Benutzerdefiniertes Cover
Benutzerdefiniertes Cover
Normale Ansicht MARC-Ansicht ISBD

Decision and Game Theory for Security : 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29–31, 2018, Proceedings / edited by Linda Bushnell, Radha Poovendran, Tamer Başar

Mitwirkende(r): Resource type: Ressourcentyp: Buch (Online)Buch (Online)Sprache: Englisch Reihen: Security and Cryptology ; 11199 | SpringerLink BücherVerlag: Cham : Springer International Publishing, 2018Beschreibung: Online-Ressource (XIII, 638 p. 174 illus, online resource)ISBN:
  • 9783030015541
Schlagwörter: Andere physische Formen: 9783030015534 | 9783030015558 | Erscheint auch als: 978-3-030-01553-4 Druck-Ausgabe | Printed edition: 9783030015534 | Printed edition: 9783030015558 DDC-Klassifikation:
  • 005.8
MSC: MSC: *68-06 | 68P25 | 91A80 | 00B25LOC-Klassifikation:
  • QA76.9.A25
DOI: DOI: 10.1007/978-3-030-01554-1Online-Ressourcen: Zusammenfassung: The 28 revised full papers presented together with 8 short papers were carefully reviewed and selected from 44 submissions. Among the topical areas covered were: use of game theory; control theory; and mechanism design for security and privacy; decision making for cybersecurity and security requirements engineering; security and privacy for the Internet-of-Things; cyber-physical systems; cloud computing; resilient control systems, and critical infrastructure; pricing; economic incentives; security investments, and cyber insurance for dependable and secure systems; risk assessment and security risk management; security and privacy of wireless and mobile communications, including user location privacy; sociotechnological and behavioral approaches to security; deceptive technologies in cybersecurity and privacy; empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy; and adversarial machine learning and crowdsourcing, and the role of artificial intelligence in system securityZusammenfassung: Use of game theory -- Control theory and mechanism design for security and privacy -- Decision making for cybersecurity and security requirements engineering -- Security and privacy for the Internet-of-Things -- Cyber-physical systems -- cloud computing -- Resilient control systems, and critical infrastructure -- Pricing -- Economic incentives -- Security investments, and cyber insurance for dependable and secure systems -- Risk assessment and security risk management -- Security and privacy of wireless and mobile communications, including user location privacy -- Sociotechnological and behavioral approaches to security -- Deceptive technologies in cybersecurity and privacy -- Empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy -- Adversarial machine learning and crowdsourcing, and the role of artificial intelligence in system securityPPN: PPN: 1038688574Package identifier: Produktsigel: ZDB-2-LNC | ZDB-2-SCS | ZDB-2-SXCS | ZDB-2-SEB
Dieser Titel hat keine Exemplare

Reproduktion. (Springer eBook Collection. Computer Science)