|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-319-25594-1 |
003 |
DE-He213 |
005 |
20220115042743.0 |
007 |
cr nn 008mamaa |
008 |
151111s2015 sz | s |||| 0|eng d |
020 |
|
|
|a 9783319255941
|9 978-3-319-25594-1
|
024 |
7 |
|
|a 10.1007/978-3-319-25594-1
|2 doi
|
050 |
|
4 |
|a QA76.76.A65
|
072 |
|
7 |
|a UB
|2 bicssc
|
072 |
|
7 |
|a COM032000
|2 bisacsh
|
072 |
|
7 |
|a UX
|2 thema
|
082 |
0 |
4 |
|a 005.3
|2 23
|
245 |
1 |
0 |
|a Decision and Game Theory for Security
|h [electronic resource] :
|b 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedings /
|c edited by Arman (MHR) Khouzani, Emmanouil Panaousis, George Theodorakopoulos.
|
250 |
|
|
|a 1st ed. 2015.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2015.
|
300 |
|
|
|a X, 371 p. 90 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 9406
|
520 |
|
|
|a This book constitutes the refereed proceedings of the 6th International Conference on Decision and Game Theory for Security, GameSec 2015, held in London, UK, in November 2015. The 16 revised full papers presented together with 5 short papers were carefully reviewed and selected from 37 submissions. Game and decision theory has emerged as a valuable systematic framework with powerful analytical tools in dealing with the intricacies involved in making sound and sensible security decisions. For instance, game theory provides methodical approaches to account for interdependencies of security decisions, the role of hidden and asymmetric information, the perception of risks and costs in human behaviour, the incentives/limitations of the attackers, and much more. Combined with our classical approach to computer and network security, and drawing from various fields such as economic, social and behavioural sciences, game and decision theory is playing a fundamental role in the development of the pillars of the "science of security".
|
650 |
|
0 |
|a Application software.
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Algorithms.
|
650 |
|
0 |
|a Electronic data processing-Management.
|
650 |
|
0 |
|a Game theory.
|
650 |
1 |
4 |
|a Computer and Information Systems Applications.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a Algorithms.
|
650 |
2 |
4 |
|a IT Operations.
|
650 |
2 |
4 |
|a Game Theory.
|
700 |
1 |
|
|a Khouzani, Arman (MHR).
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Panaousis, Emmanouil.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Theodorakopoulos, George.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319255934
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319255958
|
830 |
|
0 |
|a Security and Cryptology ;
|v 9406
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-319-25594-1
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|