Game Theory for Security and Risk Management

From Theory to Practice

Nonfiction, Science & Nature, Mathematics, Game Theory, Business & Finance, Management & Leadership, Operations Research
Cover of the book Game Theory for Security and Risk Management by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783319752686
Publisher: Springer International Publishing Publication: July 6, 2018
Imprint: Birkhäuser Language: English
Author:
ISBN: 9783319752686
Publisher: Springer International Publishing
Publication: July 6, 2018
Imprint: Birkhäuser
Language: English

The chapters in this volume explore how various methods from game theory can be utilized to optimize security and risk-management strategies.  Emphasizing the importance of connecting theory and practice, they detail the steps involved in selecting, adapting, and analyzing game-theoretic models in security engineering and provide case studies of successful implementations in different application domains.  Practitioners who are not experts in game theory and are uncertain about incorporating it into their work will benefit from this resource, as well as researchers in applied mathematics and computer science interested in current developments and future directions.

The first part of the book presents the theoretical basics, covering various different game-theoretic models related to and suitable for security engineering.  The second part then shows how these models are adopted, implemented, and analyzed.  Surveillance systems, interconnected networks, and power grids are among the different application areas discussed.  Finally, in the third part, case studies from business and industry of successful applications of game-theoretic models are presented, and the range of applications discussed is expanded to include such areas as cloud computing, Internet of Things, and water utility networks.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The chapters in this volume explore how various methods from game theory can be utilized to optimize security and risk-management strategies.  Emphasizing the importance of connecting theory and practice, they detail the steps involved in selecting, adapting, and analyzing game-theoretic models in security engineering and provide case studies of successful implementations in different application domains.  Practitioners who are not experts in game theory and are uncertain about incorporating it into their work will benefit from this resource, as well as researchers in applied mathematics and computer science interested in current developments and future directions.

The first part of the book presents the theoretical basics, covering various different game-theoretic models related to and suitable for security engineering.  The second part then shows how these models are adopted, implemented, and analyzed.  Surveillance systems, interconnected networks, and power grids are among the different application areas discussed.  Finally, in the third part, case studies from business and industry of successful applications of game-theoretic models are presented, and the range of applications discussed is expanded to include such areas as cloud computing, Internet of Things, and water utility networks.

More books from Springer International Publishing

Cover of the book Guide to Distributed Simulation with HLA by
Cover of the book Public Health Ethics and the Social Determinants of Health by
Cover of the book Micro and Nanophotonics for Semiconductor Infrared Detectors by
Cover of the book Smart City 360° by
Cover of the book Sectarianism and Orestes Brownson in the American Religious Marketplace by
Cover of the book Fully Nonlinear PDEs in Real and Complex Geometry and Optics by
Cover of the book Affine Diffusions and Related Processes: Simulation, Theory and Applications by
Cover of the book Long-Range Dependence and Sea Level Forecasting by
Cover of the book Computer Aided Verification by
Cover of the book Recent Trends in Data Science and Soft Computing by
Cover of the book Measuring, Interpreting and Translating Electron Quasiparticle - Phonon Interactions on the Surfaces of the Topological Insulators Bismuth Selenide and Bismuth Telluride by
Cover of the book Laborpraxis Band 2: Messmethoden by
Cover of the book Sparsity-Based Multipath Exploitation for Through-the-Wall Radar Imaging by
Cover of the book Improving GIS-based Wildlife-Habitat Analysis by
Cover of the book Knowledge Engineering and Semantic Web by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy