Dynamic Games for Network Security

Nonfiction, Science & Nature, Technology, Telecommunications, Computers, Networking & Communications, Computer Security
Cover of the book Dynamic Games for Network Security by Xiaofan He, Huaiyu Dai, Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Xiaofan He, Huaiyu Dai ISBN: 9783319758718
Publisher: Springer International Publishing Publication: February 28, 2018
Imprint: Springer Language: English
Author: Xiaofan He, Huaiyu Dai
ISBN: 9783319758718
Publisher: Springer International Publishing
Publication: February 28, 2018
Imprint: Springer
Language: English

The goal of this SpringerBrief is to collect and systematically present the state-of-the-art in this research field and the underlying game-theoretic and learning tools to the broader audience with general network security and engineering backgrounds. Particularly, the exposition of this book begins with a brief introduction of relevant background knowledge in Chapter 1, followed by a review of existing applications of SG in addressing various dynamic network security problems in Chapter 2.

 A detailed treatment of dynamic security games with information asymmetry is given in Chapters 3–5. Specifically, dynamic security games with extra information that concerns security competitions, where the defender has an informational advantage over the adversary are discussed in Chapter 3.

 The complementary scenarios where the defender lacks information about the adversary is examined in Chapter 4 through the lens of incomplete information SG. Chapter 5 is devoted to the exploration of how to proactively create information asymmetry for the defender’s benefit.

The primary audience for this brief includes network engineers interested in security decision-making in dynamic network security problems. Researchers interested in the state-of-the-art research on stochastic game theory and its applications in network security will be interested in this SpringerBrief as well. Also graduate and undergraduate students interested in obtaining comprehensive information on stochastic game theory and applying it to address relevant research problems can use this SpringerBrief as a study guide. Lastly, concluding remarks and our perspective for future works are presented in Chapter 6.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The goal of this SpringerBrief is to collect and systematically present the state-of-the-art in this research field and the underlying game-theoretic and learning tools to the broader audience with general network security and engineering backgrounds. Particularly, the exposition of this book begins with a brief introduction of relevant background knowledge in Chapter 1, followed by a review of existing applications of SG in addressing various dynamic network security problems in Chapter 2.

 A detailed treatment of dynamic security games with information asymmetry is given in Chapters 3–5. Specifically, dynamic security games with extra information that concerns security competitions, where the defender has an informational advantage over the adversary are discussed in Chapter 3.

 The complementary scenarios where the defender lacks information about the adversary is examined in Chapter 4 through the lens of incomplete information SG. Chapter 5 is devoted to the exploration of how to proactively create information asymmetry for the defender’s benefit.

The primary audience for this brief includes network engineers interested in security decision-making in dynamic network security problems. Researchers interested in the state-of-the-art research on stochastic game theory and its applications in network security will be interested in this SpringerBrief as well. Also graduate and undergraduate students interested in obtaining comprehensive information on stochastic game theory and applying it to address relevant research problems can use this SpringerBrief as a study guide. Lastly, concluding remarks and our perspective for future works are presented in Chapter 6.

More books from Springer International Publishing

Cover of the book Eppur si muove: Doing History and Philosophy of Science with Peter Machamer by Xiaofan He, Huaiyu Dai
Cover of the book Semantic Web Challenges by Xiaofan He, Huaiyu Dai
Cover of the book Foundations and Practice of Security by Xiaofan He, Huaiyu Dai
Cover of the book Biomedical Research and Integrated Biobanking: An Innovative Paradigm for Heterogeneous Data Management by Xiaofan He, Huaiyu Dai
Cover of the book Information Systems Architecture and Technology: Proceedings of 37th International Conference on Information Systems Architecture and Technology – ISAT 2016 – Part II by Xiaofan He, Huaiyu Dai
Cover of the book A Tissue Regeneration Approach to Bone and Cartilage Repair by Xiaofan He, Huaiyu Dai
Cover of the book Religion and Identity in the Post-9/11 Vampire by Xiaofan He, Huaiyu Dai
Cover of the book Recent Advances in Computational Methods and Clinical Applications for Spine Imaging by Xiaofan He, Huaiyu Dai
Cover of the book Hybrid Intelligent Systems by Xiaofan He, Huaiyu Dai
Cover of the book Software Technologies by Xiaofan He, Huaiyu Dai
Cover of the book E-Learning, E-Education, and Online Training by Xiaofan He, Huaiyu Dai
Cover of the book Disease Ecology by Xiaofan He, Huaiyu Dai
Cover of the book Hypogene Karst Regions and Caves of the World by Xiaofan He, Huaiyu Dai
Cover of the book Innovation in Clusters by Xiaofan He, Huaiyu Dai
Cover of the book Nano-size Polymers by Xiaofan He, Huaiyu Dai
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy