000 04361nam a22006375i 4500
001 978-3-030-01554-1
003 DE-He213
005 20240423125308.0
007 cr nn 008mamaa
008 180925s2018 sz | s |||| 0|eng d
020 _a9783030015541
_9978-3-030-01554-1
024 7 _a10.1007/978-3-030-01554-1
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
245 1 0 _aDecision and Game Theory for Security
_h[electronic resource] :
_b9th International Conference, GameSec 2018, Seattle, WA, USA, October 29–31, 2018, Proceedings /
_cedited by Linda Bushnell, Radha Poovendran, Tamer Başar.
250 _a1st ed. 2018.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2018.
300 _aXIII, 638 p. 174 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v11199
505 0 _aUse of game theory -- Control theory and mechanism design for security and privacy -- Decision making for cybersecurity and security requirements engineering -- Security and privacy for the Internet-of-Things -- Cyber-physical systems -- cloud computing -- Resilient control systems, and critical infrastructure -- Pricing -- Economic incentives -- Security investments, and cyber insurance for dependable and secure systems -- Risk assessment and security risk management -- Security and privacy of wireless and mobile communications, including user location privacy -- Sociotechnological and behavioral approaches to security -- Deceptive technologies in cybersecurity and privacy -- Empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy -- Adversarial machine learning and crowdsourcing, and the role of artificial intelligence in system security.
520 _aThe 28 revised full papers presented together with 8 short papers were carefully reviewed and selected from 44 submissions. Among the topical areas covered were: use of game theory; control theory; and mechanism design for security and privacy; decision making for cybersecurity and security requirements engineering; security and privacy for the Internet-of-Things; cyber-physical systems; cloud computing; resilient control systems, and critical infrastructure; pricing; economic incentives; security investments, and cyber insurance for dependable and secure systems; risk assessment and security risk management; security and privacy of wireless and mobile communications, including user location privacy; sociotechnological and behavioral approaches to security; deceptive technologies in cybersecurity and privacy; empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy; and adversarial machine learning and crowdsourcing, and the role of artificial intelligence in system security.
650 0 _aData protection.
650 0 _aArtificial intelligence.
650 0 _aComputer networks .
650 0 _aApplication software.
650 0 _aElectronic commerce.
650 1 4 _aData and Information Security.
650 2 4 _aArtificial Intelligence.
650 2 4 _aComputer Communication Networks.
650 2 4 _aComputer and Information Systems Applications.
650 2 4 _ae-Commerce and e-Business.
700 1 _aBushnell, Linda.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aPoovendran, Radha.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aBaşar, Tamer.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030015534
776 0 8 _iPrinted edition:
_z9783030015558
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v11199
856 4 0 _uhttps://doi.org/10.1007/978-3-030-01554-1
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cSPRINGER
999 _c176399
_d176399