Decision and Game Theory for Security

9th International Conference, GameSec 2018, Seattle, WA, USA, October 29–31, 2018, Proceedings

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Decision and Game Theory for Security by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783030015541
Publisher: Springer International Publishing Publication: October 22, 2018
Imprint: Springer Language: English
Author:
ISBN: 9783030015541
Publisher: Springer International Publishing
Publication: October 22, 2018
Imprint: Springer
Language: English

The 28 revised full papers presented together with 8 short papers were carefully reviewed and selected from 44 submissions.

Among the topical areas covered were: use of game theory; control theory; and mechanism design for security and privacy; decision making for cybersecurity and security requirements engineering; security and privacy for the Internet-of-Things; cyber-physical systems; cloud computing; resilient control systems, and critical infrastructure; pricing; economic incentives; security investments, and cyber insurance for dependable and secure systems; risk assessment and security risk management; security and privacy of wireless and mobile communications, including user location privacy; sociotechnological and behavioral approaches to security; deceptive technologies in cybersecurity and privacy; empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy; and adversarial machine learning and crowdsourcing, and the role of artificial intelligence in system security.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The 28 revised full papers presented together with 8 short papers were carefully reviewed and selected from 44 submissions.

Among the topical areas covered were: use of game theory; control theory; and mechanism design for security and privacy; decision making for cybersecurity and security requirements engineering; security and privacy for the Internet-of-Things; cyber-physical systems; cloud computing; resilient control systems, and critical infrastructure; pricing; economic incentives; security investments, and cyber insurance for dependable and secure systems; risk assessment and security risk management; security and privacy of wireless and mobile communications, including user location privacy; sociotechnological and behavioral approaches to security; deceptive technologies in cybersecurity and privacy; empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy; and adversarial machine learning and crowdsourcing, and the role of artificial intelligence in system security.

More books from Springer International Publishing

Cover of the book Special Relativity by
Cover of the book Point Processes for Reliability Analysis by
Cover of the book Visualising the Charge and Cooper-Pair Density Waves in Cuprates by
Cover of the book Studies in Philosophical Realism in Art, Design and Education by
Cover of the book Reversible and Quantum Circuits by
Cover of the book Russia and the European Union by
Cover of the book Structural Nonlinear Dynamics and Diagnosis by
Cover of the book Land, Labour and Livelihoods by
Cover of the book Bioactive Polysaccharide Materials for Modern Wound Healing by
Cover of the book Mindful Medical Practitioners by
Cover of the book Rethinking the Irish Diaspora by
Cover of the book Trapping of Small Organisms Moving Randomly by
Cover of the book A Longitudinal Approach to Family Trajectories in France by
Cover of the book Performance Evaluation and Benchmarking for the Era of Artificial Intelligence by
Cover of the book Developing and Evaluating a Cloud Service Relationship Theory by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy