| 000 | 04233nam a22005895i 4500 | ||
|---|---|---|---|
| 001 | 978-3-642-17197-0 | ||
| 003 | DE-He213 | ||
| 005 | 20140220084550.0 | ||
| 007 | cr nn 008mamaa | ||
| 008 | 101122s2010 gw | s |||| 0|eng d | ||
| 020 |
_a9783642171970 _9978-3-642-17197-0 |
||
| 024 | 7 |
_a10.1007/978-3-642-17197-0 _2doi |
|
| 050 | 4 | _aQA76.9.A25 | |
| 072 | 7 |
_aURY _2bicssc |
|
| 072 | 7 |
_aCOM053000 _2bisacsh |
|
| 082 | 0 | 4 |
_a005.82 _223 |
| 100 | 1 |
_aAlpcan, Tansu. _eeditor. |
|
| 245 | 1 | 0 |
_aDecision and Game Theory for Security _h[electronic resource] : _bFirst International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings / _cedited by Tansu Alpcan, Levente Buttyán, John S. Baras. |
| 264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c2010. |
|
| 300 |
_aX, 281p. 60 illus. _bonline resource. |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 347 |
_atext file _bPDF _2rda |
||
| 490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v6442 |
|
| 505 | 0 | _aSecurity Investments and Planning -- Design of Network Topology in an Adversarial Environment -- Optimal Information Security Investment with Penetration Testing -- Privacy and Anonymity -- Tracking Games in Mobile Networks -- gPath: A Game-Theoretic Path Selection Algorithm to Protect Tor’s Anonymity -- When Do Firms Invest in Privacy-Preserving Technologies? -- Adversarial and Robust Control -- Adversarial Control in a Delay Tolerant Network -- Security Interdependencies for Networked Control Systems with Identical Agents -- Robust Control in Sparse Mobile Ad-Hoc Networks -- Network Security and Botnets -- A Game-Theoretical Approach for Finding Optimal Strategies in a Botnet Defense Model -- ISPs and Ad Networks Against Botnet Ad Fraud -- A Localization Game in Wireless Sensor Networks -- Effective Multimodel Anomaly Detection Using Cooperative Negotiation -- Authorization and Authentication -- The Password Game: Negative Externalities from Weak Password Practices -- Towards a Game Theoretic Authorisation Model -- Theory and Algorithms for Security -- Disperse or Unite? A Mathematical Model of Coordinated Attack -- Uncertainty in Interdependent Security Games -- Attack–Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent -- Methods and Algorithms for Infinite Bayesian Stackelberg Security Games. | |
| 520 | _aThis book constitutes the refereed proceedings of the First International Conference on Decision and Game Theory for Security, GameSec 2010, held in Berlin, Germany, in November 2010. The 12 revised full papers and 6 revised short papers presented were carefully reviewed and selected from numerous submissions and focus on analytical models based on game, information, communication, optimization, decision, and control theories that are applied to diverse security topics. The papers are organized in topical sections on security investments and planning, privacy and anonymity, adversarial and robust control, network security and botnets, authorization and authentication, as well as theory and algorithms for security. | ||
| 650 | 0 | _aComputer science. | |
| 650 | 0 | _aComputer Communication Networks. | |
| 650 | 0 | _aData protection. | |
| 650 | 0 | _aData encryption (Computer science). | |
| 650 | 0 | _aComputer software. | |
| 650 | 0 | _aInformation Systems. | |
| 650 | 0 | _aMathematics. | |
| 650 | 1 | 4 | _aComputer Science. |
| 650 | 2 | 4 | _aData Encryption. |
| 650 | 2 | 4 | _aComputer Communication Networks. |
| 650 | 2 | 4 | _aSystems and Data Security. |
| 650 | 2 | 4 | _aAlgorithm Analysis and Problem Complexity. |
| 650 | 2 | 4 | _aManagement of Computing and Information Systems. |
| 650 | 2 | 4 | _aGame Theory, Economics, Social and Behav. Sciences. |
| 700 | 1 |
_aButtyán, Levente. _eeditor. |
|
| 700 | 1 |
_aBaras, John S. _eeditor. |
|
| 710 | 2 | _aSpringerLink (Online service) | |
| 773 | 0 | _tSpringer eBooks | |
| 776 | 0 | 8 |
_iPrinted edition: _z9783642171963 |
| 830 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v6442 |
|
| 856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-642-17197-0 |
| 912 | _aZDB-2-SCS | ||
| 912 | _aZDB-2-LNC | ||
| 999 |
_c112896 _d112896 |
||