|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
EBSCO_ocn776163672 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
120213s2012 nyua ob 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e rda
|e pn
|c N$T
|d UIU
|d YDXCP
|d OCLCQ
|d OCLCF
|d OCLCQ
|d GZN
|d HEBIS
|d OCLCO
|d OCLCA
|d UAB
|d OCLCQ
|d OCLCA
|d INT
|d OCLCQ
|d UKAHL
|d OL$
|d OCLCQ
|d MM9
|d VLY
|d OCLCQ
|d OCLCO
|d SFB
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1162084433
|a 1171379106
|a 1241836204
|
020 |
|
|
|a 9781139206600
|q (electronic bk.)
|
020 |
|
|
|a 1139206605
|q (electronic bk.)
|
020 |
|
|
|a 9780511973031
|q (electronic bk.)
|
020 |
|
|
|a 0511973039
|q (electronic bk.)
|
020 |
|
|
|a 9781139205023
|q (electronic bk.)
|
020 |
|
|
|a 1139205021
|q (electronic bk.)
|
020 |
|
|
|a 1316090442
|
020 |
|
|
|a 9781316090442
|
020 |
|
|
|a 1280484640
|
020 |
|
|
|a 9781280484643
|
020 |
|
|
|a 9786613579621
|
020 |
|
|
|a 6613579629
|
020 |
|
|
|a 1139205811
|
020 |
|
|
|a 9781139205818
|
020 |
|
|
|a 1139203622
|
020 |
|
|
|a 9781139203623
|
020 |
|
|
|a 1139202219
|
020 |
|
|
|a 9781139202213
|
020 |
|
|
|z 9781107096424
|
020 |
|
|
|z 1107096421
|
029 |
1 |
|
|a AU@
|b 000049907943
|
029 |
1 |
|
|a NZ1
|b 14691421
|
035 |
|
|
|a (OCoLC)776163672
|z (OCoLC)1162084433
|z (OCoLC)1171379106
|z (OCoLC)1241836204
|
050 |
|
4 |
|a QA76.9.M35
|b T36 2012eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
084 |
|
|
|a COM053000
|2 bisacsh
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Tambe, Milind,
|d 1965-
|
245 |
1 |
0 |
|a Security and game theory :
|b algorithms, deployed systems, lessons learned /
|c Milind Tambe.
|
264 |
|
1 |
|a New York :
|b Cambridge University Press,
|c 2012.
|
300 |
|
|
|a 1 online resource (xiv, 319 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references (pages 297-310) and index.
|
505 |
0 |
0 |
|g 1.
|t Introduction and overview of security games /
|r Milind Tambe and Maish Jain --
|g Part I.
|t Security Experts' Perspective:
|g 2.
|t LAX: terror target: the history, the reason, the countermeasure /
|r Erroll Southers;
|g 3.
|t Maritime transportation system security and the use of game theory: a perfect match to address operational and tactical concerns /
|r Joe DiRenzo III, Ben Maule, Erik Jensen and Fred Bertsch IV --
|g Part II.
|t Deployed Applications: g4. Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport /
|r James Pita [and others];
|g 5.
|t IRIS: a tool for strategic security allocation in transportation networks /
|r Jason Tsai [and others];
|g 6.
|t GUARDS: game theoretic security allocation on a national scale /
|r James Pita [and others] --
|g Part III.
|t Efficient Algorithms for Massive Security Games:
|g 7.
|t Coordinating randomized policies for increasing security of agent systems /
|r Praveen Paruchuri [and others];
|g 8.
|t Computing optimal randomized resource allocations for massive security games /
|r Christopher Kiekintveld [and others];
|g 9.
|t Security games with arbitrary schedules: a branch-and-price approach /
|r Manish Jain [and others] --
|g Part IV.
|t Future Research:
|g 10.
|t Effective solutions for real-world Stackelberg games: when agents must deal with human uncertainties /
|r James Pita;
|g 11.
|t Approximation methods for infinite Bayesian Stackelberg games: modeling distributional payoff uncertainty /
|r Christopher Kiekintveld, Janusz Marecki and Milind Tambe;
|g 12. Stackelberg versus Nash in security games: interchangeability, equivalence, and uniqueness /
|r Zhengyu Yin [and others];
|g 13.
|t Evaluating deployed decision-support systems for security: challenges, arguments, and approaches /
|r Matthew E. Taylor, Christopher Kiekintveld and Milind Tambe.
|
520 |
|
|
|a "Global threats of terrorism, drug-smuggling and other crimes have led to a significant increase in research on game theory for security. Game theory provides a sound mathematical approach to deploy limited security resources to maximize their effectiveness. A typical approach is to randomize security schedules to avoid predictability, with the randomization using artificial intelligence techniques to take into account the importance of different targets and potential adversary reactions. This book distills the forefront of this research to provide the first and only study of long-term deployed applications of game theory for security for key organizations such as the Los Angeles International Airport police and the US Federal Air Marshals Service. The author and his research group draw from their extensive experience working with security officials to intelligently allocate limited security resources to protect targets, outlining the applications of these algorithms in research and the real world"--
|c Provided by publisher
|
588 |
0 |
|
|a Print version record.
|
546 |
|
|
|a English.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Game theory.
|
650 |
|
0 |
|a Security, International
|x Mathematical models.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
2 |
|a Game Theory
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Théorie des jeux.
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Game theory
|2 fast
|
650 |
|
7 |
|a Security, International
|x Mathematical models
|2 fast
|
650 |
|
7 |
|a Spieltheorie
|2 gnd
|
650 |
|
7 |
|a Computersicherheit
|2 gnd
|
650 |
|
7 |
|a Mathematisches Modell
|2 gnd
|
650 |
|
7 |
|a Terrorismus
|2 gnd
|
650 |
|
7 |
|a Sicherheit
|2 gnd
|
776 |
0 |
8 |
|i Print version:
|a Tambe, Milind, 1965-
|t Security and game theory.
|d New York : Cambridge University Press, 2012
|z 9781107096424
|w (DLC) 2011038733
|w (OCoLC)751798356
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=414519
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH21302475
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH26478988
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 414519
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 7480657
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 7462621
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 7349768
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 7429386
|
994 |
|
|
|a 92
|b IZTAP
|