Normal view MARC view ISBD view

Decision and Game Theory for Security [electronic resource] : 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings / edited by Linda Bushnell, Radha Poovendran, Tamer Başar.

Contributor(s): Bushnell, Linda [editor.] | Poovendran, Radha [editor.] | Başar, Tamer [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Security and Cryptology: 11199Publisher: Cham : Springer International Publishing : Imprint: Springer, 2018Edition: 1st ed. 2018.Description: XIII, 638 p. 174 illus. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783030015541.Subject(s): Data protection | Artificial intelligence | Computer networks  | Application software | Electronic commerce | Data and Information Security | Artificial Intelligence | Computer Communication Networks | Computer and Information Systems Applications | e-Commerce and e-BusinessAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.8 Online resources: Click here to access online
Contents:
Use of game theory -- Control theory and mechanism design for security and privacy -- Decision making for cybersecurity and security requirements engineering -- Security and privacy for the Internet-of-Things -- Cyber-physical systems -- cloud computing -- Resilient control systems, and critical infrastructure -- Pricing -- Economic incentives -- Security investments, and cyber insurance for dependable and secure systems -- Risk assessment and security risk management -- Security and privacy of wireless and mobile communications, including user location privacy -- Sociotechnological and behavioral approaches to security -- Deceptive technologies in cybersecurity and privacy -- Empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy -- Adversarial machine learning and crowdsourcing, and the role of artificial intelligence in system security.
In: Springer Nature eBookSummary: The 28 revised full papers presented together with 8 short papers were carefully reviewed and selected from 44 submissions. Among the topical areas covered were: use of game theory; control theory; and mechanism design for security and privacy; decision making for cybersecurity and security requirements engineering; security and privacy for the Internet-of-Things; cyber-physical systems; cloud computing; resilient control systems, and critical infrastructure; pricing; economic incentives; security investments, and cyber insurance for dependable and secure systems; risk assessment and security risk management; security and privacy of wireless and mobile communications, including user location privacy; sociotechnological and behavioral approaches to security; deceptive technologies in cybersecurity and privacy; empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy; and adversarial machine learning and crowdsourcing, and the role of artificial intelligence in system security.
    average rating: 0.0 (0 votes)
No physical items for this record

Use of game theory -- Control theory and mechanism design for security and privacy -- Decision making for cybersecurity and security requirements engineering -- Security and privacy for the Internet-of-Things -- Cyber-physical systems -- cloud computing -- Resilient control systems, and critical infrastructure -- Pricing -- Economic incentives -- Security investments, and cyber insurance for dependable and secure systems -- Risk assessment and security risk management -- Security and privacy of wireless and mobile communications, including user location privacy -- Sociotechnological and behavioral approaches to security -- Deceptive technologies in cybersecurity and privacy -- Empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy -- Adversarial machine learning and crowdsourcing, and the role of artificial intelligence in system security.

The 28 revised full papers presented together with 8 short papers were carefully reviewed and selected from 44 submissions. Among the topical areas covered were: use of game theory; control theory; and mechanism design for security and privacy; decision making for cybersecurity and security requirements engineering; security and privacy for the Internet-of-Things; cyber-physical systems; cloud computing; resilient control systems, and critical infrastructure; pricing; economic incentives; security investments, and cyber insurance for dependable and secure systems; risk assessment and security risk management; security and privacy of wireless and mobile communications, including user location privacy; sociotechnological and behavioral approaches to security; deceptive technologies in cybersecurity and privacy; empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy; and adversarial machine learning and crowdsourcing, and the role of artificial intelligence in system security.

There are no comments for this item.

Log in to your account to post a comment.