000 | 05709nam a22006975i 4500 | ||
---|---|---|---|
001 | 978-3-319-68711-7 | ||
003 | DE-He213 | ||
005 | 20210120143323.0 | ||
007 | cr nn 008mamaa | ||
008 | 171003s2017 gw | s |||| 0|eng d | ||
020 |
_a9783319687117 _9978-3-319-68711-7 |
||
024 | 7 |
_a10.1007/978-3-319-68711-7 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aDecision and Game Theory for Security _h[electronic resource] : _b8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings / _cedited by Stefan Rass, Bo An, Christopher Kiekintveld, Fei Fang, Stefan Schauer. |
250 | _a1st ed. 2017. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2017. |
|
300 |
_aXI, 534 p. 137 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology ; _v10575 _aLecture Notes in Computer Science _v10575 |
|
505 | 0 | _aGame theory and mechanism design for security and privacy -- Pricing and economic incentives for building dependable and secure systems -- Dynamic control, learning, and optimization and approximation techniques -- Decision making and decision theory for cybersecurity and security requirements engineering -- Socio-technological and behavioral approaches to security -- Risk assessment and risk management -- Security investment and cyber insurance -- Security and privacy for the Internet-of-Things (IoT), cyber-physical systems, resilient control systems -- New approaches for security and privacy in cloud computing and for critical infrastructure -- Security and privacy of wireless and mobile communications, including user location privacy -- Game theory for intrusion detection -- Empirical and experimental studies with game-theoretic or optimization analysis for security and privacy. | |
520 | _aThis book constitutes the refereed proceedings of the 8th International Conference on Decision and Game Theory for Security, GameSec 2017, held in Vienna, Austria, in October 2017. The 24 revised full papers presented together with 4 short papers were carefully reviewed and selected from 71 submissions. The papers address topics such as Game theory and mechanism design for security and privacy; Pricing and economic incentives for building dependable and secure systems; Dynamic control, learning, and optimization and approximation techniques; Decision making and decision theory for cybersecurity and security requirements engineering; Socio-technological and behavioral approaches to security; Risk assessment and risk management; Security investment and cyber insurance; Security and privacy for the Internet-of-Things (IoT), cyber-physical systems, resilient control systems; New approaches for security and privacy in cloud computing and for critical infrastructure; Security and privacy of wireless and mobile communications, including user location privacy; Game theory for intrusion detection; and Empirical and experimental studies with game-theoretic or optimization analysis for security and privacy. | ||
650 | 0 | _aComputer security. | |
650 | 0 | _aApplication software. | |
650 | 0 | _aComputer communication systems. | |
650 | 0 | _aAlgorithms. | |
650 | 0 | _aManagement information systems. | |
650 | 0 | _aComputer science. | |
650 | 0 | _aGame theory. | |
650 | 1 | 4 |
_aSystems and Data Security. _0https://scigraph.springernature.com/ontologies/product-market-codes/I28060 |
650 | 2 | 4 |
_aInformation Systems Applications (incl. Internet). _0https://scigraph.springernature.com/ontologies/product-market-codes/I18040 |
650 | 2 | 4 |
_aComputer Communication Networks. _0https://scigraph.springernature.com/ontologies/product-market-codes/I13022 |
650 | 2 | 4 |
_aAlgorithm Analysis and Problem Complexity. _0https://scigraph.springernature.com/ontologies/product-market-codes/I16021 |
650 | 2 | 4 |
_aManagement of Computing and Information Systems. _0https://scigraph.springernature.com/ontologies/product-market-codes/I24067 |
650 | 2 | 4 |
_aGame Theory, Economics, Social and Behav. Sciences. _0https://scigraph.springernature.com/ontologies/product-market-codes/M13011 |
700 | 1 |
_aRass, Stefan. _eeditor. _0(orcid)0000-0003-2821-2489 _1https://orcid.org/0000-0003-2821-2489 _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aAn, Bo. _eeditor. _0(orcid)0000-0002-7064-7438 _1https://orcid.org/0000-0002-7064-7438 _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aKiekintveld, Christopher. _eeditor. _0(orcid)0000-0003-0615-9584 _1https://orcid.org/0000-0003-0615-9584 _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aFang, Fei. _eeditor. _0(orcid)0000-0003-2256-8329 _1https://orcid.org/0000-0003-2256-8329 _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aSchauer, Stefan. _eeditor. _0(orcid)0000-0003-4446-9081 _1https://orcid.org/0000-0003-4446-9081 _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783319687100 |
776 | 0 | 8 |
_iPrinted edition: _z9783319687124 |
830 | 0 |
_aSecurity and Cryptology ; _v10575 |
|
830 | 0 |
_aLecture Notes in Computer Science ; _v10575 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-319-68711-7 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cEBK | ||
999 |
_c57419 _d57419 |