top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Decision and game theory for security : 13th International Conference, GameSec 2022, Pittsburgh, PA, USA, October 26-28, 2022, Proceedings / / edited by Fei Fang, Haifeng Xu, and Yezekael Hayel
Decision and game theory for security : 13th International Conference, GameSec 2022, Pittsburgh, PA, USA, October 26-28, 2022, Proceedings / / edited by Fei Fang, Haifeng Xu, and Yezekael Hayel
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2023]
Descrizione fisica 1 online resource (324 pages)
Disciplina 016.391
Collana Lecture Notes in Computer Science
Soggetto topico Game theory
Computer security
ISBN 3-031-26369-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Deception in Security -- The Risk of Attacker Behavioral Learning: Can Attacker Fool Defender under Uncertainty? .-Casino Rationale: Countering attacker deception in zero-sum Stackelberg security games of bounded rationality -- Cyber Deception against Zero-day Attacks: A Game Theoretic Approach -- Planning and Learning in Dynamic Enviroments -- On Almost-Sure Intention Deception Planning that Exploits Imperfect Observers -- Using Deception in Markov Game to Understand Adversarial Behaviors through a Capture-The-Flag Environment -- Robust Moving Target Defense against Unknown Attacks: A Meta-Reinforcement Learning Approach -- Security Games -- Synchronization in Security Games -- Multiple Oracle Algorithm to Solve Continuous Games -- Optimal Pursuit of Surveilling Agents near a High Value Target -- Adversarial Learning and Optimization -- On Poisoned Wardrop Equilibrium in Congestion Games -- Reward Delay Attacks on Deep Reinforcement Learning -- An Exploration of Poisoning Attacks on Data-based Decision Making -- Novel Applications and new Game Models -- A Network Centrality Game for Epidemic Control -- Optimizing Intrusion Detection Systems Placement against Network Virus Spreading using a Partially Observable Stochastic Minimum-Threat Path Game -- Voting Games to Model Protocol Stability and Security of Proof-of-Work Cryptocurrencies.
Record Nr. UNINA-9910659484703321
Cham, Switzerland : , : Springer, , [2023]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Decision and game theory for security : 13th International Conference, GameSec 2022, Pittsburgh, PA, USA, October 26-28, 2022, Proceedings / / edited by Fei Fang, Haifeng Xu, and Yezekael Hayel
Decision and game theory for security : 13th International Conference, GameSec 2022, Pittsburgh, PA, USA, October 26-28, 2022, Proceedings / / edited by Fei Fang, Haifeng Xu, and Yezekael Hayel
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2023]
Descrizione fisica 1 online resource (324 pages)
Disciplina 016.391
Collana Lecture Notes in Computer Science
Soggetto topico Game theory
Computer security
ISBN 3-031-26369-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Deception in Security -- The Risk of Attacker Behavioral Learning: Can Attacker Fool Defender under Uncertainty? .-Casino Rationale: Countering attacker deception in zero-sum Stackelberg security games of bounded rationality -- Cyber Deception against Zero-day Attacks: A Game Theoretic Approach -- Planning and Learning in Dynamic Enviroments -- On Almost-Sure Intention Deception Planning that Exploits Imperfect Observers -- Using Deception in Markov Game to Understand Adversarial Behaviors through a Capture-The-Flag Environment -- Robust Moving Target Defense against Unknown Attacks: A Meta-Reinforcement Learning Approach -- Security Games -- Synchronization in Security Games -- Multiple Oracle Algorithm to Solve Continuous Games -- Optimal Pursuit of Surveilling Agents near a High Value Target -- Adversarial Learning and Optimization -- On Poisoned Wardrop Equilibrium in Congestion Games -- Reward Delay Attacks on Deep Reinforcement Learning -- An Exploration of Poisoning Attacks on Data-based Decision Making -- Novel Applications and new Game Models -- A Network Centrality Game for Epidemic Control -- Optimizing Intrusion Detection Systems Placement against Network Virus Spreading using a Partially Observable Stochastic Minimum-Threat Path Game -- Voting Games to Model Protocol Stability and Security of Proof-of-Work Cryptocurrencies.
Record Nr. UNISA-996511871603316
Cham, Switzerland : , : Springer, , [2023]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Decision and Game Theory for Security [[electronic resource] ] : 14th International Conference, GameSec 2023, Avignon, France, October 18–20, 2023, Proceedings / / edited by Jie Fu, Tomas Kroupa, Yezekael Hayel
Decision and Game Theory for Security [[electronic resource] ] : 14th International Conference, GameSec 2023, Avignon, France, October 18–20, 2023, Proceedings / / edited by Jie Fu, Tomas Kroupa, Yezekael Hayel
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (XXIX, 390 p. 95 illus., 76 illus. in color.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Computer engineering
Computer networks
Artificial intelligence
Data and Information Security
Computer Engineering and Networks
Artificial Intelligence
ISBN 3-031-50670-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Mechanism design and imperfect information -- Observable Perfect Equilibrium -- Playing Repeated Coopetitive Polymatrix Games with Small Manipulation Cost -- Rule Enforcing Through Ordering -- Security Games -- Multi-defender Security Games with Schedules -- Asymmetric Centrality Game against Network Epidemic Propagation -- Shades of Grey: Strategic Bimatrix Stopping Games for Modelling (Un)Ethical Hacking Roles -- Learning in security games -- Characterizing and Improving the Robustness of Predict-Then-Optimize Frameworks -- Quantisation Effects in Adversarial Cyber-Physical GamesTakuma Adams -- Scalable Learning of Intrusion Responses through Recursive Decomposition -- Cyber deception -- Honeypot Allocation for Cyber Deception in Dynamic Tactical Networks: A Game Theoretic Approach -- Optimal Resource Allocation for Proactive Defense with Deception in Probabilistic Attack Graphs -- The Credential is Not Enough: Combining Honeypots and Fake Credentials for Cyber-Defense -- Economics of security -- Does Cyber-insurance Benefit the Insured or the Attacker? -- A Game of Cyber-Insurance -- Rational Broadcast Protocols against Timid Adversaries -- FlipPath Game to Counter Stealthy Attacks in SDN-based Tactical Networks -- Information and privacy -- Double-sided Information Asymmetry in Double Extortion Ransomware -- Opacity-enforcing active perception and control against eavesdropping attacks -- A Game-Theoretic Analysis of Auditing Differentially Private Algorithms with Epistemically Disparate Herd -- Modeling and Analysis of a Nonlinear Security Game with Mixed Armament -- Short articles -- Incentive-Based Software Security: Fair Micro-Payments for Writing Secure Code -- Using Game Theory Approach for COVID-19 Risk Analysis and Medical Resource Allocation -- Shapley Value to Rank Vulnerabilities on Attack Graphs: Applications to Cyberdeception -- Solving security models with perfect observability.
Record Nr. UNINA-9910799241903321
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Decision and Game Theory for Security [[electronic resource] ] : 14th International Conference, GameSec 2023, Avignon, France, October 18–20, 2023, Proceedings / / edited by Jie Fu, Tomas Kroupa, Yezekael Hayel
Decision and Game Theory for Security [[electronic resource] ] : 14th International Conference, GameSec 2023, Avignon, France, October 18–20, 2023, Proceedings / / edited by Jie Fu, Tomas Kroupa, Yezekael Hayel
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (XXIX, 390 p. 95 illus., 76 illus. in color.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Computer engineering
Computer networks
Artificial intelligence
Data and Information Security
Computer Engineering and Networks
Artificial Intelligence
ISBN 3-031-50670-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Mechanism design and imperfect information -- Observable Perfect Equilibrium -- Playing Repeated Coopetitive Polymatrix Games with Small Manipulation Cost -- Rule Enforcing Through Ordering -- Security Games -- Multi-defender Security Games with Schedules -- Asymmetric Centrality Game against Network Epidemic Propagation -- Shades of Grey: Strategic Bimatrix Stopping Games for Modelling (Un)Ethical Hacking Roles -- Learning in security games -- Characterizing and Improving the Robustness of Predict-Then-Optimize Frameworks -- Quantisation Effects in Adversarial Cyber-Physical GamesTakuma Adams -- Scalable Learning of Intrusion Responses through Recursive Decomposition -- Cyber deception -- Honeypot Allocation for Cyber Deception in Dynamic Tactical Networks: A Game Theoretic Approach -- Optimal Resource Allocation for Proactive Defense with Deception in Probabilistic Attack Graphs -- The Credential is Not Enough: Combining Honeypots and Fake Credentials for Cyber-Defense -- Economics of security -- Does Cyber-insurance Benefit the Insured or the Attacker? -- A Game of Cyber-Insurance -- Rational Broadcast Protocols against Timid Adversaries -- FlipPath Game to Counter Stealthy Attacks in SDN-based Tactical Networks -- Information and privacy -- Double-sided Information Asymmetry in Double Extortion Ransomware -- Opacity-enforcing active perception and control against eavesdropping attacks -- A Game-Theoretic Analysis of Auditing Differentially Private Algorithms with Epistemically Disparate Herd -- Modeling and Analysis of a Nonlinear Security Game with Mixed Armament -- Short articles -- Incentive-Based Software Security: Fair Micro-Payments for Writing Secure Code -- Using Game Theory Approach for COVID-19 Risk Analysis and Medical Resource Allocation -- Shapley Value to Rank Vulnerabilities on Attack Graphs: Applications to Cyberdeception -- Solving security models with perfect observability.
Record Nr. UNISA-996574257403316
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Network Games, Control, and Optimization [[electronic resource] ] : Proceedings of NETGCOOP 2018, New York, NY / / edited by Jean Walrand, Quanyan Zhu, Yezekael Hayel, Tania Jimenez
Network Games, Control, and Optimization [[electronic resource] ] : Proceedings of NETGCOOP 2018, New York, NY / / edited by Jean Walrand, Quanyan Zhu, Yezekael Hayel, Tania Jimenez
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Birkhäuser, , 2019
Descrizione fisica 1 online resource (293 pages)
Disciplina 519.3
Collana Static & Dynamic Game Theory: Foundations & Applications
Soggetto topico Game theory
System theory
Computer science—Mathematics
Computer mathematics
Game Theory, Economics, Social and Behav. Sciences
Systems Theory, Control
Mathematical Applications in Computer Science
Math Applications in Computer Science
ISBN 3-030-10880-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Pricing of Coexisting Cellular and Community Networks -- Achieving Arbitrary Throughput-Fairness Trade-offs in the Inter Cell Interference Coordination with Fixed Transmit Power Problem -- Coexistence of LTE-Unlicensed and WiFi with Optimal Channel Aggregation -- Analysis of Sponsored Data Practices in the Case of Competing Wireless Service Providers -- Media delivery competition with edge cloud, remote cloud and networking -- An Algorithmic Framework for Geo-Distributed Analytics -- The Stackelberg Equilibria of the Kelly Mechanism -- To Participate or Not in a Coalition in Adversarial Games -- On the Asymptotic Content Routing Stretch in Network of Caches: Impact of Popularity Learning -- Tiered Spectrum Measurement Markets for Licensed Secondary Spectrum -- On Incremental Passivity in Network Games -- Impact of social connectivity on herding behavior -- A truthful auction mechanism for dynamic allocation of LSA spectrum blocks for 5G -- Routing game with nonseparable costs for EV driving and charging incentive design -- The Social Medium Selection Game -- Public Good Provision Games on Networks with Resource Pooling.
Record Nr. UNINA-9910338249003321
Cham : , : Springer International Publishing : , : Imprint : Birkhäuser, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui