000 | 03563nam a22006615i 4500 | ||
---|---|---|---|
001 | 978-3-319-47413-7 | ||
003 | DE-He213 | ||
005 | 20240730173824.0 | ||
007 | cr nn 008mamaa | ||
008 | 161004s2016 sz | s |||| 0|eng d | ||
020 |
_a9783319474137 _9978-3-319-47413-7 |
||
024 | 7 |
_a10.1007/978-3-319-47413-7 _2doi |
|
050 | 4 | _aQA76.76.A65 | |
072 | 7 |
_aUB _2bicssc |
|
072 | 7 |
_aCOM005000 _2bisacsh |
|
072 | 7 |
_aUX _2thema |
|
082 | 0 | 4 |
_a005.3 _223 |
245 | 1 | 0 |
_aDecision and Game Theory for Security _h[electronic resource] : _b7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings / _cedited by Quanyan Zhu, Tansu Alpcan, Emmanouil Panaousis, Milind Tambe, William Casey. |
250 | _a1st ed. 2016. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2016. |
|
300 |
_aXI, 478 p. 137 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v9996 |
|
505 | 0 | _aNetwork security -- Security risks and investments -- Special track-validating models -- Decision making for privacy -- Security games -- Incentives and cybersecurity mechanisms -- Intrusion detection and information limitations in security. | |
520 | _aThis book constitutes the refereed proceedings of the 7th International Conference on Decision and Game Theory for Security, GameSec 2016, held in New York, NY, USA, in November 2016. The 18 revised full papers presented together with 8 short papers and 5 poster papers were carefully reviewed and selected from 40 submissions. The papers are organized in topical sections on network security; security risks and investments; special track-validating models; decision making for privacy; security games; incentives and cybersecurity mechanisms; and intrusion detection and information limitations in security. | ||
650 | 0 |
_aApplication software. _9109891 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aAlgorithms. _93390 |
|
650 | 0 |
_aElectronic data processing _xManagement. _9109892 |
|
650 | 0 |
_aGame theory. _96996 |
|
650 | 1 | 4 |
_aComputer and Information Systems Applications. _9109893 |
650 | 2 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aComputer Communication Networks. _9109894 |
650 | 2 | 4 |
_aAlgorithms. _93390 |
650 | 2 | 4 |
_aIT Operations. _931703 |
650 | 2 | 4 |
_aGame Theory. _96996 |
700 | 1 |
_aZhu, Quanyan. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9109895 |
|
700 | 1 |
_aAlpcan, Tansu. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9109896 |
|
700 | 1 |
_aPanaousis, Emmanouil. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9109897 |
|
700 | 1 |
_aTambe, Milind. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9109898 |
|
700 | 1 |
_aCasey, William. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9109899 |
|
710 | 2 |
_aSpringerLink (Online service) _9109900 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783319474120 |
776 | 0 | 8 |
_iPrinted edition: _z9783319474144 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v9996 _9109901 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-319-47413-7 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c89115 _d89115 |