Decision and Game Theory for Security: 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29–31, 2018, Proceedings: Lecture Notes in Computer Science, cartea 11199
Editat de Linda Bushnell, Radha Poovendran, Tamer Başaren Limba Engleză Paperback – 26 sep 2018
The 28 revised full papers presented together with 8 short papers were carefully reviewed and selected from 44 submissions.
Among the topical areas covered were: use of game theory; control theory; and mechanism design for security and privacy; decision making for cybersecurity and security requirements engineering; security and privacy for the Internet-of-Things; cyber-physical systems; cloud computing; resilient control systems, and critical infrastructure; pricing; economic incentives; security investments, and cyber insurance for dependable and secure systems; risk assessment and security risk management; security and privacy of wireless and mobile communications, including user location privacy; sociotechnological and behavioral approaches to security; deceptive technologies in cybersecurity and privacy; empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy; and adversarial machine learning and crowdsourcing, and the role of artificial intelligence in system security.
Din seria Lecture Notes in Computer Science
- 20%
Preț: 426.75 lei - 20%
Preț: 315.62 lei - 20%
Preț: 320.92 lei - 15%
Preț: 426.53 lei - 20%
Preț: 313.87 lei - 20%
Preț: 355.79 lei - 20%
Preț: 355.54 lei - 20%
Preț: 355.18 lei - 20%
Preț: 390.68 lei - 20%
Preț: 392.03 lei - 20%
Preț: 498.95 lei - 20%
Preț: 390.79 lei - 20%
Preț: 495.44 lei - 20%
Preț: 498.80 lei - 20%
Preț: 498.50 lei - 20%
Preț: 355.93 lei - 20%
Preț: 639.52 lei - 20%
Preț: 499.90 lei - 20%
Preț: 498.95 lei - 20%
Preț: 270.68 lei - 20%
Preț: 321.68 lei - 20%
Preț: 391.36 lei - 20%
Preț: 322.09 lei - 20%
Preț: 498.90 lei - 20%
Preț: 312.82 lei - 20%
Preț: 496.73 lei - 20%
Preț: 463.03 lei - 20%
Preț: 531.75 lei - 15%
Preț: 496.40 lei - 20%
Preț: 497.25 lei - 20%
Preț: 498.80 lei - 20%
Preț: 461.86 lei - 20%
Preț: 355.59 lei - 20%
Preț: 324.19 lei -
Preț: 418.19 lei - 20%
Preț: 498.59 lei - 20%
Preț: 391.28 lei - 20%
Preț: 355.69 lei - 15%
Preț: 499.72 lei - 20%
Preț: 499.40 lei - 20%
Preț: 390.42 lei - 20%
Preț: 497.75 lei - 20%
Preț: 326.81 lei - 20%
Preț: 322.32 lei - 20%
Preț: 390.42 lei - 20%
Preț: 458.84 lei - 20%
Preț: 427.09 lei - 20%
Preț: 499.90 lei - 20%
Preț: 320.72 lei
Preț: 336.73 lei
Preț vechi: 420.91 lei
-20% Nou
Puncte Express: 505
Preț estimativ în valută:
59.59€ • 69.49$ • 52.32£
59.59€ • 69.49$ • 52.32£
Carte tipărită la comandă
Livrare economică 15-29 ianuarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783030015534
ISBN-10: 303001553X
Pagini: 620
Ilustrații: XIII, 638 p. 174 illus.
Dimensiuni: 155 x 235 mm
Greutate: 0.9 kg
Ediția:1st ed. 2018
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
ISBN-10: 303001553X
Pagini: 620
Ilustrații: XIII, 638 p. 174 illus.
Dimensiuni: 155 x 235 mm
Greutate: 0.9 kg
Ediția:1st ed. 2018
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
Cuprins
Use of game theory.- Control theory and mechanism design for security and privacy.- Decision making for cybersecurity and security requirements engineering.- Security and privacy for the Internet-of-Things.- Cyber-physical systems.- cloud computing.- Resilient control systems, and critical infrastructure.- Pricing.- Economic incentives.- Security investments, and cyber insurance for dependable and secure systems.- Risk assessment and security risk management.- Security and privacy of wireless and mobile communications, including user location privacy.- Sociotechnological and behavioral approaches to security.- Deceptive technologies in cybersecurity and privacy.- Empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy.- Adversarial machine learning and crowdsourcing, and the role of artificial intelligence in system security.