Game Theory for Security and Risk Management From Theory to Practice /

The chapters in this volume explore how various methods from game theory can be utilized to optimize security and risk-management strategies. Emphasizing the importance of connecting theory and practice, they detail the steps involved in selecting, adapting, and analyzing game-theoretic models in se...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Rass, Stefan (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Schauer, Stefan (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Cham : Springer International Publishing : Imprint: Birkhäuser, 2018.
Έκδοση:1st ed. 2018.
Σειρά:Static & Dynamic Game Theory: Foundations & Applications,
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 05245nam a2200577 4500
001 978-3-319-75268-6
003 DE-He213
005 20200119021341.0
007 cr nn 008mamaa
008 180706s2018 gw | s |||| 0|eng d
020 |a 9783319752686  |9 978-3-319-75268-6 
024 7 |a 10.1007/978-3-319-75268-6  |2 doi 
040 |d GrThAP 
050 4 |a HB144 
050 4 |a QA269-272 
072 7 |a PBUD  |2 bicssc 
072 7 |a MAT011000  |2 bisacsh 
072 7 |a PBUD  |2 thema 
082 0 4 |a 519  |2 23 
245 1 0 |a Game Theory for Security and Risk Management  |h [electronic resource] :  |b From Theory to Practice /  |c edited by Stefan Rass, Stefan Schauer. 
250 |a 1st ed. 2018. 
264 1 |a Cham :  |b Springer International Publishing :  |b Imprint: Birkhäuser,  |c 2018. 
300 |a XXXII, 418 p. 108 illus., 42 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Static & Dynamic Game Theory: Foundations & Applications,  |x 2363-8516 
505 0 |a Part I: Theory -- Utilizing Game Theory for Security Risk Assessment -- Decision Making when Consequences are Random -- Security Strategies and Multi-Criteria Decision Making -- A Scalable Decomposition Method for the Dynamic Defense of Cyber Networks -- Factored Markov Game Theory for Secure Interdependent Infrastructure Networks -- Part II: Practice -- G-DPS: A Game-Theoretical Decision-Making Framework for Physical Surveillance Games -- A Game-Theoretic Framework for Securing Interdependent Assets in Networks -- Random Damage in interconnected Networks -- Optimal Dispatch of Electric Transmission Systems Considering Interdependencies with Natural Gas Systems -- Managing Security Risks Interdependencies between ICT and Electric Infrastructures: A Game-Theoretical Analysis -- Part III: Case Studies -- Security and Interdependency in a Public Cloud: A Game-Theoretic Approach -- A Risk Management Approach for Highly Interconnected Networks -- Protecting Water Utility Networks from Advanced Persistent Threats: A Case Study -- Assessing the Impact of Malware Attacks in Utility Networks -- Game-Theoretic Optimization for Physical Surveillance of Critical Infrastructures: A Case Study -- Smart SECPLAN: A Process Implementation Tool for Hybrid Risk Management. 
520 |a The chapters in this volume explore how various methods from game theory can be utilized to optimize security and risk-management strategies. Emphasizing the importance of connecting theory and practice, they detail the steps involved in selecting, adapting, and analyzing game-theoretic models in security engineering and provide case studies of successful implementations in different application domains. Practitioners who are not experts in game theory and are uncertain about incorporating it into their work will benefit from this resource, as well as researchers in applied mathematics and computer science interested in current developments and future directions. The first part of the book presents the theoretical basics, covering various different game-theoretic models related to and suitable for security engineering. The second part then shows how these models are adopted, implemented, and analyzed. Surveillance systems, interconnected networks, and power grids are among the different application areas discussed. Finally, in the third part, case studies from business and industry of successful applications of game-theoretic models are presented, and the range of applications discussed is expanded to include such areas as cloud computing, Internet of Things, and water utility networks. 
650 0 |a Game theory. 
650 0 |a Operations research. 
650 0 |a Management science. 
650 0 |a Computer security. 
650 0 |a Decision making. 
650 1 4 |a Game Theory, Economics, Social and Behav. Sciences.  |0 http://scigraph.springernature.com/things/product-market-codes/M13011 
650 2 4 |a Operations Research, Management Science.  |0 http://scigraph.springernature.com/things/product-market-codes/M26024 
650 2 4 |a Systems and Data Security.  |0 http://scigraph.springernature.com/things/product-market-codes/I28060 
650 2 4 |a Operations Research/Decision Theory.  |0 http://scigraph.springernature.com/things/product-market-codes/521000 
650 2 4 |a Game Theory.  |0 http://scigraph.springernature.com/things/product-market-codes/W29020 
700 1 |a Rass, Stefan.  |e editor.  |0 (orcid)0000-0003-2821-2489  |1 https://orcid.org/0000-0003-2821-2489  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Schauer, Stefan.  |e editor.  |0 (orcid)0000-0003-4446-9081  |1 https://orcid.org/0000-0003-4446-9081  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783319752679 
776 0 8 |i Printed edition:  |z 9783319752693 
776 0 8 |i Printed edition:  |z 9783030091866 
830 0 |a Static & Dynamic Game Theory: Foundations & Applications,  |x 2363-8516 
856 4 0 |u https://doi.org/10.1007/978-3-319-75268-6  |z Full Text via HEAL-Link 
912 |a ZDB-2-SMA 
950 |a Mathematics and Statistics (Springer-11649)