04777nam 22006975 450 991034939790332120200703073110.03-030-01554-810.1007/978-3-030-01554-1(CKB)4100000007110649(DE-He213)978-3-030-01554-1(MiAaPQ)EBC6296898(PPN)231460821(EXLCZ)99410000000711064920180925d2018 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierDecision and Game Theory for Security 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29–31, 2018, Proceedings /edited by Linda Bushnell, Radha Poovendran, Tamer Başar1st ed. 2018.Cham :Springer International Publishing :Imprint: Springer,2018.1 online resource (XIII, 638 p. 174 illus.) Security and Cryptology ;111993-030-01553-X Use of game theory -- Control theory and mechanism design for security and privacy -- Decision making for cybersecurity and security requirements engineering -- Security and privacy for the Internet-of-Things -- Cyber-physical systems -- cloud computing -- Resilient control systems, and critical infrastructure -- Pricing -- Economic incentives -- Security investments, and cyber insurance for dependable and secure systems -- Risk assessment and security risk management -- Security and privacy of wireless and mobile communications, including user location privacy -- Sociotechnological and behavioral approaches to security -- Deceptive technologies in cybersecurity and privacy -- Empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy -- Adversarial machine learning and crowdsourcing, and the role of artificial intelligence in system security.The 28 revised full papers presented together with 8 short papers were carefully reviewed and selected from 44 submissions. Among the topical areas covered were: use of game theory; control theory; and mechanism design for security and privacy; decision making for cybersecurity and security requirements engineering; security and privacy for the Internet-of-Things; cyber-physical systems; cloud computing; resilient control systems, and critical infrastructure; pricing; economic incentives; security investments, and cyber insurance for dependable and secure systems; risk assessment and security risk management; security and privacy of wireless and mobile communications, including user location privacy; sociotechnological and behavioral approaches to security; deceptive technologies in cybersecurity and privacy; empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy; and adversarial machine learning and crowdsourcing, and the role of artificial intelligence in system security.Security and Cryptology ;11199Computer securityArtificial intelligenceComputer communication systemsApplication softwareE-commerceSystems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Artificial Intelligencehttps://scigraph.springernature.com/ontologies/product-market-codes/I21000Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Information Systems Applications (incl. Internet)https://scigraph.springernature.com/ontologies/product-market-codes/I18040e-Commerce/e-businesshttps://scigraph.springernature.com/ontologies/product-market-codes/I26000Computer security.Artificial intelligence.Computer communication systems.Application software.E-commerce.Systems and Data Security.Artificial Intelligence.Computer Communication Networks.Information Systems Applications (incl. Internet).e-Commerce/e-business.005.8005.8Bushnell Lindaedthttp://id.loc.gov/vocabulary/relators/edtPoovendran Radhaedthttp://id.loc.gov/vocabulary/relators/edtBaşar Tameredthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910349397903321Decision and Game Theory for Security3032452UNINA