Decision and Game Theory for Security: 11th International Conference, GameSec 2020, College Park, MD, USA, October 28–30, 2020, Proceedings: Lecture Notes in Computer Science, cartea 12513
Editat de Quanyan Zhu, John S. Baras, Radha Poovendran, Juntao Chenen Limba Engleză Paperback – 22 dec 2020
Din seria Lecture Notes in Computer Science
- 20%
Preț: 558.53 lei - 20%
Preț: 571.88 lei - 20%
Preț: 675.83 lei - 20%
Preț: 1020.28 lei - 20%
Preț: 620.33 lei - 20%
Preț: 560.93 lei - 20%
Preț: 633.70 lei - 20%
Preț: 678.21 lei - 20%
Preț: 1359.66 lei - 20%
Preț: 560.93 lei - 20%
Preț: 733.68 lei - 20%
Preț: 793.92 lei - 15%
Preț: 558.12 lei - 20%
Preț: 793.92 lei - 20%
Preț: 560.93 lei - 20%
Preț: 748.63 lei - 20%
Preț: 562.49 lei - 20%
Preț: 1246.46 lei - 20%
Preț: 449.81 lei - 20%
Preț: 556.96 lei - 20%
Preț: 562.49 lei - 20%
Preț: 851.78 lei - 20%
Preț: 313.10 lei - 18%
Preț: 945.44 lei - 20%
Preț: 314.86 lei - 20%
Preț: 560.93 lei - 20%
Preț: 313.87 lei - 20%
Preț: 1033.45 lei - 20%
Preț: 563.29 lei - 20%
Preț: 733.68 lei - 20%
Preț: 1137.10 lei - 20%
Preț: 735.28 lei - 20%
Preț: 1079.23 lei - 20%
Preț: 560.11 lei - 20%
Preț: 791.54 lei - 15%
Preț: 672.87 lei - 20%
Preț: 1032.47 lei - 20%
Preț: 617.17 lei - 20%
Preț: 1022.15 lei - 20%
Preț: 984.64 lei - 20%
Preț: 620.33 lei - 20%
Preț: 979.25 lei - 20%
Preț: 402.28 lei - 20%
Preț: 316.28 lei - 20%
Preț: 636.06 lei - 20%
Preț: 320.24 lei - 20%
Preț: 328.94 lei
Preț: 330.85 lei
Preț vechi: 413.56 lei
-20%
Puncte Express: 496
Preț estimativ în valută:
58.50€ • 67.61$ • 50.54£
58.50€ • 67.61$ • 50.54£
Carte tipărită la comandă
Livrare economică 04-18 mai
Specificații
ISBN-13: 9783030647926
ISBN-10: 3030647927
Pagini: 518
Ilustrații: XI, 518 p. 131 illus., 111 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.74 kg
Ediția:1st ed. 2020
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
ISBN-10: 3030647927
Pagini: 518
Ilustrații: XI, 518 p. 131 illus., 111 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.74 kg
Ediția:1st ed. 2020
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
Cuprins
Machine Learning and Security.- Distributed Generative Adversarial Networks for Anomaly Detection.- Learning and Planning in the Feature Deception Problem.- A Realistic Approach for Network Traffic Obfuscation using Adversarial Machine Learning.- Adversarial Deep Reinforcement Learning based Adaptive Moving Target Defense.- Lie Another Day: Demonstrating Bias in a Multi-Round Cyber Deception Game of Questionable Veracity.- Cyber Deception.- Exploiting Bounded Rationality in Risk-based Cyber Camouflage Games.- Farsighted Risk Mitigation of Lateral Movement Using Dynamic Cognitive Honeypots.- Harnessing the Power of Deception in Attack Graph-Based Security Games.- Decoy Allocation Games on Graphs with Temporal Logic Objectives.- Popular Imperceptibility Measures in Visual Adversarial Attacks are Far from Human Perception.- Cyber-Physical System Security.- Secure Discrete-Time Linear-Quadratic Mean-Field Games.- Detection of Dynamically Changing Leaders in Complex Swarms from ObservedDynamic Data.- Moving Target Defense for Robust Monitoring of Electric Grid Transformers in Adversarial Environments.- Security of Network Systems.- Blocking Adversarial Influence in Social Networks.- Normalizing Flow Policies for Multi-agent Systems.- A Game Theoretic Framework for Software Diversity for Network Security.- Partially Observable Stochastic Games for Cyber Deception against Network Epidemic.- Combating Online Counterfeits: A Game-Theoretic Analysis of Cyber Supply Chain Ecosystem.- Theoretic Foundations of Security Games.- On the Characterization of Saddle Point Equilibrium for Security Games with Additive Utility.- MASAGE: Model-Agnostic Sequential and Adaptive Game Estimation.- Using One-Sided Partially Observable Stochastic Games for Solving Zero-Sum Security Games with Sequential Attacks.- A Data-Driven Distributionally Robust Game using Wasserstein Distance.- Security Games over Lexicographic Orders.- Game Theory on Attack Graph for Cyber Deception.- Attacking Machine Learning Models for Social Good.- A Review of Multi Agent Perimeter Defense Games.- Hardware Security and Trust: A New Battlefield of Information.- A Data Mining Friendly Anonymization Scheme for System Logs using Distance Mapping.- Security Games with Insider Threats.- Securing Next-Generation Wireless Networks: Challenges and Opportunities.