Decision and game theory for security : 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings / Quanyan Zhu, Tansu Alpcan, Emmanouil Panaousis, Milind Tambe, William Casey (eds.).
Material type:
TextSeries: Lecture notes in computer science ; 9996. | LNCS sublibrary. SL 4, Security and cryptology.Publisher: Cham, Switzerland : Springer, 2016Description: 1 online resource (xi, 478 pages) : illustrationsContent type: - text
- computer
- online resource
- 9783319474137
- 3319474138
- GameSec 2016
- Computer security -- Congresses
- Game theory -- Congresses
- Computer science
- Computer networks
- Computer security
- Algorithms
- Management information systems
- Game theory
- Electronic Data Processing
- Computer Communication Networks
- Computer Security
- Algorithms
- Management Information Systems
- Game Theory
- Sécurité informatique -- Congrès
- Théorie des jeux -- Congrès
- Informatique
- Réseaux d'ordinateurs
- Sécurité informatique
- Algorithmes
- Systèmes d'information de gestion
- Théorie des jeux
- algorithms
- Algorithms
- Computer networks
- Computer science
- Computer security
- Game theory
- Management information systems
- 005.7 23
- QA76.76.A65
| Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds | |
|---|---|---|---|---|---|---|---|---|
eBook
|
e-Library | eBook LNCS | Available |
Network security -- Security risks and investments -- Special track-validating models -- Decision making for privacy -- Security games -- Incentives and cybersecurity mechanisms -- Intrusion detection and information limitations in security.
This book constitutes the refereed proceedings of the 7th International Conference on Decision and Game Theory for Security, GameSec 2016, held in New York, NY, USA, in November 2016. The 18 revised full papers presented together with 8 short papers and 5 poster papers were carefully reviewed and selected from 40 submissions. The papers are organized in topical sections on network security; security risks and investments; special track-validating models; decision making for privacy; security games; incentives and cybersecurity mechanisms; and intrusion detection and information limitations in security.
International conference proceedings.
Includes author index.
Includes bibliographical references and index.