Skip to content
T

Transformation AMAS

Hackers vs. Security: Attack-Defence Trees as Asynchronous Multi-Agent Systems