03704nam 22008055 450 991048336340332120251226195728.03-319-47413-810.1007/978-3-319-47413-7(CKB)3710000000926176(DE-He213)978-3-319-47413-7(MiAaPQ)EBC6284908(MiAaPQ)EBC5577235(Au-PeEL)EBL5577235(OCoLC)962018403(PPN)196323258(EXLCZ)99371000000092617620161004d2016 u| 0engurnn#008mamaatxtrdacontentcrdamediacrrdacarrierDecision and Game Theory for Security 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings /edited by Quanyan Zhu, Tansu Alpcan, Emmanouil Panaousis, Milind Tambe, William Casey1st ed. 2016.Cham :Springer International Publishing :Imprint: Springer,2016.1 online resource (XI, 478 p. 137 illus.)Security and Cryptology,2946-1863 ;99963-319-47412-X Includes bibliographical references and index.Network security -- Security risks and investments -- Special track-validating models -- Decision making for privacy -- Security games -- Incentives and cybersecurity mechanisms -- Intrusion detection and information limitations in security.This book constitutes the refereed proceedings of the 7th International Conference on Decision and Game Theory for Security, GameSec 2016, held in New York, NY, USA, in November 2016. The 18 revised full papers presented together with 8 short papers and 5 poster papers were carefully reviewed and selected from 40 submissions. The papers are organized in topical sections on network security; security risks and investments; special track-validating models; decision making for privacy; security games; incentives and cybersecurity mechanisms; and intrusion detection and information limitations in security.Security and Cryptology,2946-1863 ;9996Application softwareData protectionComputer networksAlgorithmsElectronic data processingManagementGame theoryComputer and Information Systems ApplicationsData and Information SecurityComputer Communication NetworksAlgorithmsIT OperationsGame TheoryApplication software.Data protection.Computer networks.Algorithms.Electronic data processingManagement.Game theory.Computer and Information Systems Applications.Data and Information Security.Computer Communication Networks.Algorithms.IT Operations.Game Theory.005.8Zhu Quanyanedthttp://id.loc.gov/vocabulary/relators/edtAlpcan Tansuedthttp://id.loc.gov/vocabulary/relators/edtPanaousis Emmanouiledthttp://id.loc.gov/vocabulary/relators/edtTambe Milindedthttp://id.loc.gov/vocabulary/relators/edtCasey Williamedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910483363403321Decision and Game Theory for Security3032452UNINA