Decision and Game Theory for Security First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings /
Securing complex and networked systems has become increasingly important as these systems play an indispensable role in modern life at the turn of the - formation age. Concurrently, security of ubiquitous communication, data, and computing poses novel research challenges. Security is a multi-faceted...
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2010.
|
Edición: | 1st ed. 2010. |
Colección: | Security and Cryptology ;
6442 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Security Investments and Planning
- Design of Network Topology in an Adversarial Environment
- Optimal Information Security Investment with Penetration Testing
- Privacy and Anonymity
- Tracking Games in Mobile Networks
- gPath: A Game-Theoretic Path Selection Algorithm to Protect Tor's Anonymity
- When Do Firms Invest in Privacy-Preserving Technologies?
- Adversarial and Robust Control
- Adversarial Control in a Delay Tolerant Network
- Security Interdependencies for Networked Control Systems with Identical Agents
- Robust Control in Sparse Mobile Ad-Hoc Networks
- Network Security and Botnets
- A Game-Theoretical Approach for Finding Optimal Strategies in a Botnet Defense Model
- ISPs and Ad Networks Against Botnet Ad Fraud
- A Localization Game in Wireless Sensor Networks
- Effective Multimodel Anomaly Detection Using Cooperative Negotiation
- Authorization and Authentication
- The Password Game: Negative Externalities from Weak Password Practices
- Towards a Game Theoretic Authorisation Model
- Theory and Algorithms for Security
- Disperse or Unite? A Mathematical Model of Coordinated Attack
- Uncertainty in Interdependent Security Games
- Attack-Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent
- Methods and Algorithms for Infinite Bayesian Stackelberg Security Games.