LEADER 04193nam 22008415 450 001 9910483525403321 005 20200703150032.0 010 $a3-319-12601-6 024 7 $a10.1007/978-3-319-12601-2 035 $a(CKB)3710000000269708 035 $a(SSID)ssj0001372585 035 $a(PQKBManifestationID)11881975 035 $a(PQKBTitleCode)TC0001372585 035 $a(PQKBWorkID)11304521 035 $a(PQKB)10371987 035 $a(DE-He213)978-3-319-12601-2 035 $a(MiAaPQ)EBC6301695 035 $a(MiAaPQ)EBC5586335 035 $a(Au-PeEL)EBL5586335 035 $a(OCoLC)893106157 035 $a(PPN)182097951 035 $a(EXLCZ)993710000000269708 100 $a20141003d2014 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aDecision and Game Theory for Security $e5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014, Proceedings /$fedited by Radha Poovendran, Walid Saad 205 $a1st ed. 2014. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2014. 215 $a1 online resource (XII, 381 p. 83 illus.) 225 1 $aSecurity and Cryptology ;$v8840 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-319-12600-8 330 $aThis book constitutes the refereed proceedings of the 5th International Conference on Decision and Game Theory for Security, GameSec 2014, held in Los Angeles, CA, USA, in November 2014. The 16 revised full papers presented together with 7 short papers were carefully reviewed and selected from numerous submissions. The covered topics cover multiple facets of cyber security that include: rationality of adversary, game-theoretic cryptographic techniques, vulnerability discovery and assessment, multi-goal security analysis, secure computation, economic-oriented security, and surveillance for security. Those aspects are covered in a multitude of domains that include networked systems, wireless communications, border patrol security, and control systems. 410 0$aSecurity and Cryptology ;$v8840 606 $aApplication software 606 $aComputer communication systems 606 $aComputer security 606 $aAlgorithms 606 $aManagement information systems 606 $aComputer science 606 $aGame theory 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aGame Theory, Economics, Social and Behav. Sciences$3https://scigraph.springernature.com/ontologies/product-market-codes/M13011 615 0$aApplication software. 615 0$aComputer communication systems. 615 0$aComputer security. 615 0$aAlgorithms. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aGame theory. 615 14$aInformation Systems Applications (incl. Internet). 615 24$aComputer Communication Networks. 615 24$aSystems and Data Security. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aManagement of Computing and Information Systems. 615 24$aGame Theory, Economics, Social and Behav. Sciences. 676 $a005.8 702 $aPoovendran$b Radha$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSaad$b Walid$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483525403321 996 $aDecision and Game Theory for Security$93032452 997 $aUNINA