Decision and Game Theory for Security

9th International Conference, GameSec 2018, Seattle, WA, USA, October 29–31, 2018, Proceedings

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Decision and Game Theory for Security by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783030015541
Publisher: Springer International Publishing Publication: October 22, 2018
Imprint: Springer Language: English
Author:
ISBN: 9783030015541
Publisher: Springer International Publishing
Publication: October 22, 2018
Imprint: Springer
Language: English

The 28 revised full papers presented together with 8 short papers were carefully reviewed and selected from 44 submissions.

Among the topical areas covered were: use of game theory; control theory; and mechanism design for security and privacy; decision making for cybersecurity and security requirements engineering; security and privacy for the Internet-of-Things; cyber-physical systems; cloud computing; resilient control systems, and critical infrastructure; pricing; economic incentives; security investments, and cyber insurance for dependable and secure systems; risk assessment and security risk management; security and privacy of wireless and mobile communications, including user location privacy; sociotechnological and behavioral approaches to security; deceptive technologies in cybersecurity and privacy; empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy; and adversarial machine learning and crowdsourcing, and the role of artificial intelligence in system security.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The 28 revised full papers presented together with 8 short papers were carefully reviewed and selected from 44 submissions.

Among the topical areas covered were: use of game theory; control theory; and mechanism design for security and privacy; decision making for cybersecurity and security requirements engineering; security and privacy for the Internet-of-Things; cyber-physical systems; cloud computing; resilient control systems, and critical infrastructure; pricing; economic incentives; security investments, and cyber insurance for dependable and secure systems; risk assessment and security risk management; security and privacy of wireless and mobile communications, including user location privacy; sociotechnological and behavioral approaches to security; deceptive technologies in cybersecurity and privacy; empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy; and adversarial machine learning and crowdsourcing, and the role of artificial intelligence in system security.

More books from Springer International Publishing

Cover of the book Computer Vision Analysis of Image Motion by Variational Methods by
Cover of the book Proceedings of the 3rd International Conference on Intelligent Technologies and Engineering Systems (ICITES2014) by
Cover of the book Rapid Mashup Development Tools by
Cover of the book A Journey through Manufacturing and Supply Chain Strategy Research by
Cover of the book Quantitative Recombination and Transport Properties in Silicon from Dynamic Luminescence by
Cover of the book Textbook of Ocular Trauma by
Cover of the book Family Resilience and Chronic Illness by
Cover of the book Stochastic Models for Time Series by
Cover of the book Advances in Production Management Systems. Production Management for Data-Driven, Intelligent, Collaborative, and Sustainable Manufacturing by
Cover of the book Modern Trends and Techniques in Computer Science by
Cover of the book The Use of Robotic Technology in Female Pelvic Floor Reconstruction by
Cover of the book Molecular Architectonics by
Cover of the book Percutaneous Treatment of Left Side Cardiac Valves by
Cover of the book Quinoxalines by
Cover of the book Crystallization of Nanoscaled Colloids by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy