Decision and Game Theory for Security: 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014, Proceedings: Lecture Notes in Computer Science, cartea 8840
Editat de Radha Poovendran, Walid Saaden Limba Engleză Paperback – 13 oct 2014
The 16 revised full papers presented together with 7 short papers were carefully reviewed and selected from numerous submissions. The covered topics cover multiple facets of cyber security that include: rationality of adversary, game-theoretic cryptographic techniques, vulnerability discovery and assessment, multi-goal security analysis, secure computation, economic-oriented security, and surveillance for security. Those aspects are covered in a multitude of domains that include networked systems, wireless communications, border patrol security, and control systems.
Din seria Lecture Notes in Computer Science
- 20%
Preț: 400.77 lei - 20%
Preț: 754.11 lei - 20%
Preț: 324.19 lei - 20%
Preț: 373.80 lei - 20%
Preț: 342.61 lei - 20%
Preț: 403.00 lei - 20%
Preț: 573.45 lei -
Preț: 395.25 lei - 20%
Preț: 487.46 lei - 20%
Preț: 355.27 lei - 20%
Preț: 731.97 lei - 20%
Preț: 293.24 lei - 20%
Preț: 669.21 lei - 20%
Preț: 984.64 lei - 20%
Preț: 620.33 lei - 20%
Preț: 336.86 lei - 20%
Preț: 330.54 lei - 20%
Preț: 313.87 lei - 20%
Preț: 679.09 lei - 20%
Preț: 373.16 lei - 20%
Preț: 782.57 lei - 20%
Preț: 434.17 lei - 20%
Preț: 489.11 lei - 20%
Preț: 904.16 lei - 20%
Preț: 375.72 lei - 20%
Preț: 400.17 lei - 20%
Preț: 432.78 lei - 20%
Preț: 631.96 lei - 20%
Preț: 432.11 lei - 20%
Preț: 1359.66 lei - 20%
Preț: 556.96 lei - 20%
Preț: 488.90 lei - 20%
Preț: 560.93 lei - 20%
Preț: 327.36 lei - 20%
Preț: 340.04 lei - 20%
Preț: 327.36 lei - 20%
Preț: 328.94 lei - 20%
Preț: 629.71 lei - 20%
Preț: 568.70 lei - 20%
Preț: 447.31 lei - 20%
Preț: 733.68 lei - 20%
Preț: 315.26 lei - 20%
Preț: 315.62 lei - 20%
Preț: 1020.28 lei - 20%
Preț: 850.42 lei - 20%
Preț: 1391.87 lei - 20%
Preț: 519.32 lei
Preț: 324.50 lei
Preț vechi: 405.63 lei
-20%
Puncte Express: 487
Preț estimativ în valută:
57.44€ • 66.72$ • 49.76£
57.44€ • 66.72$ • 49.76£
Carte tipărită la comandă
Livrare economică 02-16 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783319126005
ISBN-10: 3319126008
Pagini: 396
Ilustrații: XII, 381 p. 83 illus.
Dimensiuni: 155 x 235 x 21 mm
Greutate: 0.55 kg
Ediția:2014
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
ISBN-10: 3319126008
Pagini: 396
Ilustrații: XII, 381 p. 83 illus.
Dimensiuni: 155 x 235 x 21 mm
Greutate: 0.55 kg
Ediția:2014
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
Public țintă
ResearchCuprins
Defending Against Opportunistic Criminals: New Game-Theoretic Frameworks and Algorithms.- Addressing Scalability and Robustness in Security Games with Multiple Boundedly Rational Adversaries.- Empirical Game-Theoretic Analysis of an Adaptive Cyber-Defense Scenario.- Strategic Discovery and Sharing of Vulnerabilities in Competitive Environments.- Optimal Contracts for Outsourced Computation.- A Supervisory Control Approach to Dynamic Cyber-Security.- Numerical Computation of Multi-goal Security Strategies.- Realizable Rational Multiparty Cryptographic Protocols.- Limiting Adversarial Budget in Quantitative Security Assessment.- FlipThem: Modeling Targeted Attacks with FlipIt for Multiple Resources.- Secure Message Delivery Games for Device-to-Device Communications.- A Three-Stage Colonel Blotto Game: When to Provide More Information to an Adversary.- TowardOptimal Network Topology Design for Fast and Secure Distributed Computation.- An Economic Model and Simulation Results of App Adoption Decisions on Networks with Interdependent Privacy Consequences.- Cybersecurity Games and Investments: A Decision Support Approach.- Data Integrity and Availability Verification Game in Untrusted Cloud Storage.- Empirical Comparisons of Descriptive Multi-objective Adversary Models in Stackelberg Security Games.- A Dynamic Bayesian Security Game Framework for Strategic Defense Mechanism Design.- Can Less Be More? A Game-Theoretic Analysis of Filtering vs. Investment.- Online Learning Methods for Border Patrol Resource Allocation.- A Distributed Optimization Algorithm for Attack-Resilient Wide-Area Monitoring of Power Systems: Theoretical and Experimental Methods.- Testing for Hardware Trojans: A Game-Theoretic Approach.- Surveillance for Security as a Pursuit-Evasion Game.