LEADER 04323nam 22008895 450 001 996466283503316 005 20200630205849.0 010 $a3-642-34266-3 024 7 $a10.1007/978-3-642-34266-0 035 $a(CKB)3400000000102802 035 $a(SSID)ssj0000810197 035 $a(PQKBManifestationID)11956451 035 $a(PQKBTitleCode)TC0000810197 035 $a(PQKBWorkID)10827203 035 $a(PQKB)10628019 035 $a(DE-He213)978-3-642-34266-0 035 $a(MiAaPQ)EBC6295499 035 $a(MiAaPQ)EBC5596165 035 $a(Au-PeEL)EBL5596165 035 $a(OCoLC)1044342294 035 $a(PPN)168326566 035 $a(EXLCZ)993400000000102802 100 $a20121116d2012 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aDecision and Game Theory for Security$b[electronic resource] $eThird International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012, Proceedings /$fedited by Jens Grossklags, Jean Walrand 205 $a1st ed. 2012. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2012. 215 $a1 online resource (XII, 309 p. 48 illus.) 225 1 $aSecurity and Cryptology ;$v7638 300 $aInternational conference proceedings. 300 $aIncludes author index. 311 $a3-642-34265-5 320 $aIncludes bibliographical references. 327 $aSecret Communications -- Identification of Attackers -- Multi-step Attacks -- Network Security -- System Defense -- Applications Security. Identification of Attackers -- Multi-step Attacks -- Network Security -- System Defense -- Applications Security. 330 $aThis book constitutes the refereed proceedings of the Third International Conference on Decision and Game Theory for Security, GameSec 2012, held in Budapest, Hungary, in November 2012. The 18 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on secret communications, identification of attackers, multi-step attacks, network security, system defense, and applications security. 410 0$aSecurity and Cryptology ;$v7638 606 $aApplication software 606 $aComputer communication systems 606 $aComputer security 606 $aAlgorithms 606 $aManagement information systems 606 $aComputer science 606 $aGame theory 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aGame Theory, Economics, Social and Behav. Sciences$3https://scigraph.springernature.com/ontologies/product-market-codes/M13011 615 0$aApplication software. 615 0$aComputer communication systems. 615 0$aComputer security. 615 0$aAlgorithms. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aGame theory. 615 14$aInformation Systems Applications (incl. Internet). 615 24$aComputer Communication Networks. 615 24$aSystems and Data Security. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aManagement of Computing and Information Systems. 615 24$aGame Theory, Economics, Social and Behav. Sciences. 676 $a005.8 702 $aGrossklags$b Jens$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWalrand$b Jean$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aGameSec (Conference) 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466283503316 996 $aDecision and game theory for security$92161899 997 $aUNISA