000 04233nam a22005895i 4500
001 978-3-642-17197-0
003 DE-He213
005 20140220084550.0
007 cr nn 008mamaa
008 101122s2010 gw | s |||| 0|eng d
020 _a9783642171970
_9978-3-642-17197-0
024 7 _a10.1007/978-3-642-17197-0
_2doi
050 4 _aQA76.9.A25
072 7 _aURY
_2bicssc
072 7 _aCOM053000
_2bisacsh
082 0 4 _a005.82
_223
100 1 _aAlpcan, Tansu.
_eeditor.
245 1 0 _aDecision and Game Theory for Security
_h[electronic resource] :
_bFirst International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings /
_cedited by Tansu Alpcan, Levente Buttyán, John S. Baras.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c2010.
300 _aX, 281p. 60 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v6442
505 0 _aSecurity Investments and Planning -- Design of Network Topology in an Adversarial Environment -- Optimal Information Security Investment with Penetration Testing -- Privacy and Anonymity -- Tracking Games in Mobile Networks -- gPath: A Game-Theoretic Path Selection Algorithm to Protect Tor’s Anonymity -- When Do Firms Invest in Privacy-Preserving Technologies? -- Adversarial and Robust Control -- Adversarial Control in a Delay Tolerant Network -- Security Interdependencies for Networked Control Systems with Identical Agents -- Robust Control in Sparse Mobile Ad-Hoc Networks -- Network Security and Botnets -- A Game-Theoretical Approach for Finding Optimal Strategies in a Botnet Defense Model -- ISPs and Ad Networks Against Botnet Ad Fraud -- A Localization Game in Wireless Sensor Networks -- Effective Multimodel Anomaly Detection Using Cooperative Negotiation -- Authorization and Authentication -- The Password Game: Negative Externalities from Weak Password Practices -- Towards a Game Theoretic Authorisation Model -- Theory and Algorithms for Security -- Disperse or Unite? A Mathematical Model of Coordinated Attack -- Uncertainty in Interdependent Security Games -- Attack–Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent -- Methods and Algorithms for Infinite Bayesian Stackelberg Security Games.
520 _aThis book constitutes the refereed proceedings of the First International Conference on Decision and Game Theory for Security, GameSec 2010, held in Berlin, Germany, in November 2010. The 12 revised full papers and 6 revised short papers presented were carefully reviewed and selected from numerous submissions and focus on analytical models based on game, information, communication, optimization, decision, and control theories that are applied to diverse security topics. The papers are organized in topical sections on security investments and planning, privacy and anonymity, adversarial and robust control, network security and botnets, authorization and authentication, as well as theory and algorithms for security.
650 0 _aComputer science.
650 0 _aComputer Communication Networks.
650 0 _aData protection.
650 0 _aData encryption (Computer science).
650 0 _aComputer software.
650 0 _aInformation Systems.
650 0 _aMathematics.
650 1 4 _aComputer Science.
650 2 4 _aData Encryption.
650 2 4 _aComputer Communication Networks.
650 2 4 _aSystems and Data Security.
650 2 4 _aAlgorithm Analysis and Problem Complexity.
650 2 4 _aManagement of Computing and Information Systems.
650 2 4 _aGame Theory, Economics, Social and Behav. Sciences.
700 1 _aButtyán, Levente.
_eeditor.
700 1 _aBaras, John S.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783642171963
830 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v6442
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-642-17197-0
912 _aZDB-2-SCS
912 _aZDB-2-LNC
999 _c112896
_d112896