top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Decision and Game Theory for Security : First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings / / edited by Tansu Alpcan, Levente Buttyán, John S. Baras
Decision and Game Theory for Security : First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings / / edited by Tansu Alpcan, Levente Buttyán, John S. Baras
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (X, 281 p. 60 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Game theory
Computer communication systems
Computer security
Algorithms
Management information systems
Computer science
Cryptology
Game Theory, Economics, Social and Behav. Sciences
Computer Communication Networks
Systems and Data Security
Algorithm Analysis and Problem Complexity
Management of Computing and Information Systems
ISBN 1-280-39042-5
9786613568342
3-642-17197-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Security Investments and Planning -- Design of Network Topology in an Adversarial Environment -- Optimal Information Security Investment with Penetration Testing -- Privacy and Anonymity -- Tracking Games in Mobile Networks -- gPath: A Game-Theoretic Path Selection Algorithm to Protect Tor’s Anonymity -- When Do Firms Invest in Privacy-Preserving Technologies? -- Adversarial and Robust Control -- Adversarial Control in a Delay Tolerant Network -- Security Interdependencies for Networked Control Systems with Identical Agents -- Robust Control in Sparse Mobile Ad-Hoc Networks -- Network Security and Botnets -- A Game-Theoretical Approach for Finding Optimal Strategies in a Botnet Defense Model -- ISPs and Ad Networks Against Botnet Ad Fraud -- A Localization Game in Wireless Sensor Networks -- Effective Multimodel Anomaly Detection Using Cooperative Negotiation -- Authorization and Authentication -- The Password Game: Negative Externalities from Weak Password Practices -- Towards a Game Theoretic Authorisation Model -- Theory and Algorithms for Security -- Disperse or Unite? A Mathematical Model of Coordinated Attack -- Uncertainty in Interdependent Security Games -- Attack–Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent -- Methods and Algorithms for Infinite Bayesian Stackelberg Security Games.
Altri titoli varianti GameSec'10
Record Nr. UNISA-996465698603316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Decision and Game Theory for Security : First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings / / edited by Tansu Alpcan, Levente Buttyán, John S. Baras
Decision and Game Theory for Security : First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings / / edited by Tansu Alpcan, Levente Buttyán, John S. Baras
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (X, 281 p. 60 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Game theory
Computer communication systems
Computer security
Algorithms
Management information systems
Computer science
Cryptology
Game Theory, Economics, Social and Behav. Sciences
Computer Communication Networks
Systems and Data Security
Algorithm Analysis and Problem Complexity
Management of Computing and Information Systems
ISBN 1-280-39042-5
9786613568342
3-642-17197-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Security Investments and Planning -- Design of Network Topology in an Adversarial Environment -- Optimal Information Security Investment with Penetration Testing -- Privacy and Anonymity -- Tracking Games in Mobile Networks -- gPath: A Game-Theoretic Path Selection Algorithm to Protect Tor’s Anonymity -- When Do Firms Invest in Privacy-Preserving Technologies? -- Adversarial and Robust Control -- Adversarial Control in a Delay Tolerant Network -- Security Interdependencies for Networked Control Systems with Identical Agents -- Robust Control in Sparse Mobile Ad-Hoc Networks -- Network Security and Botnets -- A Game-Theoretical Approach for Finding Optimal Strategies in a Botnet Defense Model -- ISPs and Ad Networks Against Botnet Ad Fraud -- A Localization Game in Wireless Sensor Networks -- Effective Multimodel Anomaly Detection Using Cooperative Negotiation -- Authorization and Authentication -- The Password Game: Negative Externalities from Weak Password Practices -- Towards a Game Theoretic Authorisation Model -- Theory and Algorithms for Security -- Disperse or Unite? A Mathematical Model of Coordinated Attack -- Uncertainty in Interdependent Security Games -- Attack–Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent -- Methods and Algorithms for Infinite Bayesian Stackelberg Security Games.
Altri titoli varianti GameSec'10
Record Nr. UNINA-9910484710103321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui