Decision and Game Theory for Security
Springer International Publishing (Verlag)
978-3-031-50669-7 (ISBN)
The 19 full papers and 4 short papers included in this book were carefully reviewed and selected from 33 submissions. They were organized in topical sections as follows: Mechanism design and imperfect information, Security Games, Learning in security games, Cyber deception, Economics of security, Information and privacy and Short articles.
Mechanism design and imperfect information.- Observable Perfect Equilibrium.- Playing Repeated Coopetitive Polymatrix Games with Small Manipulation Cost.- Rule Enforcing Through Ordering.- Security Games.- Multi-defender Security Games with Schedules.- Asymmetric Centrality Game against Network Epidemic Propagation.- Shades of Grey: Strategic Bimatrix Stopping Games for Modelling (Un)Ethical Hacking Roles.- Learning in security games.- Characterizing and Improving the Robustness of Predict-Then-Optimize Frameworks.- Quantisation Effects in Adversarial Cyber-Physical GamesTakuma Adams.- Scalable Learning of Intrusion Responses through Recursive Decomposition.- Cyber deception.- Honeypot Allocation for Cyber Deception in Dynamic Tactical Networks: A Game Theoretic Approach.- Optimal Resource Allocation for Proactive Defense with Deception in Probabilistic Attack Graphs.- The Credential is Not Enough: Combining Honeypots and Fake Credentials for Cyber-Defense.- Economics of security.- Does Cyber-insurance Benefit the Insured or the Attacker? -- A Game of Cyber-Insurance.- Rational Broadcast Protocols against Timid Adversaries.- FlipPath Game to Counter Stealthy Attacks in SDN-based Tactical Networks.- Information and privacy.- Double-sided Information Asymmetry in Double Extortion Ransomware.- Opacity-enforcing active perception and control against eavesdropping attacks.- A Game-Theoretic Analysis of Auditing Differentially Private Algorithms with Epistemically Disparate Herd.- Modeling and Analysis of a Nonlinear Security Game with Mixed Armament.- Short articles.- Incentive-Based Software Security: Fair Micro-Payments for Writing Secure Code.- Using Game Theory Approach for COVID-19 Risk Analysis and Medical Resource Allocation.- Shapley Value to Rank Vulnerabilities on Attack Graphs: Applications to Cyberdeception.- Solving security models with perfect observability.
Erscheinungsdatum | 31.12.2023 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science |
Zusatzinfo | XXIX, 390 p. 95 illus., 76 illus. in color. |
Verlagsort | Cham |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 632 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Schlagworte | Artificial Intelligence • behavioral science • biases • Cloud Computing • computer crime • Computer Networks • Computer Security • Control • Cyber-Physical Systems • Decision and game theory for blockchain security • Decision Making • Game-theoretic for the control of epidemics/virus propagation • Game Theory • Heuristics • Learning in games for security • mechanism design for security and privacy • risk assessment • Security Risk Management • Socio-technological and behavioral approaches to security • user location privacy |
ISBN-10 | 3-031-50669-3 / 3031506693 |
ISBN-13 | 978-3-031-50669-7 / 9783031506697 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich