LEADER 05635nam 22008175 450 001 996465306203316 005 20200705161806.0 010 $a3-319-68711-5 024 7 $a10.1007/978-3-319-68711-7 035 $a(CKB)4100000000881963 035 $a(DE-He213)978-3-319-68711-7 035 $a(MiAaPQ)EBC6283899 035 $a(MiAaPQ)EBC5595062 035 $a(Au-PeEL)EBL5595062 035 $a(OCoLC)1007141125 035 $a(PPN)220121389 035 $a(EXLCZ)994100000000881963 100 $a20171003d2017 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aDecision and Game Theory for Security$b[electronic resource] $e8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings /$fedited by Stefan Rass, Bo An, Christopher Kiekintveld, Fei Fang, Stefan Schauer 205 $a1st ed. 2017. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2017. 215 $a1 online resource (XI, 534 p. 137 illus.) 225 1 $aSecurity and Cryptology ;$v10575 311 $a3-319-68710-7 327 $aGame theory and mechanism design for security and privacy -- Pricing and economic incentives for building dependable and secure systems -- Dynamic control, learning, and optimization and approximation techniques -- Decision making and decision theory for cybersecurity and security requirements engineering -- Socio-technological and behavioral approaches to security -- Risk assessment and risk management -- Security investment and cyber insurance -- Security and privacy for the Internet-of-Things (IoT), cyber-physical systems, resilient control systems -- New approaches for security and privacy in cloud computing and for critical infrastructure -- Security and privacy of wireless and mobile communications, including user location privacy -- Game theory for intrusion detection -- Empirical and experimental studies with game-theoretic or optimization analysis for security and privacy. 330 $aThis book constitutes the refereed proceedings of the 8th International Conference on Decision and Game Theory for Security, GameSec 2017, held in Vienna, Austria, in October 2017. The 24 revised full papers presented together with 4 short papers were carefully reviewed and selected from 71 submissions. The papers address topics such as Game theory and mechanism design for security and privacy; Pricing and economic incentives for building dependable and secure systems; Dynamic control, learning, and optimization and approximation techniques; Decision making and decision theory for cybersecurity and security requirements engineering; Socio-technological and behavioral approaches to security; Risk assessment and risk management; Security investment and cyber insurance; Security and privacy for the Internet-of-Things (IoT), cyber-physical systems, resilient control systems; New approaches for security and privacy in cloud computing and for critical infrastructure; Security and privacy of wireless and mobile communications, including user location privacy; Game theory for intrusion detection; and Empirical and experimental studies with game-theoretic or optimization analysis for security and privacy. 410 0$aSecurity and Cryptology ;$v10575 606 $aComputer security 606 $aApplication software 606 $aComputer communication systems 606 $aAlgorithms 606 $aManagement information systems 606 $aComputer science 606 $aGame theory 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aGame Theory, Economics, Social and Behav. Sciences$3https://scigraph.springernature.com/ontologies/product-market-codes/M13011 615 0$aComputer security. 615 0$aApplication software. 615 0$aComputer communication systems. 615 0$aAlgorithms. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aGame theory. 615 14$aSystems and Data Security. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aComputer Communication Networks. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aManagement of Computing and Information Systems. 615 24$aGame Theory, Economics, Social and Behav. Sciences. 676 $a004 702 $aRass$b Stefan$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aAn$b Bo$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKiekintveld$b Christopher$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aFang$b Fei$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSchauer$b Stefan$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996465306203316 996 $aDecision and game theory for security$92161899 997 $aUNISA