101. Combinatorial game theory
Author: Siegel, Aaron N., 7791-
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Game theory,، Combinatorial analysis
Classification :
QA
269
.
S53C6
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
102. Competition, Collusion, and Game Theory
Author: Telser,Lester G.
Library: Library of Mofid University (Qom)
Subject:
Classification :
HD
41
.
T4
C6
1972
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
103. Competition, collusion, and game theory
Author: / Lester G. Telser
Library: Central Library and Archive Center of shahid Beheshti University (Tehran)
Subject: Competition - Mathematical models,Prices - Mathematical models
Classification :
338
.
6048
Te-C
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
104. Computational aspects of cooperative game theory
Author: / Georgios Chalkiadakis
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: ENGINEERING (uncategorised)&COMPUTER SCIENCE
Classification :
E-BOOK
![](/design/images/bookmore.png)
105. Cooperative game theory tools in coalitional control networks.
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject:
![](/design/images/bookmore.png)
106. Craig A. Anderson, Douglas A. Gentile, Katherine E. Buckley-Violent Video Game Effects on Children
Author:
Library: Central Library Yasuj University (Kohgiluye va Buyer ahmad)
Subject:
![](/design/images/bookmore.png)
107. Criteria and Game Theory Approaches-Applications of Multi
Author: / Claude Hennet, Manoj Kumar Tiwari-Lyes Benyoucef, Jean
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: ENGINEERING, MANUFACTURING
Classification :
E-BOOK
![](/design/images/bookmore.png)
108. Decision and Game Theory for Security
Author: / MHR Khouzani, Emmanouil Panaousis, George Theodorakopoulos
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: METHODS&COMPUTER SCIENCE, INFORMATION TECHNOLOGY|COMPUTER SCIENCE, THEORY
Classification :
E-BOOK
![](/design/images/bookmore.png)
109. Decision and Game Theory for Security
Author: / John S. Baras, Jonathan Katz, Eitan Altman
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: METHODS&COMPUTER SCIENCE, INFORMATION TECHNOLOGY|COMPUTER SCIENCE, THEORY
Classification :
E-BOOK
![](/design/images/bookmore.png)
110. Decision and Game Theory for Security
Author: / Radha Poovendran, Walid Saad
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: METHODS&COMPUTER SCIENCE, INFORMATION TECHNOLOGY|COMPUTER SCIENCE, THEORY
Classification :
E-BOOK
![](/design/images/bookmore.png)
111. Decision and Game Theory for Security
Author: / Rotaru, Murat Kantarcioglu-Sajal K. Das, Cristina Nita
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: METHODS&COMPUTER SCIENCE, INFORMATION TECHNOLOGY|COMPUTER SCIENCE, THEORY
Classification :
E-BOOK
![](/design/images/bookmore.png)
112. Decision and Game Theory for Security
Author: / n, John S. BarasعTansu Alpcan, Levente Butty
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: METHODS&COMPUTER SCIENCE, INFORMATION TECHNOLOGY|COMPUTER SCIENCE, THEORY
Classification :
E-BOOK
![](/design/images/bookmore.png)
113. Decision and Game Theory for Security
Author: / Jens Grossklags, Jean Walrand
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: METHODS&COMPUTER SCIENCE, INFORMATION TECHNOLOGY|COMPUTER SCIENCE, THEORY
Classification :
E-BOOK
![](/design/images/bookmore.png)
114. Decision and Game Theory for Security.
Author: \ MHR Khouzani , Emmanouil Panaousis, George Theodorakopoulos (Eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer science,کامپیوتر,a05,a05,Computer security --Congresses,Game theory -- Congresses.,کامپیوترها -- ایمنی اطلاعات -- کنگرهها ,نظریه بازی -- کنگره ها
Classification :
QA
76
.
9
.
D4
2015
E-Book
,
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
115. Decision and Game Theory in Management With Intuitionistic Fuzzy Sets
Author: / Feng Li-Deng
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: CONTROL SYSTEMS& METHODS|AUTOMATION &COMPUTER SCIENCE, THEORY
Classification :
E-BOOK
![](/design/images/bookmore.png)
116. Decision and Game Theory in Management with Intuitionistic Fuzzy Sets
Author: \ Deng-Feng Li
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Fuzzy decision making,Fuzzy sets,Game theory
Classification :
E-Book
,
![](/design/images/bookmore.png)
117. Decision and game theory for securit
Author: / Tansu Alpcan, Levente Buttyaan, John S. Baras (eds.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks, Security measures, Congresses,Decision making, Congresses,Game theory, Congresses,Electronic books., local
![](/design/images/bookmore.png)
118. Decision and game theory for security :
Author: Linda Bushnell, Radha Poovendran, Tamer Başar (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Game theory, Congresses.,Artificial intelligence.,Business applications.,Computer security.,Computer security.,Computers-- Electronic Commerce.,Computers-- Hardware-- Network Hardware.,Computers-- Information Technology.,Computers-- Intelligence (AI) & Semantics.,Computers-- Security-- General.,Game theory.,Information retrieval.,Network hardware.
Classification :
QA76
.
76
.
A65
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
119. Decision and game theory for security :
Author: Jens Grossklags ... (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Eindringerkennung.,Kryptoanalyse.,Netzwerktopologie.
Classification :
TK5105
.
59
J467
2012
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
120. Decision and game theory for security :
Author: John S. Baras, Jonathan Katz, Eitan Altman (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Game theory, Congresses
Classification :
QA76
.
9
.
A25
G36
2011
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)