Decision and Game Theory for Security
Security Investments and Planning.- Design of Network Topology in an Adversarial Environment.- Optimal Information Security Investment with Penetration Testing.- Privacy and Anonymity.- Tracking Games in Mobile Networks.- gPath: A Game-Theoretic Path Selection Algorithm to Protect Tor's Anonymity.- When Do Firms Invest in Privacy-Preserving Technologies?.- Adversarial and Robust Control.- Adversarial Control in a Delay Tolerant Network.- Security Interdependencies for Networked Control Systems with Identical Agents.- Robust Control in Sparse Mobile Ad-Hoc Networks.- Network Security and Botnets.- A Game-Theoretical Approach for Finding Optimal Strategies in a Botnet Defense Model.- ISPs and Ad Networks Against Botnet Ad Fraud.- A Localization Game in Wireless Sensor Networks.- Effective Multimodel Anomaly Detection Using Cooperative Negotiation.- Authorization and Authentication.- The Password Game: Negative Externalities from Weak Password Practices.- Towards a Game Theoretic Authorisation Model.- Theory and Algorithms for Security.- Disperse or Unite? A Mathematical Model of Coordinated Attack.- Uncertainty in Interdependent Security Games.- Attack-Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent.- Methods and Algorithms for Infinite Bayesian Stackelberg Security Games.
| Erscheint lt. Verlag | 16.11.2010 |
|---|---|
| Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
| Zusatzinfo | X, 281 p. 60 illus. |
| Verlagsort | Berlin |
| Sprache | englisch |
| Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
| Schlagworte | Algorithm analysis and problem complexity • algorithms • approximate algorithms • Game Theory • Information Security • Networked control systems • Optimization • security |
| ISBN-13 | 9783642171963 / 9783642171963 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich