9\_5},
  doi       = {10.1007/978-3-642-39693-9\_5},
  timestamp = {Sun, 02 Jun 2019 21:18:02 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/paisi/LisyP13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/paisi/2013,
  editor    = {G. Alan Wang and
               Xiaolong Zheng and
               Michael Chau and
               Hsinchun Chen},
  title     = {Intelligence and Security Informatics - Pacific Asia Workshop, {PAISI}
               2013, Beijing, China, August 3, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8039},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-39693-9},
  doi       = {10.1007/978-3-642-39693-9},
  isbn      = {978-3-642-39692-2},
  timestamp = {Tue, 14 May 2019 10:00:49 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/paisi/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics