Decision and Game Theory for Security: 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings: Lecture Notes in Computer Science, cartea 10575
Editat de Stefan Rass, Bo An, Christopher Kiekintveld, Fei Fang, Stefan Schaueren Limba Engleză Paperback – 4 oct 2017
This book constitutes the refereed proceedings of the 8th International Conference on Decision and Game Theory for Security, GameSec 2017, held in Vienna, Austria, in October 2017.
The 24 revised full papers presented together with 4 short papers were carefully reviewed and selected from 71 submissions.
The papers address topics such as Game theory and mechanism design for security and privacy; Pricing and economic incentives for building dependable and secure systems; Dynamic control, learning, and optimization and approximation techniques; Decision making and decision theory for cybersecurity and security requirements engineering; Socio-technological and behavioral approaches to security; Risk assessment and risk management; Security investment and cyber insurance; Security and privacy for the Internet-of-Things (IoT), cyber-physical systems, resilient control systems; New approaches for security and privacy in cloud computing and for critical infrastructure; Security and privacy of wireless and mobile communications, including user location privacy; Game theory for intrusion detection; and Empirical and experimental studies with game-theoretic or optimization analysis for security and privacy.
Din seria Lecture Notes in Computer Science
- 20% Preț: 1061.55 lei
- 20% Preț: 307.71 lei
- 20% Preț: 438.69 lei
- 20% Preț: 645.28 lei
- Preț: 410.88 lei
- 15% Preț: 580.46 lei
- 17% Preț: 427.22 lei
- 20% Preț: 596.46 lei
- Preț: 381.21 lei
- 20% Preț: 353.50 lei
- 20% Preț: 1414.79 lei
- 20% Preț: 309.90 lei
- 20% Preț: 583.40 lei
- 20% Preț: 1075.26 lei
- 20% Preț: 310.26 lei
- 20% Preț: 655.02 lei
- 20% Preț: 580.93 lei
- 20% Preț: 340.32 lei
- 15% Preț: 438.59 lei
- 20% Preț: 591.51 lei
- 20% Preț: 649.49 lei
- 20% Preț: 337.00 lei
- Preț: 449.57 lei
- 20% Preț: 607.39 lei
- 20% Preț: 1024.44 lei
- 20% Preț: 579.30 lei
- 20% Preț: 763.23 lei
- 20% Preț: 453.32 lei
- 20% Preț: 575.48 lei
- 20% Preț: 585.88 lei
- 20% Preț: 825.93 lei
- 20% Preț: 763.23 lei
- 17% Preț: 360.19 lei
- 20% Preț: 1183.14 lei
- 20% Preț: 340.32 lei
- 20% Preț: 504.57 lei
- 20% Preț: 369.12 lei
- 20% Preț: 583.40 lei
- 20% Preț: 343.62 lei
- 20% Preț: 350.21 lei
- 20% Preț: 764.89 lei
- 20% Preț: 583.40 lei
- Preț: 389.48 lei
- 20% Preț: 341.95 lei
- 20% Preț: 238.01 lei
- 20% Preț: 538.29 lei
Preț: 344.76 lei
Preț vechi: 430.94 lei
-20% Nou
Puncte Express: 517
Preț estimativ în valută:
65.98€ • 68.46$ • 55.15£
65.98€ • 68.46$ • 55.15£
Carte tipărită la comandă
Livrare economică 17-31 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783319687100
ISBN-10: 3319687107
Pagini: 534
Ilustrații: XI, 534 p. 137 illus.
Dimensiuni: 155 x 235 mm
Greutate: 0.76 kg
Ediția:1st ed. 2017
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
ISBN-10: 3319687107
Pagini: 534
Ilustrații: XI, 534 p. 137 illus.
Dimensiuni: 155 x 235 mm
Greutate: 0.76 kg
Ediția:1st ed. 2017
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
Cuprins
Game theory and mechanism design for security and privacy.- Pricing and economic incentives for building dependable and secure systems.- Dynamic control, learning, and optimization and approximation techniques.- Decision making and decision theory for cybersecurity and security requirements engineering.- Socio-technological and behavioral approaches to security.- Risk assessment and risk management.- Security investment and cyber insurance.- Security and privacy for the Internet-of-Things (IoT), cyber-physical systems, resilient control systems.- New approaches for security and privacy in cloud computing and for critical infrastructure.- Security and privacy of wireless and mobile communications, including user location privacy.- Game theory for intrusion detection.- Empirical and experimental studies with game-theoretic or optimization analysis for security and privacy.
Caracteristici
Includes supplementary material: sn.pub/extras