Decision and Game Theory for Security [[electronic resource] ] : 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 – November 1, 2019, Proceedings / / edited by Tansu Alpcan, Yevgeniy Vorobeychik, John S. Baras, György Dán |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (xi, 584 pages) : illustrations |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Artificial intelligence Computer communication systems Computers Law and legislation Application software Systems and Data Security Artificial Intelligence Computer Communication Networks Legal Aspects of Computing Information Systems Applications (incl. Internet) |
ISBN | 3-030-32430-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Game theory, control, and mechanism design for security and privacy -- Decision making for cybersecurity and security requirements engineering -- Security and privacy for the Internet-of-Things, cyber-physical systems, cloud computing, resilient control systems, and critical infrastructure -- Pricing, economic incentives, security investments, and cyber insurance for dependable and secure systems -- Risk assessment and security risk management -- Security and privacy of wireless and mobile communications, including user location privacy -- Socio-technological and behavioral approaches to security -- Empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy -- Adversarial Machine Learning and the role of AI in system security. |
Record Nr. | UNISA-996466323303316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Decision and Game Theory for Security : 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 – November 1, 2019, Proceedings / / edited by Tansu Alpcan, Yevgeniy Vorobeychik, John S. Baras, György Dán |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (xi, 584 pages) : illustrations |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Artificial intelligence Computer communication systems Computers Law and legislation Application software Systems and Data Security Artificial Intelligence Computer Communication Networks Legal Aspects of Computing Information Systems Applications (incl. Internet) |
ISBN | 3-030-32430-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Game theory, control, and mechanism design for security and privacy -- Decision making for cybersecurity and security requirements engineering -- Security and privacy for the Internet-of-Things, cyber-physical systems, cloud computing, resilient control systems, and critical infrastructure -- Pricing, economic incentives, security investments, and cyber insurance for dependable and secure systems -- Risk assessment and security risk management -- Security and privacy of wireless and mobile communications, including user location privacy -- Socio-technological and behavioral approaches to security -- Empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy -- Adversarial Machine Learning and the role of AI in system security. |
Record Nr. | UNINA-9910349271703321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Decision and Game Theory for Security [[electronic resource] ] : Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011, Proceedings / / edited by John S. Baras, Jonathan Katz, Eitan Altman |
Edizione | [1st ed. 2011.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 |
Descrizione fisica | 1 online resource (X, 259 p.) |
Disciplina | 004 |
Collana | Security and Cryptology |
Soggetto topico |
Application software
Computer communication systems Computer security Algorithms Management information systems Computer science Game theory Information Systems Applications (incl. Internet) Computer Communication Networks Systems and Data Security Algorithm Analysis and Problem Complexity Management of Computing and Information Systems Game Theory, Economics, Social and Behav. Sciences |
ISBN | 3-642-25280-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996465690303316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Decision and Game Theory for Security : First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings / / edited by Tansu Alpcan, Levente Buttyán, John S. Baras |
Edizione | [1st ed. 2010.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 |
Descrizione fisica | 1 online resource (X, 281 p. 60 illus.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Game theory Computer communication systems Computer security Algorithms Management information systems Computer science Cryptology Game Theory, Economics, Social and Behav. Sciences Computer Communication Networks Systems and Data Security Algorithm Analysis and Problem Complexity Management of Computing and Information Systems |
ISBN |
1-280-39042-5
9786613568342 3-642-17197-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Security Investments and Planning -- Design of Network Topology in an Adversarial Environment -- Optimal Information Security Investment with Penetration Testing -- Privacy and Anonymity -- Tracking Games in Mobile Networks -- gPath: A Game-Theoretic Path Selection Algorithm to Protect Tor’s Anonymity -- When Do Firms Invest in Privacy-Preserving Technologies? -- Adversarial and Robust Control -- Adversarial Control in a Delay Tolerant Network -- Security Interdependencies for Networked Control Systems with Identical Agents -- Robust Control in Sparse Mobile Ad-Hoc Networks -- Network Security and Botnets -- A Game-Theoretical Approach for Finding Optimal Strategies in a Botnet Defense Model -- ISPs and Ad Networks Against Botnet Ad Fraud -- A Localization Game in Wireless Sensor Networks -- Effective Multimodel Anomaly Detection Using Cooperative Negotiation -- Authorization and Authentication -- The Password Game: Negative Externalities from Weak Password Practices -- Towards a Game Theoretic Authorisation Model -- Theory and Algorithms for Security -- Disperse or Unite? A Mathematical Model of Coordinated Attack -- Uncertainty in Interdependent Security Games -- Attack–Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent -- Methods and Algorithms for Infinite Bayesian Stackelberg Security Games. |
Altri titoli varianti | GameSec'10 |
Record Nr. | UNISA-996465698603316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Decision and game theory for security : first International Conference, Gamesec 2010, Berlin, Germany, November 22-23, 2010, proceedings / / Tansu Alpcan, Levente Buttyan, John S. Baras (eds.) |
Edizione | [1st ed. 2010.] |
Pubbl/distr/stampa | Berlin ; ; New York, : Springer, 2010 |
Descrizione fisica | 1 online resource (X, 281 p. 60 illus.) |
Disciplina | 005.82 |
Altri autori (Persone) |
AlpcanTansu <1975->
ButtyanLevente BarasJohn S |
Collana | Lecture notes in computer science |
Soggetto topico |
Computer security
Game theory |
ISBN |
1-280-39042-5
9786613568342 3-642-17197-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Security Investments and Planning -- Design of Network Topology in an Adversarial Environment -- Optimal Information Security Investment with Penetration Testing -- Privacy and Anonymity -- Tracking Games in Mobile Networks -- gPath: A Game-Theoretic Path Selection Algorithm to Protect Tor’s Anonymity -- When Do Firms Invest in Privacy-Preserving Technologies? -- Adversarial and Robust Control -- Adversarial Control in a Delay Tolerant Network -- Security Interdependencies for Networked Control Systems with Identical Agents -- Robust Control in Sparse Mobile Ad-Hoc Networks -- Network Security and Botnets -- A Game-Theoretical Approach for Finding Optimal Strategies in a Botnet Defense Model -- ISPs and Ad Networks Against Botnet Ad Fraud -- A Localization Game in Wireless Sensor Networks -- Effective Multimodel Anomaly Detection Using Cooperative Negotiation -- Authorization and Authentication -- The Password Game: Negative Externalities from Weak Password Practices -- Towards a Game Theoretic Authorisation Model -- Theory and Algorithms for Security -- Disperse or Unite? A Mathematical Model of Coordinated Attack -- Uncertainty in Interdependent Security Games -- Attack–Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent -- Methods and Algorithms for Infinite Bayesian Stackelberg Security Games. |
Record Nr. | UNINA-9910484710103321 |
Berlin ; ; New York, : Springer, 2010 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Flow control in time-varying, random supply chains / / Ion Matei; Assane Gueye; John S. Baras |
Autore | Matei Ion |
Pubbl/distr/stampa | Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 2013 |
Descrizione fisica | 1 online resource |
Altri autori (Persone) |
BarasJohn S
GueyeAssane MateiIon |
Collana | NISTIR |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910710738903321 |
Matei Ion
![]() |
||
Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 2013 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Semiannual progress report on real time control for NASA robotic gripper [[electronic resource] /] / Carole A. Salter and John S. Baras |
Autore | Salter Carole A |
Pubbl/distr/stampa | [Washington, DC] : , : [National Aeronautics and Space Administration], , [1989] |
Descrizione fisica | 1 online resource (15 pages) : illustrations |
Altri autori (Persone) | BarasJohn S |
Collana | [NASA contractor report] |
Soggetto topico |
Control theory
End effectors Loads (forces) Manipulators Mathematical models Robot control |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Real time control for NASA robotic gripper |
Record Nr. | UNINA-9910702391403321 |
Salter Carole A
![]() |
||
[Washington, DC] : , : [National Aeronautics and Space Administration], , [1989] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Trust-based multi-agent filtering for increased smart grid security / / Ion Matei; Vijay Srinivasan; John S. Baras |
Autore | Matei Ion |
Pubbl/distr/stampa | Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 2011 |
Descrizione fisica | 1 online resource |
Altri autori (Persone) |
BarasJohn S
MateiIon SrinivasanVijay |
Collana | NISTIR |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910710742903321 |
Matei Ion
![]() |
||
Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 2011 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|