- 5 Ergebnisse
Kleinster Preis: € 52,96, größter Preis: € 71,09, Mittelwert: € 62,33
1
Decision and Game Theory for Security : 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014, Proceedings - Walid Saad
Bestellen
bei AbeBooks.de
€ 52,96
Versand: € 0,001
Bestellengesponserter Link
Walid Saad:

Decision and Game Theory for Security : 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014, Proceedings - Taschenbuch

2014, ISBN: 3319126008

[EAN: 9783319126005], Neubuch, [PU: Springer International Publishing], ATTACKER-DEFENDERGAMES; CLOUDCOMPUTING; CYBERDEFENSE; CYBERDEL; ECONOMICMODEL; GAMETHEORY; HARDWARETROJAN; MOBILENE… Mehr…

NEW BOOK. Versandkosten:Versandkostenfrei. (EUR 0.00) AHA-BUCH GmbH, Einbeck, Germany [51283250] [Rating: 5 (von 5)]
2
Decision and Game Theory for Security 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014, Proceedings - Saad, Walid (Herausgeber); Poovendran, Radha (Herausgeber)
Bestellen
bei Achtung-Buecher.de
€ 55,60
Versand: € 0,001
Bestellengesponserter Link

Saad, Walid (Herausgeber); Poovendran, Radha (Herausgeber):

Decision and Game Theory for Security 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014, Proceedings - neues Buch

2014, ISBN: 3319126008

2014 Kartoniert / Broschiert Wirtschaftsmathematik und -informatik, IT-Management, Netzwerk-Hardware, Algorithmen und Datenstrukturen, Computersicherheit, Netzwerksicherheit, Angewandte… Mehr…

Versandkosten:Versandkostenfrei innerhalb der BRD. (EUR 0.00) MARZIES.de Buch- und Medienhandel, 14621 Schönwalde-Glien
3
Decision and Game Theory for Security 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014, Proceedings - Saad, Walid (Herausgeber); Poovendran, Radha (Herausgeber)
Bestellen
bei Achtung-Buecher.de
€ 62,28
Versand: € 0,001
Bestellengesponserter Link
Saad, Walid (Herausgeber); Poovendran, Radha (Herausgeber):
Decision and Game Theory for Security 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014, Proceedings - neues Buch

2014

ISBN: 3319126008

2014 Kartoniert / Broschiert Wirtschaftsmathematik und -informatik, IT-Management, Netzwerk-Hardware, Algorithmen und Datenstrukturen, Computersicherheit, Netzwerksicherheit, Angewandte… Mehr…

Versandkosten:Versandkostenfrei innerhalb der BRD. (EUR 0.00) MARZIES.de Buch- und Medienhandel, 14621 Schönwalde-Glien
4
Bestellen
bei Biblio.co.uk
$ 75,38
(ca. € 69,71)
Versand: € 11,751
Bestellengesponserter Link
Radha Poovendran:
Decision and Game Theory for Security: 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014, Proceedings - Taschenbuch

2014, ISBN: 9783319126005

Paperback / softback. New. The covered topics cover multiple facets of cyber security that include: rationality of adversary, game-theoretic cryptographic techniques, vulnerability disco… Mehr…

Versandkosten: EUR 11.75 The Saint Bookstore
5
Bestellen
bei Biblio.co.uk
$ 76,87
(ca. € 71,09)
Versand: € 11,811
Bestellengesponserter Link
Decision and Game Theory for Security: 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014, Proceedings (Lecture Notes in Computer Science / Security and Cryptology) - Taschenbuch

2014, ISBN: 9783319126005

Springer, 2014. Paperback. New. 2014 edition. 396 pages. 9.00x6.00x1.00 inches., Springer, 2014, 6

Versandkosten: EUR 11.81 Revaluation Books

1Da einige Plattformen keine Versandkonditionen übermitteln und diese vom Lieferland, dem Einkaufspreis, dem Gewicht und der Größe des Artikels, einer möglichen Mitgliedschaft der Plattform, einer direkten Lieferung durch die Plattform oder über einen Drittanbieter (Marketplace), etc. abhängig sein können, ist es möglich, dass die von eurobuch angegebenen Versandkosten nicht mit denen der anbietenden Plattform übereinstimmen.

Bibliographische Daten des bestpassenden Buches

Details zum Buch

Detailangaben zum Buch - Decision and Game Theory for Security: 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014, Proce


EAN (ISBN-13): 9783319126005
ISBN (ISBN-10): 3319126008
Gebundene Ausgabe
Taschenbuch
Erscheinungsjahr: 2014
Herausgeber: Springer International Publishing

Buch in der Datenbank seit 2014-10-10T07:00:42+02:00 (Vienna)
Detailseite zuletzt geändert am 2023-12-10T18:53:36+01:00 (Vienna)
ISBN/EAN: 9783319126005

ISBN - alternative Schreibweisen:
3-319-12600-8, 978-3-319-12600-5
Alternative Schreibweisen und verwandte Suchbegriffe:
Autor des Buches: saad
Titel des Buches: theory game, lecture notes computer science, usa, los angeles, decision theory, november, 2014, game conference proceedings


Daten vom Verlag:

Autor/in: Radha Poovendran; Walid Saad
Titel: Lecture Notes in Computer Science; Security and Cryptology; Decision and Game Theory for Security - 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014, Proceedings
Verlag: Springer; Springer International Publishing
381 Seiten
Erscheinungsjahr: 2014-10-13
Cham; CH
Gedruckt / Hergestellt in Niederlande.
Sprache: Englisch
53,49 € (DE)
54,99 € (AT)
59,00 CHF (CH)
POD
XII, 381 p. 83 illus.

BC; Hardcover, Softcover / Informatik, EDV/Anwendungs-Software; Angewandte Informatik; Verstehen; attacker-defender games; cloud computing; cyber defense; cyber security model; economic model; game theory; hardware trojan; mobile networks; multiparty computation; online learning; optimization; security; simulation; social network sites; algorithm analysis and problem complexity; Computer and Information Systems Applications; Computer Communication Networks; Data and Information Security; Algorithms; IT Operations; Game Theory; Netzwerk-Hardware; Computersicherheit; Netzwerksicherheit; Algorithmen und Datenstrukturen; Wirtschaftsmathematik und -informatik, IT-Management; Spieltheorie; EA

This book constitutes the refereed proceedings of the 5th International Conference on Decision and Game Theory for Security, GameSec 2014, held in Los Angeles, CA, USA, in November 2014.

The 16 revised full papers presented together with 7 short papers were carefully reviewed and selected from numerous submissions. The covered topics cover multiple facets of cyber security that include: rationality of adversary, game-theoretic cryptographic techniques, vulnerability discovery and assessment, multi-goal security analysis, secure computation, economic-oriented security, and surveillance for security. Those aspects are covered in a multitude of domains that include networked systems, wireless communications, border patrol security, and control systems.

Defending Against Opportunistic Criminals: New Game-Theoretic Frameworks and Algorithms.- Addressing Scalability and Robustness in Security Games with Multiple Boundedly Rational Adversaries.- Empirical Game-Theoretic Analysis of an Adaptive Cyber-Defense Scenario.- Strategic Discovery and Sharing of Vulnerabilities in Competitive Environments.- Optimal Contracts for Outsourced Computation.- A Supervisory Control Approach to Dynamic Cyber-Security.- Numerical Computation of Multi-goal Security Strategies.- Realizable Rational Multiparty Cryptographic Protocols.- Limiting Adversarial Budget in Quantitative Security Assessment.- FlipThem: Modeling Targeted Attacks with FlipIt for Multiple Resources.- Secure Message Delivery Games for Device-to-Device Communications.- A Three-Stage Colonel Blotto Game: When to Provide More Information to an Adversary.- TowardOptimal Network Topology Design for Fast and Secure Distributed Computation.- An Economic Model and Simulation Results of App Adoption Decisions on Networks with Interdependent Privacy Consequences.- Cybersecurity Games and Investments: A Decision Support Approach.- Data Integrity and Availability Verification Game in Untrusted Cloud Storage.- Empirical Comparisons of Descriptive Multi-objective Adversary Models in Stackelberg Security Games.- A Dynamic Bayesian Security Game Framework for Strategic Defense Mechanism Design.- Can Less Be More? A Game-Theoretic Analysis of Filtering vs. Investment.- Online Learning Methods for Border Patrol Resource Allocation.- A Distributed Optimization Algorithm for Attack-Resilient Wide-Area Monitoring of Power Systems: Theoretical and Experimental Methods.- Testing for Hardware Trojans: A Game-Theoretic Approach.- Surveillance for Security as a Pursuit-Evasion Game.



< zum Archiv...