Decision and Game Theory for Security
Springer Berlin (Verlag)
978-3-642-17196-3 (ISBN)
Security Investments and Planning.- Design of Network Topology in an Adversarial Environment.- Optimal Information Security Investment with Penetration Testing.- Privacy and Anonymity.- Tracking Games in Mobile Networks.- gPath: A Game-Theoretic Path Selection Algorithm to Protect Tor's Anonymity.- When Do Firms Invest in Privacy-Preserving Technologies?.- Adversarial and Robust Control.- Adversarial Control in a Delay Tolerant Network.- Security Interdependencies for Networked Control Systems with Identical Agents.- Robust Control in Sparse Mobile Ad-Hoc Networks.- Network Security and Botnets.- A Game-Theoretical Approach for Finding Optimal Strategies in a Botnet Defense Model.- ISPs and Ad Networks Against Botnet Ad Fraud.- A Localization Game in Wireless Sensor Networks.- Effective Multimodel Anomaly Detection Using Cooperative Negotiation.- Authorization and Authentication.- The Password Game: Negative Externalities from Weak Password Practices.- Towards a Game Theoretic Authorisation Model.- Theory and Algorithms for Security.- Disperse or Unite? A Mathematical Model of Coordinated Attack.- Uncertainty in Interdependent Security Games.- Attack-Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent.- Methods and Algorithms for Infinite Bayesian Stackelberg Security Games.
Erscheint lt. Verlag | 16.11.2010 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | X, 281 p. 60 illus. |
Verlagsort | Berlin |
Sprache | englisch |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Algorithm analysis and problem complexity • algorithms • approximate algorithms • Game Theory • Information Security • Networked control systems • Optimization • security |
ISBN-10 | 3-642-17196-6 / 3642171966 |
ISBN-13 | 978-3-642-17196-3 / 9783642171963 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich