Decision and Game Theory for Security 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings
tarafından
 
Rass, Stefan. editor. (orcid)0000-0003-2821-2489

Başlık
Decision and Game Theory for Security 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings

Yazar
Rass, Stefan. editor. (orcid)0000-0003-2821-2489

ISBN
9783319687117

Edisyon
1st ed. 2017.

Fiziksel Niteleme
XI, 534 p. 137 illus. online resource.

Seri
Security and Cryptology ; 10575

İçindekiler
Game theory and mechanism design for security and privacy -- Pricing and economic incentives for building dependable and secure systems -- Dynamic control, learning, and optimization and approximation techniques -- Decision making and decision theory for cybersecurity and security requirements engineering -- Socio-technological and behavioral approaches to security -- Risk assessment and risk management -- Security investment and cyber insurance -- Security and privacy for the Internet-of-Things (IoT), cyber-physical systems, resilient control systems -- New approaches for security and privacy in cloud computing and for critical infrastructure -- Security and privacy of wireless and mobile communications, including user location privacy -- Game theory for intrusion detection -- Empirical and experimental studies with game-theoretic or optimization analysis for security and privacy.

Özet
This book constitutes the refereed proceedings of the 8th International Conference on Decision and Game Theory for Security, GameSec 2017, held in Vienna, Austria, in October 2017. The 24 revised full papers presented together with 4 short papers were carefully reviewed and selected from 71 submissions. The papers address topics such as Game theory and mechanism design for security and privacy; Pricing and economic incentives for building dependable and secure systems; Dynamic control, learning, and optimization and approximation techniques; Decision making and decision theory for cybersecurity and security requirements engineering; Socio-technological and behavioral approaches to security; Risk assessment and risk management; Security investment and cyber insurance; Security and privacy for the Internet-of-Things (IoT), cyber-physical systems, resilient control systems; New approaches for security and privacy in cloud computing and for critical infrastructure; Security and privacy of wireless and mobile communications, including user location privacy; Game theory for intrusion detection; and Empirical and experimental studies with game-theoretic or optimization analysis for security and privacy.

Konu Başlığı
Computer security.
 
Computer Communication Networks.
 
Computer software.
 
Information Systems.
 
Mathematics.
 
Systems and Data Security. http://scigraph.springernature.com/things/product-market-codes/I28060
 
Information Systems Applications (incl. Internet). http://scigraph.springernature.com/things/product-market-codes/I18040
 
Computer Communication Networks. http://scigraph.springernature.com/things/product-market-codes/I13022
 
Algorithm Analysis and Problem Complexity. http://scigraph.springernature.com/things/product-market-codes/I16021
 
Management of Computing and Information Systems. http://scigraph.springernature.com/things/product-market-codes/I24067
 
Game Theory, Economics, Social and Behav. Sciences. http://scigraph.springernature.com/things/product-market-codes/M13011

Yazar Ek Girişi
Rass, Stefan.
 
An, Bo.
 
Kiekintveld, Christopher.
 
Fang, Fei.
 
Schauer, Stefan.

Ek Kurum Yazar
SpringerLink (Online service)

Elektronik Erişim
https://doi.org/10.1007/978-3-319-68711-7


Materyal TürüBarkodYer NumarasıDurumu/İade Tarihi
Electronic Book225700-1001QA76.9 .A25Springer E-Book Collection