000 | 03555nam a22006255i 4500 | ||
---|---|---|---|
001 | 978-3-319-25594-1 | ||
003 | DE-He213 | ||
005 | 20240730183748.0 | ||
007 | cr nn 008mamaa | ||
008 | 151111s2015 sz | s |||| 0|eng d | ||
020 |
_a9783319255941 _9978-3-319-25594-1 |
||
024 | 7 |
_a10.1007/978-3-319-25594-1 _2doi |
|
050 | 4 | _aQA76.76.A65 | |
072 | 7 |
_aUB _2bicssc |
|
072 | 7 |
_aCOM005000 _2bisacsh |
|
072 | 7 |
_aUX _2thema |
|
082 | 0 | 4 |
_a005.3 _223 |
245 | 1 | 0 |
_aDecision and Game Theory for Security _h[electronic resource] : _b6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedings / _cedited by Arman (MHR) Khouzani, Emmanouil Panaousis, George Theodorakopoulos. |
250 | _a1st ed. 2015. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2015. |
|
300 |
_aX, 371 p. 90 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v9406 |
|
520 | _aThis book constitutes the refereed proceedings of the 6th International Conference on Decision and Game Theory for Security, GameSec 2015, held in London, UK, in November 2015. The 16 revised full papers presented together with 5 short papers were carefully reviewed and selected from 37 submissions. Game and decision theory has emerged as a valuable systematic framework with powerful analytical tools in dealing with the intricacies involved in making sound and sensible security decisions. For instance, game theory provides methodical approaches to account for interdependencies of security decisions, the role of hidden and asymmetric information, the perception of risks and costs in human behaviour, the incentives/limitations of the attackers, and much more. Combined with our classical approach to computer and network security, and drawing from various fields such as economic, social and behavioural sciences, game and decision theory is playing a fundamental role in the development of the pillars of the "science of security". | ||
650 | 0 |
_aApplication software. _9133312 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aAlgorithms. _93390 |
|
650 | 0 |
_aElectronic data processing _xManagement. _9133313 |
|
650 | 0 |
_aGame theory. _96996 |
|
650 | 1 | 4 |
_aComputer and Information Systems Applications. _9133314 |
650 | 2 | 4 |
_aComputer Communication Networks. _9133315 |
650 | 2 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aAlgorithms. _93390 |
650 | 2 | 4 |
_aIT Operations. _931703 |
650 | 2 | 4 |
_aGame Theory. _96996 |
700 | 1 |
_aKhouzani, Arman (MHR). _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9133316 |
|
700 | 1 |
_aPanaousis, Emmanouil. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9133317 |
|
700 | 1 |
_aTheodorakopoulos, George. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9133318 |
|
710 | 2 |
_aSpringerLink (Online service) _9133319 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783319255934 |
776 | 0 | 8 |
_iPrinted edition: _z9783319255958 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v9406 _9133320 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-319-25594-1 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c92030 _d92030 |