Decision and Game Theory for Security 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29–31, 2018, Proceedings
tarafından
 
Bushnell, Linda. editor. (orcid)0000-0002-8751-2409

Başlık
Decision and Game Theory for Security 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29–31, 2018, Proceedings

Yazar
Bushnell, Linda. editor. (orcid)0000-0002-8751-2409

ISBN
9783030015541

Edisyon
1st ed. 2018.

Fiziksel Niteleme
XIII, 638 p. 174 illus. online resource.

Seri
Security and Cryptology ; 11199

İçindekiler
Use of game theory -- Control theory and mechanism design for security and privacy -- Decision making for cybersecurity and security requirements engineering -- Security and privacy for the Internet-of-Things -- Cyber-physical systems -- cloud computing -- Resilient control systems, and critical infrastructure -- Pricing -- Economic incentives -- Security investments, and cyber insurance for dependable and secure systems -- Risk assessment and security risk management -- Security and privacy of wireless and mobile communications, including user location privacy -- Sociotechnological and behavioral approaches to security -- Deceptive technologies in cybersecurity and privacy -- Empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy -- Adversarial machine learning and crowdsourcing, and the role of artificial intelligence in system security.

Özet
The 28 revised full papers presented together with 8 short papers were carefully reviewed and selected from 44 submissions. Among the topical areas covered were: use of game theory; control theory; and mechanism design for security and privacy; decision making for cybersecurity and security requirements engineering; security and privacy for the Internet-of-Things; cyber-physical systems; cloud computing; resilient control systems, and critical infrastructure; pricing; economic incentives; security investments, and cyber insurance for dependable and secure systems; risk assessment and security risk management; security and privacy of wireless and mobile communications, including user location privacy; sociotechnological and behavioral approaches to security; deceptive technologies in cybersecurity and privacy; empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy; and adversarial machine learning and crowdsourcing, and the role of artificial intelligence in system security.

Konu Başlığı
Computer security.
 
Artificial intelligence.
 
Computer Communication Networks.
 
Systems and Data Security. http://scigraph.springernature.com/things/product-market-codes/I28060
 
Artificial Intelligence. http://scigraph.springernature.com/things/product-market-codes/I21000
 
Computer Communication Networks. http://scigraph.springernature.com/things/product-market-codes/I13022
 
Information Systems Applications (incl. Internet). http://scigraph.springernature.com/things/product-market-codes/I18040
 
e-Commerce/e-business. http://scigraph.springernature.com/things/product-market-codes/I26000

Yazar Ek Girişi
Bushnell, Linda.
 
Poovendran, Radha.
 
Başar, Tamer.

Ek Kurum Yazar
SpringerLink (Online service)

Elektronik Erişim
https://doi.org/10.1007/978-3-030-01554-1


Materyal TürüBarkodYer NumarasıDurumu/İade Tarihi
Electronic Book221242-1001QA76.9 .A25Springer E-Book Collection