LEADER 04108nam 22008535 450 001 996465690303316 005 20230111090203.0 010 $a3-642-25280-X 024 7 $a10.1007/978-3-642-25280-8 035 $a(CKB)3400000000024080 035 $a(SSID)ssj0000609497 035 $a(PQKBManifestationID)11433990 035 $a(PQKBTitleCode)TC0000609497 035 $a(PQKBWorkID)10618281 035 $a(PQKB)11346524 035 $a(DE-He213)978-3-642-25280-8 035 $a(MiAaPQ)EBC6283904 035 $a(MiAaPQ)EBC5585920 035 $a(Au-PeEL)EBL5585920 035 $a(OCoLC)761711279 035 $a(PPN)157508498 035 $a(EXLCZ)993400000000024080 100 $a20111109d2011 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aDecision and Game Theory for Security$b[electronic resource] $eSecond International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011, Proceedings /$fedited by John S. Baras, Jonathan Katz, Eitan Altman 205 $a1st ed. 2011. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2011. 215 $a1 online resource (X, 259 p.) 225 1 $aSecurity and Cryptology ;$v7037 300 $aBibliographic Level Mode of Issuance: Monograph 311 1 $a3-642-25279-6 330 $aThis book constitutes the refereed proceedings of the Second International Conference on Decision and Game Theory for Security, GameSec 2011, held in College Park, Maryland, USA, in November 2011. The 16 revised full papers and 2 plenary keynotes presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on attacks, adversaries, and game theory, wireless adhoc and sensor networks, network games, security insurance, security and trust in social networks and security investments. 410 0$aSecurity and Cryptology ;$v7037 606 $aApplication software 606 $aComputer communication systems 606 $aComputer security 606 $aAlgorithms 606 $aManagement information systems 606 $aComputer science 606 $aGame theory 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aGame Theory, Economics, Social and Behav. Sciences$3https://scigraph.springernature.com/ontologies/product-market-codes/M13011 615 0$aApplication software. 615 0$aComputer communication systems. 615 0$aComputer security. 615 0$aAlgorithms. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aGame theory. 615 14$aInformation Systems Applications (incl. Internet). 615 24$aComputer Communication Networks. 615 24$aSystems and Data Security. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aManagement of Computing and Information Systems. 615 24$aGame Theory, Economics, Social and Behav. Sciences. 676 $a004 702 $aBaras$b John S$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKatz$b Jonathan$f1974-$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aAltman$b Eitan$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996465690303316 996 $aDecision and game theory for security$92161899 997 $aUNISA