Decision and Game Theory for Security: 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014, Proceedings: Lecture Notes in Computer Science, cartea 8840
Editat de Radha Poovendran, Walid Saaden Limba Engleză Paperback – 13 oct 2014
The 16 revised full papers presented together with 7 short papers were carefully reviewed and selected from numerous submissions. The covered topics cover multiple facets of cyber security that include: rationality of adversary, game-theoretic cryptographic techniques, vulnerability discovery and assessment, multi-goal security analysis, secure computation, economic-oriented security, and surveillance for security. Those aspects are covered in a multitude of domains that include networked systems, wireless communications, border patrol security, and control systems.
Din seria Lecture Notes in Computer Science
- 20%
Preț: 323.14 lei - 20%
Preț: 461.32 lei - 20%
Preț: 460.98 lei - 20%
Preț: 390.41 lei - 20%
Preț: 526.98 lei - 15%
Preț: 388.21 lei - 20%
Preț: 461.21 lei - 20%
Preț: 390.08 lei - 20%
Preț: 496.30 lei - 20%
Preț: 461.21 lei - 20%
Preț: 389.45 lei - 15%
Preț: 461.53 lei - 20%
Preț: 389.63 lei - 20%
Preț: 496.68 lei - 20%
Preț: 461.70 lei - 20%
Preț: 251.97 lei - 20%
Preț: 390.86 lei - 20%
Preț: 532.16 lei - 20%
Preț: 461.52 lei - 20%
Preț: 255.72 lei - 20%
Preț: 498.10 lei - 20%
Preț: 497.19 lei - 20%
Preț: 499.02 lei - 20%
Preț: 389.82 lei - 20%
Preț: 390.92 lei - 20%
Preț: 390.86 lei - 20%
Preț: 390.92 lei - 20%
Preț: 390.08 lei - 20%
Preț: 461.45 lei - 20%
Preț: 392.36 lei - 20%
Preț: 460.75 lei - 20%
Preț: 461.32 lei - 20%
Preț: 389.90 lei - 20%
Preț: 639.26 lei - 20%
Preț: 390.66 lei - 20%
Preț: 391.57 lei - 20%
Preț: 389.57 lei - 20%
Preț: 497.97 lei - 20%
Preț: 462.36 lei - 20%
Preț: 460.67 lei - 20%
Preț: 423.95 lei - 5%
Preț: 515.91 lei - 15%
Preț: 535.55 lei - 20%
Preț: 531.90 lei - 20%
Preț: 403.00 lei - 20%
Preț: 535.41 lei - 20%
Preț: 461.25 lei - 20%
Preț: 498.17 lei - 20%
Preț: 461.52 lei - 20%
Preț: 249.77 lei
Preț: 324.50 lei
Preț vechi: 405.63 lei
-20%
Puncte Express: 487
Preț estimativ în valută:
57.43€ • 67.12$ • 49.86£
57.43€ • 67.12$ • 49.86£
Carte tipărită la comandă
Livrare economică 20 februarie-06 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783319126005
ISBN-10: 3319126008
Pagini: 396
Ilustrații: XII, 381 p. 83 illus.
Dimensiuni: 155 x 235 x 21 mm
Greutate: 0.55 kg
Ediția:2014
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
ISBN-10: 3319126008
Pagini: 396
Ilustrații: XII, 381 p. 83 illus.
Dimensiuni: 155 x 235 x 21 mm
Greutate: 0.55 kg
Ediția:2014
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
Public țintă
ResearchCuprins
Defending Against Opportunistic Criminals: New Game-Theoretic Frameworks and Algorithms.- Addressing Scalability and Robustness in Security Games with Multiple Boundedly Rational Adversaries.- Empirical Game-Theoretic Analysis of an Adaptive Cyber-Defense Scenario.- Strategic Discovery and Sharing of Vulnerabilities in Competitive Environments.- Optimal Contracts for Outsourced Computation.- A Supervisory Control Approach to Dynamic Cyber-Security.- Numerical Computation of Multi-goal Security Strategies.- Realizable Rational Multiparty Cryptographic Protocols.- Limiting Adversarial Budget in Quantitative Security Assessment.- FlipThem: Modeling Targeted Attacks with FlipIt for Multiple Resources.- Secure Message Delivery Games for Device-to-Device Communications.- A Three-Stage Colonel Blotto Game: When to Provide More Information to an Adversary.- TowardOptimal Network Topology Design for Fast and Secure Distributed Computation.- An Economic Model and Simulation Results of App Adoption Decisions on Networks with Interdependent Privacy Consequences.- Cybersecurity Games and Investments: A Decision Support Approach.- Data Integrity and Availability Verification Game in Untrusted Cloud Storage.- Empirical Comparisons of Descriptive Multi-objective Adversary Models in Stackelberg Security Games.- A Dynamic Bayesian Security Game Framework for Strategic Defense Mechanism Design.- Can Less Be More? A Game-Theoretic Analysis of Filtering vs. Investment.- Online Learning Methods for Border Patrol Resource Allocation.- A Distributed Optimization Algorithm for Attack-Resilient Wide-Area Monitoring of Power Systems: Theoretical and Experimental Methods.- Testing for Hardware Trojans: A Game-Theoretic Approach.- Surveillance for Security as a Pursuit-Evasion Game.