Decision and Game Theory for Security
Springer International Publishing (Verlag)
978-3-319-68710-0 (ISBN)
The 24 revised full papers presented together with 4 short papers were carefully reviewed and selected from 71 submissions.The papers address topics such as Game theory and mechanism design for security and privacy; Pricing and economic incentives for building dependable and secure systems; Dynamic control, learning, and optimization and approximation techniques; Decision making and decision theory for cybersecurity and security requirements engineering; Socio-technological and behavioral approaches to security; Risk assessment and risk management; Security investment and cyber insurance; Security and privacy for the Internet-of-Things (IoT), cyber-physical systems, resilient control systems; New approaches for security and privacy in cloud computing and for critical infrastructure; Security and privacy of wireless and mobile communications, including user location privacy; Game theory for intrusion detection; and Empirical and experimental studies with game-theoretic or optimization analysis for security and privacy.
Game theory and mechanism design for security and privacy.- Pricing and economic incentives for building dependable and secure systems.- Dynamic control, learning, and optimization and approximation techniques.- Decision making and decision theory for cybersecurity and security requirements engineering.- Socio-technological and behavioral approaches to security.- Risk assessment and risk management.- Security investment and cyber insurance.- Security and privacy for the Internet-of-Things (IoT), cyber-physical systems, resilient control systems.- New approaches for security and privacy in cloud computing and for critical infrastructure.- Security and privacy of wireless and mobile communications, including user location privacy.- Game theory for intrusion detection.- Empirical and experimental studies with game-theoretic or optimization analysis for security and privacy.
| Erscheinungsdatum | 06.10.2017 |
|---|---|
| Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
| Zusatzinfo | XI, 534 p. 137 illus. |
| Verlagsort | Cham |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Gewicht | 819 g |
| Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
| Schlagworte | Algorithm analysis and problem complexity • Algorithms & Data Structures • Algorithms & data structures • Artificial Intelligence • Computer Communication Networks • computer crime • Computer Science • Computer Security • cyber insurance • Data Security • Decision Making • Game Theory • Game Theory, Economics, Social and Behav. Sciences • green security • information architecture • Information Retrieval • information systems applications (incl. internet) • infrastructure security • Internet of Things (IoT) • Internet Searching • Learning Algorithms • machine learning • Maintenance & repairs • Maintenance & repairs • malwares • management of computing and information systems • network hardware • Network Security • privacy • Probability • risk assessment • Risk Management • security • security investment • systems and data security • Telecommunication networks |
| ISBN-10 | 3-319-68710-7 / 3319687107 |
| ISBN-13 | 978-3-319-68710-0 / 9783319687100 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich