LEADER 01064nam--2200385---450- 001 990001245450203316 005 20050615135631.0 035 $a000124545 035 $aUSA01000124545 035 $a(ALEPH)000124545USA01 035 $a000124545 100 $a20031106d1983----km-y0itay0103----ba 101 0 $aita 102 $aIT 105 $a||||||||001yy 200 1 $aAntropologia$estoria e problemi$fCarlo Tullio Altan 210 $aMilano$cFeltrinelli$d1983 215 $a383 p.$d22 cm 225 2 $aCampi del sapere 410 0$12001$aCampi del sapere 454 1$12001 461 1$1001-------$12001 606 0 $aAntropologia 676 $a573 700 1$aTULLIO-ALTAN,$bCarlo$0124992 801 0$aIT$bsalbc$gISBD 912 $a990001245450203316 951 $aIII.2. 462 (IV C coll 366/4)$b8664 L.M.$cIV C 959 $aBK 969 $aUMA 979 $aSIAV5$b10$c20031106$lUSA01$h1113 979 $aPATRY$b90$c20040406$lUSA01$h1729 979 $aCOPAT4$b90$c20050615$lUSA01$h1356 996 $aAntropologia$9151440 997 $aUNISA LEADER 02875nam0 22006133i 450 001 VAN0274386 005 20240626015913.107 017 70$2N$a9783030660659 100 $a20240404d2021 |0itac50 ba 101 $aeng 102 $aCH 105 $a|||| ||||| 200 1 $aGame Theory for Cyber Deception$eFrom Theory to Applications$fJeffrey Pawlick, Quanyan Zhu 210 $aCham$cBirkhäuser$cSpringer$d2021 215 $axiii, 190 p.$cill.$d24 cm 410 1$1001VAN0115306$12001 $aStatic & Dynamic Game Theory: Foundations & Applications$1210 $aBasel [etc.]$cBirkhäuser 606 $a91-XX$xGame theory, economics, finance, and other social and behavioral sciences [MSC 2020]$3VANC025601$2MF 606 $a91A80$xApplications of game theory [MSC 2020]$3VANC029259$2MF 606 $a91A10$xNoncooperative games [MSC 2020]$3VANC029377$2MF 606 $a68M25$xComputer security [MSC 2020]$3VANC036400$2MF 606 $a91A18$xGames in extensive form [MSC 2020]$3VANC037834$2MF 606 $a91A65$xHierarchical games (including Stackelberg games) [MSC 2020]$3VANC037847$2MF 606 $a91A27$xGames with incomplete information, Bayesian games [MSC 2020]$3VANC037848$2MF 606 $a91A28$xSignaling and communication in game theory [MSC 2020]$3VANC037849$2MF 606 $a91A16$xMean field games (aspects of game theory) [MSC 2020]$3VANC037850$2MF 610 $aAttacker engagement cybersecurity$9KW:K 610 $aBayesian games$9KW:K 610 $aCyber deception$9KW:K 610 $aCybersecurity$9KW:K 610 $aDefensive deception cyber$9KW:K 610 $aDos attack cybersecurity$9KW:K 610 $aGame Theory$9KW:K 610 $aGames of incomplete information$9KW:K 610 $aHoney-X cybersecurity$9KW:K 610 $aInternet of Things$9KW:K 610 $aLarge population games$9KW:K 610 $aNash games$9KW:K 610 $aObfuscation cybersecurity$9KW:K 610 $aStackelberg games$9KW:K 610 $aStrategic trust cybersecurity$9KW:K 610 $aZero-sum matrix games$9KW:K 620 $aCH$dCham$3VANL001889 700 1$aPawlick$bJeffrey$3VANV226797$01221086 701 1$aZhu$bQuanyan$3VANV226798$0888933 712 $aBirkhäuser $3VANV108193$4650 712 $aSpringer $3VANV108073$4650 801 $aIT$bSOL$c20240628$gRICA 856 4 $uhttps://doi.org/10.1007/978-3-030-66065-9$zE-book ? Accesso al full-text attraverso riconoscimento IP di Ateneo, proxy e/o Shibboleth 899 $aBIBLIOTECA DEL DIPARTIMENTO DI MATEMATICA E FISICA$1IT-CE0120$2VAN08 912 $fN 912 $aVAN0274386 950 $aBIBLIOTECA DEL DIPARTIMENTO DI MATEMATICA E FISICA$d08CONS e-book 8057 $e08eMF8057 20240412 996 $aGame Theory for Cyber Deception$94147374 997 $aUNICAMPANIA