LEADER 04777nam 22006975 450 001 9910349397903321 005 20200703073110.0 010 $a3-030-01554-8 024 7 $a10.1007/978-3-030-01554-1 035 $a(CKB)4100000007110649 035 $a(DE-He213)978-3-030-01554-1 035 $a(MiAaPQ)EBC6296898 035 $a(PPN)231460821 035 $a(EXLCZ)994100000007110649 100 $a20180925d2018 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aDecision and Game Theory for Security $e9th International Conference, GameSec 2018, Seattle, WA, USA, October 29?31, 2018, Proceedings /$fedited by Linda Bushnell, Radha Poovendran, Tamer Ba?ar 205 $a1st ed. 2018. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2018. 215 $a1 online resource (XIII, 638 p. 174 illus.) 225 1 $aSecurity and Cryptology ;$v11199 311 $a3-030-01553-X 327 $aUse of game theory -- Control theory and mechanism design for security and privacy -- Decision making for cybersecurity and security requirements engineering -- Security and privacy for the Internet-of-Things -- Cyber-physical systems -- cloud computing -- Resilient control systems, and critical infrastructure -- Pricing -- Economic incentives -- Security investments, and cyber insurance for dependable and secure systems -- Risk assessment and security risk management -- Security and privacy of wireless and mobile communications, including user location privacy -- Sociotechnological and behavioral approaches to security -- Deceptive technologies in cybersecurity and privacy -- Empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy -- Adversarial machine learning and crowdsourcing, and the role of artificial intelligence in system security. 330 $aThe 28 revised full papers presented together with 8 short papers were carefully reviewed and selected from 44 submissions. Among the topical areas covered were: use of game theory; control theory; and mechanism design for security and privacy; decision making for cybersecurity and security requirements engineering; security and privacy for the Internet-of-Things; cyber-physical systems; cloud computing; resilient control systems, and critical infrastructure; pricing; economic incentives; security investments, and cyber insurance for dependable and secure systems; risk assessment and security risk management; security and privacy of wireless and mobile communications, including user location privacy; sociotechnological and behavioral approaches to security; deceptive technologies in cybersecurity and privacy; empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy; and adversarial machine learning and crowdsourcing, and the role of artificial intelligence in system security. 410 0$aSecurity and Cryptology ;$v11199 606 $aComputer security 606 $aArtificial intelligence 606 $aComputer communication systems 606 $aApplication software 606 $aE-commerce 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aArtificial Intelligence$3https://scigraph.springernature.com/ontologies/product-market-codes/I21000 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $ae-Commerce/e-business$3https://scigraph.springernature.com/ontologies/product-market-codes/I26000 615 0$aComputer security. 615 0$aArtificial intelligence. 615 0$aComputer communication systems. 615 0$aApplication software. 615 0$aE-commerce. 615 14$aSystems and Data Security. 615 24$aArtificial Intelligence. 615 24$aComputer Communication Networks. 615 24$aInformation Systems Applications (incl. Internet). 615 24$ae-Commerce/e-business. 676 $a005.8 676 $a005.8 702 $aBushnell$b Linda$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aPoovendran$b Radha$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aBa?ar$b Tamer$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910349397903321 996 $aDecision and Game Theory for Security$93032452 997 $aUNINA