Decision and Game Theory for Security

9th International Conference, GameSec 2018, Seattle, WA, USA, October 29–31, 2018, Proceedings

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Decision and Game Theory for Security by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783030015541
Publisher: Springer International Publishing Publication: October 22, 2018
Imprint: Springer Language: English
Author:
ISBN: 9783030015541
Publisher: Springer International Publishing
Publication: October 22, 2018
Imprint: Springer
Language: English

The 28 revised full papers presented together with 8 short papers were carefully reviewed and selected from 44 submissions.

Among the topical areas covered were: use of game theory; control theory; and mechanism design for security and privacy; decision making for cybersecurity and security requirements engineering; security and privacy for the Internet-of-Things; cyber-physical systems; cloud computing; resilient control systems, and critical infrastructure; pricing; economic incentives; security investments, and cyber insurance for dependable and secure systems; risk assessment and security risk management; security and privacy of wireless and mobile communications, including user location privacy; sociotechnological and behavioral approaches to security; deceptive technologies in cybersecurity and privacy; empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy; and adversarial machine learning and crowdsourcing, and the role of artificial intelligence in system security.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The 28 revised full papers presented together with 8 short papers were carefully reviewed and selected from 44 submissions.

Among the topical areas covered were: use of game theory; control theory; and mechanism design for security and privacy; decision making for cybersecurity and security requirements engineering; security and privacy for the Internet-of-Things; cyber-physical systems; cloud computing; resilient control systems, and critical infrastructure; pricing; economic incentives; security investments, and cyber insurance for dependable and secure systems; risk assessment and security risk management; security and privacy of wireless and mobile communications, including user location privacy; sociotechnological and behavioral approaches to security; deceptive technologies in cybersecurity and privacy; empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy; and adversarial machine learning and crowdsourcing, and the role of artificial intelligence in system security.

More books from Springer International Publishing

Cover of the book Islamism, Arab Spring, and the Future of Democracy by
Cover of the book Video Analytics. Face and Facial Expression Recognition and Audience Measurement by
Cover of the book Scientific Communication Across the Iron Curtain by
Cover of the book Dental Erosion and Its Clinical Management by
Cover of the book Mathematical Paradigms of Climate Science by
Cover of the book New Business and Regulatory Strategies in the Postal Sector by
Cover of the book Data Science and Big Data: An Environment of Computational Intelligence by
Cover of the book Health Disparities in Respiratory Medicine by
Cover of the book Development and Sustainable Growth of Mauritius by
Cover of the book Clinician's Manual on Restless Legs Syndrome by
Cover of the book Bioremediation of Salt Affected Soils: An Indian Perspective by
Cover of the book Control and Operation of Grid-Connected Wind Farms by
Cover of the book Testbeds and Research Infrastructures for the Development of Networks and Communities by
Cover of the book Temperature Calculation in Fire Safety Engineering by
Cover of the book Semi-Autonomous Networks by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy