LEADER 04394nam 22007335 450 001 996466323303316 005 20200705131045.0 010 $a3-030-32430-3 024 7 $a10.1007/978-3-030-32430-8 035 $a(CKB)4100000009606135 035 $a(MiAaPQ)EBC5964708 035 $a(DE-He213)978-3-030-32430-8 035 $a(PPN)256196311 035 $a(EXLCZ)994100000009606135 100 $a20191004d2019 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aDecision and Game Theory for Security$b[electronic resource] $e10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 ? November 1, 2019, Proceedings /$fedited by Tansu Alpcan, Yevgeniy Vorobeychik, John S. Baras, György Dán 205 $a1st ed. 2019. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2019. 215 $a1 online resource (xi, 584 pages) $cillustrations 225 1 $aSecurity and Cryptology ;$v11836 311 $a3-030-32429-X 320 $aIncludes bibliographical references and index. 327 $aGame theory, control, and mechanism design for security and privacy -- Decision making for cybersecurity and security requirements engineering -- Security and privacy for the Internet-of-Things, cyber-physical systems, cloud computing, resilient control systems, and critical infrastructure -- Pricing, economic incentives, security investments, and cyber insurance for dependable and secure systems -- Risk assessment and security risk management -- Security and privacy of wireless and mobile communications, including user location privacy -- Socio-technological and behavioral approaches to security -- Empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy -- Adversarial Machine Learning and the role of AI in system security. 330 $aThis book constitutes the refereed proceedings of the 10th International Conference on Decision and Game Theory for Security, GameSec 2019,held in Stockholm, Sweden, in October 2019. The 21 full papers presented together with 11 short papers were carefully reviewed and selected from 47 submissions.The papers focus on protection of heterogeneous, large-scale and dynamic cyber-physical systems as well as managing security risks faced by critical infrastructures through rigorous and practically-relevant analytical methods. 410 0$aSecurity and Cryptology ;$v11836 606 $aComputer security 606 $aArtificial intelligence 606 $aComputer communication systems 606 $aComputers 606 $aLaw and legislation 606 $aApplication software 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aArtificial Intelligence$3https://scigraph.springernature.com/ontologies/product-market-codes/I21000 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aLegal Aspects of Computing$3https://scigraph.springernature.com/ontologies/product-market-codes/I24059 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 615 0$aComputer security. 615 0$aArtificial intelligence. 615 0$aComputer communication systems. 615 0$aComputers. 615 0$aLaw and legislation. 615 0$aApplication software. 615 14$aSystems and Data Security. 615 24$aArtificial Intelligence. 615 24$aComputer Communication Networks. 615 24$aLegal Aspects of Computing. 615 24$aInformation Systems Applications (incl. Internet). 676 $a005.8 702 $aAlpcan$b Tansu$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aVorobeychik$b Yevgeniy$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aBaras$b John S$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aDán$b György$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466323303316 996 $aDecision and game theory for security$92161899 997 $aUNISA