Back to Search

Decision and Game Theory for Security: First International Conference, Gamesec 2010, Berlin, Germany, November 22-23, 2010. Proceedings

PUBLISHER Springer (11/16/2010)
PRODUCT TYPE Paperback (Paperback)

Description
Securing complex and networked systems has become increasingly important as these systems play an indispensable role in modern life at the turn of the - formation age. Concurrently, security of ubiquitous communication, data, and computing poses novel research challenges. Security is a multi-faceted problem due to the complexity of underlying hardware, software, and network inter- pendencies as well as human and social factors. It involves decision making on multiple levels and multiple time scales, given the limited resources available to both malicious attackers and administrators defending networked systems. - cision and game theory provides a rich set of analyticalmethods and approaches to address various resource allocation and decision-making problems arising in security. This edited volume contains the contributions presented at the inaugural Conference on Decision and Game Theory for Security - GameSec 2010. These 18 articles (12 full and 6 short papers) are thematically categorized into the following six sections: - "Security investments and planning" contains two articles, which present optimization methods for (security) investments when facing adversaries. - "Privacy and anonymity" has three articles discussing location privacy, - line anonymity, and economic aspects of privacy. - "Adversarial and robust control" contains three articles, which investigate security and robustness aspects of control in networks. - "Networksecurityandbotnets"hasfourarticlesfocusingondefensivestra- giesagainstbotnetsaswellasdetectionofmaliciousadversariesinnetworks. - "Authorizationandauthentication"hasanarticleonpasswordpracticesand another one presenting a game-theoretic authorization model. - "Theory and algorithms for security" containsfour articles on various th- retic and algorithmic aspects of security.
Show More
Product Format
Product Details
ISBN-13: 9783642171963
ISBN-10: 3642171966
Binding: Paperback or Softback (Trade Paperback (Us))
Content Language: English
More Product Details
Page Count: 281
Carton Quantity: 0
Product Dimensions: 6.00 x 0.60 x 9.20 inches
Weight: 0.92 pound(s)
Country of Origin: US
Subject Information
BISAC Categories
Computers | Security - General
Computers | Security - Network Security
Computers | Computer Science
Dewey Decimal: 005.8
Descriptions, Reviews, Etc.
publisher marketing
Securing complex and networked systems has become increasingly important as these systems play an indispensable role in modern life at the turn of the - formation age. Concurrently, security of ubiquitous communication, data, and computing poses novel research challenges. Security is a multi-faceted problem due to the complexity of underlying hardware, software, and network inter- pendencies as well as human and social factors. It involves decision making on multiple levels and multiple time scales, given the limited resources available to both malicious attackers and administrators defending networked systems. - cision and game theory provides a rich set of analyticalmethods and approaches to address various resource allocation and decision-making problems arising in security. This edited volume contains the contributions presented at the inaugural Conference on Decision and Game Theory for Security - GameSec 2010. These 18 articles (12 full and 6 short papers) are thematically categorized into the following six sections: - "Security investments and planning" contains two articles, which present optimization methods for (security) investments when facing adversaries. - "Privacy and anonymity" has three articles discussing location privacy, - line anonymity, and economic aspects of privacy. - "Adversarial and robust control" contains three articles, which investigate security and robustness aspects of control in networks. - "Networksecurityandbotnets"hasfourarticlesfocusingondefensivestra- giesagainstbotnetsaswellasdetectionofmaliciousadversariesinnetworks. - "Authorizationandauthentication"hasanarticleonpasswordpracticesand another one presenting a game-theoretic authorization model. - "Theory and algorithms for security" containsfour articles on various th- retic and algorithmic aspects of security.
Show More

Editor: Alpcan, Tansu
Tansu Alpcan is an Assistant Professor at the Technical University of Berlin, and is concurrently affiliated with Deutsche Telekom Laboratories. His research involves applications of distributed decision making, game theory, and control to various security and resource allocation problems in complex and networked systems. Dr Alpcan is the recipient of multiple research awards from the University of Illinois, where he obtained his PhD degree, and has numerous publications in security, networking, control, and game theory.
Show More

Editor: Buttyan, Levente
Levente Buttyan is an Associate Professor at the Department of Telecommunications, Budapest University of Technology and Economics (BME), Hungary.
Show More
List Price $54.99
Your Price  $54.44
Paperback