Cantitate/Preț
Produs

Decision and Game Theory for Security: 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29–31, 2018, Proceedings: Lecture Notes in Computer Science, cartea 11199

Editat de Linda Bushnell, Radha Poovendran, Tamer Başar
en Limba Engleză Paperback – 26 sep 2018
The 28 revised full papers presented together with 8 short papers were carefully reviewed and selected from 44 submissions.
Among the topical areas covered were: use of game theory; control theory; and mechanism design for security and privacy; decision making for cybersecurity and security requirements engineering; security and privacy for the Internet-of-Things; cyber-physical systems; cloud computing; resilient control systems, and critical infrastructure; pricing; economic incentives; security investments, and cyber insurance for dependable and secure systems; risk assessment and security risk management; security and privacy of wireless and mobile communications, including user location privacy; sociotechnological and behavioral approaches to security; deceptive technologies in cybersecurity and privacy; empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy; and adversarial machine learning and crowdsourcing, and the role of artificial intelligence in system security.

Citește tot Restrânge

Din seria Lecture Notes in Computer Science

Preț: 35005 lei

Preț vechi: 43757 lei
-20% Nou

Puncte Express: 525

Preț estimativ în valută:
6699 6911$ 5670£

Carte tipărită la comandă

Livrare economică 04-18 martie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783030015534
ISBN-10: 303001553X
Pagini: 620
Ilustrații: XIII, 638 p. 174 illus.
Dimensiuni: 155 x 235 mm
Greutate: 0.9 kg
Ediția:1st ed. 2018
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Cham, Switzerland

Cuprins

Use of game theory.- Control theory and mechanism design for security and privacy.- Decision making for cybersecurity and security requirements engineering.- Security and privacy for the Internet-of-Things.- Cyber-physical systems.- cloud computing.- Resilient control systems, and critical infrastructure.- Pricing.- Economic incentives.- Security investments, and cyber insurance for dependable and secure systems.- Risk assessment and security risk management.- Security and privacy of wireless and mobile communications, including user location privacy.- Sociotechnological and behavioral approaches to security.- Deceptive technologies in cybersecurity and privacy.- Empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy.- Adversarial machine learning and crowdsourcing, and the role of artificial intelligence in system security.