Decision and Game Theory for Security

9th International Conference, GameSec 2018, Seattle, WA, USA, October 29–31, 2018, Proceedings

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Decision and Game Theory for Security by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783030015541
Publisher: Springer International Publishing Publication: October 22, 2018
Imprint: Springer Language: English
Author:
ISBN: 9783030015541
Publisher: Springer International Publishing
Publication: October 22, 2018
Imprint: Springer
Language: English

The 28 revised full papers presented together with 8 short papers were carefully reviewed and selected from 44 submissions.

Among the topical areas covered were: use of game theory; control theory; and mechanism design for security and privacy; decision making for cybersecurity and security requirements engineering; security and privacy for the Internet-of-Things; cyber-physical systems; cloud computing; resilient control systems, and critical infrastructure; pricing; economic incentives; security investments, and cyber insurance for dependable and secure systems; risk assessment and security risk management; security and privacy of wireless and mobile communications, including user location privacy; sociotechnological and behavioral approaches to security; deceptive technologies in cybersecurity and privacy; empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy; and adversarial machine learning and crowdsourcing, and the role of artificial intelligence in system security.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The 28 revised full papers presented together with 8 short papers were carefully reviewed and selected from 44 submissions.

Among the topical areas covered were: use of game theory; control theory; and mechanism design for security and privacy; decision making for cybersecurity and security requirements engineering; security and privacy for the Internet-of-Things; cyber-physical systems; cloud computing; resilient control systems, and critical infrastructure; pricing; economic incentives; security investments, and cyber insurance for dependable and secure systems; risk assessment and security risk management; security and privacy of wireless and mobile communications, including user location privacy; sociotechnological and behavioral approaches to security; deceptive technologies in cybersecurity and privacy; empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy; and adversarial machine learning and crowdsourcing, and the role of artificial intelligence in system security.

More books from Springer International Publishing

Cover of the book Cultures and Contexts of Jewish Education by
Cover of the book Heterogeneous Catalysis and its Industrial Applications by
Cover of the book Data Assimilation: Mathematical Concepts and Instructive Examples by
Cover of the book Hematologic Abnormalities and Acute Lung Syndromes by
Cover of the book Algorithmic Differentiation in Finance Explained by
Cover of the book Advances in Multimedia Information Processing - PCM 2016 by
Cover of the book Interventional Treatment of Wounds by
Cover of the book Semantic Technology by
Cover of the book Landslides in Cold Regions in the Context of Climate Change by
Cover of the book Thomas Robert Malthus by
Cover of the book Explorations in the History and Heritage of Machines and Mechanisms by
Cover of the book Investor Expectations in Value Based Management by
Cover of the book The Beginning and the End by
Cover of the book Uncharted Constellations by
Cover of the book Design and Modeling of Inductors, Capacitors and Coplanar Waveguides at Tens of GHz Frequencies by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy