01288nam0-22003971i-450-99000622586040332120160202110951.0000622586FED01000622586(Aleph)000622586FED0100062258620000112d1972----km-u0itay50------baitagery-------001yy<<L'>>imperialismo e l'accumulazione del capitaleNikolaj I. Bucharintraduzione di Giorgio Backhausprefazione di Paolo Santi1. ed.Roma ; BariLaterza1972XXX, 165 p.21 cmLibri del tempo Laterza1252001<<Der >>imperialismus und die akkumulation des kapitals201192635453327.1335.4311 rid.itaBucharin,Nikolaj Ivanovic<1888-1938>173898Santi,Paolo<1934-2001>Backhaus,GiorgioITUNINARICAUNIMARCBK990006225860403321XXI COLL. 15 (125)110817FGBCXI C B 48DFD325.32 BUC 2Bibl. 2015/630FLFBCFGBCDFDFLFBCImperialismus und die Akkumulation des Kapitals35453UNINA02862nam 22006015 450 991104770960332120251012130359.03-032-08064-910.1007/978-3-032-08064-6(MiAaPQ)EBC32343009(Au-PeEL)EBL32343009(CKB)41621571400041(DE-He213)978-3-032-08064-6(EXLCZ)994162157140004120251012d2026 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierGame Theory and AI for Security 16th International Conference, GameSec 2025, Athens, Greece, October 13–15, 2025, Proceedings, Part I /edited by John S. Baras, Symeon Papavassiliou, Eirini Eleni Tsiropoulou, Muhammed O. Sayin1st ed. 2026.Cham :Springer Nature Switzerland :Imprint: Springer,2026.1 online resource (696 pages)Lecture Notes in Computer Science,1611-3349 ;162233-032-08063-0 Game-theoretic foundations and learning -- game-theoretic cybersecurity frameworks -- deception and adversarial defense -- AI and LLMs in security.The two-volume set LNCS 16223 + 16224 constitutes the refereed proceedings of the 16th International Conference on Decision and Game Theory for Security, GameSec 2025, which took place in Athens, Greece, in October 2025. The 35 full papers and 3 short papers included in the proceedings were carefully reviewed and selected from 51 submissions. They were organized in topical sections as follows: Part I: Game-theoretic foundations and learning; game-theoretic cybersecurity frameworks; deception and adversarial defense; AI and LLMs in security; Part II: Strategic defense and robustness; applicatiouns in security and networks; emerging threats and anomaly detection. .Lecture Notes in Computer Science,1611-3349 ;16223Data protectionComputer networksArtificial intelligenceData and Information SecurityComputer Communication NetworksArtificial IntelligenceData protection.Computer networks.Artificial intelligence.Data and Information Security.Computer Communication Networks.Artificial Intelligence.005.8Baras John S1398289Papavassiliou Symeon1860710Tsiropoulou Eirini Eleni1829567Sayin Muhammed O1860711MiAaPQMiAaPQMiAaPQBOOK9911047709603321Game Theory and AI for Security4466456UNINA