05637nam 22008175 450 991048497180332120200705161806.03-319-68711-510.1007/978-3-319-68711-7(CKB)4100000000881963(DE-He213)978-3-319-68711-7(MiAaPQ)EBC6283899(MiAaPQ)EBC5595062(Au-PeEL)EBL5595062(OCoLC)1007141125(PPN)220121389(EXLCZ)99410000000088196320171003d2017 u| 0engurnn#008mamaatxtrdacontentcrdamediacrrdacarrierDecision and Game Theory for Security[electronic resource] 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings /edited by Stefan Rass, Bo An, Christopher Kiekintveld, Fei Fang, Stefan Schauer1st ed. 2017.Cham :Springer International Publishing :Imprint: Springer,2017.1 online resource (XI, 534 p. 137 illus.)Security and Cryptology ;105753-319-68710-7 Game theory and mechanism design for security and privacy -- Pricing and economic incentives for building dependable and secure systems -- Dynamic control, learning, and optimization and approximation techniques -- Decision making and decision theory for cybersecurity and security requirements engineering -- Socio-technological and behavioral approaches to security -- Risk assessment and risk management -- Security investment and cyber insurance -- Security and privacy for the Internet-of-Things (IoT), cyber-physical systems, resilient control systems -- New approaches for security and privacy in cloud computing and for critical infrastructure -- Security and privacy of wireless and mobile communications, including user location privacy -- Game theory for intrusion detection -- Empirical and experimental studies with game-theoretic or optimization analysis for security and privacy.This book constitutes the refereed proceedings of the 8th International Conference on Decision and Game Theory for Security, GameSec 2017, heldĀ in Vienna, Austria, in October 2017. The 24 revised full papers presented together with 4 short papers were carefully reviewed and selected from 71 submissions. The papers address topics such as Game theory and mechanism design for security and privacy; Pricing and economic incentives for building dependable and secure systems; Dynamic control, learning, and optimization and approximation techniques; Decision making and decision theory for cybersecurity and security requirements engineering; Socio-technological and behavioral approaches to security; Risk assessment and risk management; Security investment and cyber insurance; Security and privacy for the Internet-of-Things (IoT), cyber-physical systems, resilient control systems; New approaches for security and privacy in cloud computing and for critical infrastructure; Security and privacy of wireless and mobile communications, including user location privacy; Game theory for intrusion detection; and Empirical and experimental studies with game-theoretic or optimization analysis for security and privacy.Security and Cryptology ;10575Computer securityApplication softwareComputer communication systemsAlgorithmsManagement information systemsComputer scienceGame theorySystems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Information Systems Applications (incl. Internet)https://scigraph.springernature.com/ontologies/product-market-codes/I18040Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Algorithm Analysis and Problem Complexityhttps://scigraph.springernature.com/ontologies/product-market-codes/I16021Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Game Theory, Economics, Social and Behav. Scienceshttps://scigraph.springernature.com/ontologies/product-market-codes/M13011Computer security.Application software.Computer communication systems.Algorithms.Management information systems.Computer science.Game theory.Systems and Data Security.Information Systems Applications (incl. Internet).Computer Communication Networks.Algorithm Analysis and Problem Complexity.Management of Computing and Information Systems.Game Theory, Economics, Social and Behav. Sciences.004Rass Stefanedthttp://id.loc.gov/vocabulary/relators/edtAn Boedthttp://id.loc.gov/vocabulary/relators/edtKiekintveld Christopheredthttp://id.loc.gov/vocabulary/relators/edtFang Feiedthttp://id.loc.gov/vocabulary/relators/edtSchauer Stefanedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910484971803321Decision and game theory for security2161899UNINA