Decision and Game Theory for Security

9th International Conference, GameSec 2018, Seattle, WA, USA, October 29–31, 2018, Proceedings

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Decision and Game Theory for Security by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783030015541
Publisher: Springer International Publishing Publication: October 22, 2018
Imprint: Springer Language: English
Author:
ISBN: 9783030015541
Publisher: Springer International Publishing
Publication: October 22, 2018
Imprint: Springer
Language: English

The 28 revised full papers presented together with 8 short papers were carefully reviewed and selected from 44 submissions.

Among the topical areas covered were: use of game theory; control theory; and mechanism design for security and privacy; decision making for cybersecurity and security requirements engineering; security and privacy for the Internet-of-Things; cyber-physical systems; cloud computing; resilient control systems, and critical infrastructure; pricing; economic incentives; security investments, and cyber insurance for dependable and secure systems; risk assessment and security risk management; security and privacy of wireless and mobile communications, including user location privacy; sociotechnological and behavioral approaches to security; deceptive technologies in cybersecurity and privacy; empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy; and adversarial machine learning and crowdsourcing, and the role of artificial intelligence in system security.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The 28 revised full papers presented together with 8 short papers were carefully reviewed and selected from 44 submissions.

Among the topical areas covered were: use of game theory; control theory; and mechanism design for security and privacy; decision making for cybersecurity and security requirements engineering; security and privacy for the Internet-of-Things; cyber-physical systems; cloud computing; resilient control systems, and critical infrastructure; pricing; economic incentives; security investments, and cyber insurance for dependable and secure systems; risk assessment and security risk management; security and privacy of wireless and mobile communications, including user location privacy; sociotechnological and behavioral approaches to security; deceptive technologies in cybersecurity and privacy; empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy; and adversarial machine learning and crowdsourcing, and the role of artificial intelligence in system security.

More books from Springer International Publishing

Cover of the book Fracture and Fatigue, Volume 7 by
Cover of the book Molecular Breeding of Forage and Turf by
Cover of the book Essentials of Interventional Techniques in Managing Chronic Pain by
Cover of the book Fluorescence Studies of Polymer Containing Systems by
Cover of the book Computational Diffusion MRI by
Cover of the book Voltage Control in the Future Power Transmission Systems by
Cover of the book Rock Grouting at Dam Sites by
Cover of the book The Belgian Army and Society from Independence to the Great War by
Cover of the book Mobile Networks for Biometric Data Analysis by
Cover of the book Precision Molecular Pathology of Uterine Cancer by
Cover of the book Designing Value-Creating Supply Chain Networks by
Cover of the book Modernisation of the Criminal Justice Chain and the Judicial System by
Cover of the book Louis Kriesberg: Pioneer in Peace and Constructive Conflict Resolution Studies by
Cover of the book Alternative Energy Sources and Technologies by
Cover of the book Simulation, Image Processing, and Ultrasound Systems for Assisted Diagnosis and Navigation by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy