Decision and Game Theory for Security First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings /

Securing complex and networked systems has become increasingly important as these systems play an indispensable role in modern life at the turn of the - formation age. Concurrently, security of ubiquitous communication, data, and computing poses novel research challenges. Security is a multi-faceted...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Alpcan, Tansu (Επιμελητής έκδοσης), Buttyán, Levente (Επιμελητής έκδοσης), Baras, John S. (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2010.
Σειρά:Lecture Notes in Computer Science, 6442
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Security Investments and Planning
  • Design of Network Topology in an Adversarial Environment
  • Optimal Information Security Investment with Penetration Testing
  • Privacy and Anonymity
  • Tracking Games in Mobile Networks
  • gPath: A Game-Theoretic Path Selection Algorithm to Protect Tor’s Anonymity
  • When Do Firms Invest in Privacy-Preserving Technologies?
  • Adversarial and Robust Control
  • Adversarial Control in a Delay Tolerant Network
  • Security Interdependencies for Networked Control Systems with Identical Agents
  • Robust Control in Sparse Mobile Ad-Hoc Networks
  • Network Security and Botnets
  • A Game-Theoretical Approach for Finding Optimal Strategies in a Botnet Defense Model
  • ISPs and Ad Networks Against Botnet Ad Fraud
  • A Localization Game in Wireless Sensor Networks
  • Effective Multimodel Anomaly Detection Using Cooperative Negotiation
  • Authorization and Authentication
  • The Password Game: Negative Externalities from Weak Password Practices
  • Towards a Game Theoretic Authorisation Model
  • Theory and Algorithms for Security
  • Disperse or Unite? A Mathematical Model of Coordinated Attack
  • Uncertainty in Interdependent Security Games
  • Attack–Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent
  • Methods and Algorithms for Infinite Bayesian Stackelberg Security Games.