Cargando…

Decision and Game Theory for Security First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings /

Securing complex and networked systems has become increasingly important as these systems play an indispensable role in modern life at the turn of the - formation age. Concurrently, security of ubiquitous communication, data, and computing poses novel research challenges. Security is a multi-faceted...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Alpcan, Tansu (Editor ), Buttyán, Levente (Editor ), Baras, John S. (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2010.
Edición:1st ed. 2010.
Colección:Security and Cryptology ; 6442
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Security Investments and Planning
  • Design of Network Topology in an Adversarial Environment
  • Optimal Information Security Investment with Penetration Testing
  • Privacy and Anonymity
  • Tracking Games in Mobile Networks
  • gPath: A Game-Theoretic Path Selection Algorithm to Protect Tor's Anonymity
  • When Do Firms Invest in Privacy-Preserving Technologies?
  • Adversarial and Robust Control
  • Adversarial Control in a Delay Tolerant Network
  • Security Interdependencies for Networked Control Systems with Identical Agents
  • Robust Control in Sparse Mobile Ad-Hoc Networks
  • Network Security and Botnets
  • A Game-Theoretical Approach for Finding Optimal Strategies in a Botnet Defense Model
  • ISPs and Ad Networks Against Botnet Ad Fraud
  • A Localization Game in Wireless Sensor Networks
  • Effective Multimodel Anomaly Detection Using Cooperative Negotiation
  • Authorization and Authentication
  • The Password Game: Negative Externalities from Weak Password Practices
  • Towards a Game Theoretic Authorisation Model
  • Theory and Algorithms for Security
  • Disperse or Unite? A Mathematical Model of Coordinated Attack
  • Uncertainty in Interdependent Security Games
  • Attack-Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent
  • Methods and Algorithms for Infinite Bayesian Stackelberg Security Games.