000 | 03118nam a22006135i 4500 | ||
---|---|---|---|
001 | 978-3-319-12601-2 | ||
003 | DE-He213 | ||
005 | 20240730190532.0 | ||
007 | cr nn 008mamaa | ||
008 | 141003s2014 sz | s |||| 0|eng d | ||
020 |
_a9783319126012 _9978-3-319-12601-2 |
||
024 | 7 |
_a10.1007/978-3-319-12601-2 _2doi |
|
050 | 4 | _aQA76.76.A65 | |
072 | 7 |
_aUB _2bicssc |
|
072 | 7 |
_aCOM005000 _2bisacsh |
|
072 | 7 |
_aUX _2thema |
|
082 | 0 | 4 |
_a005.3 _223 |
245 | 1 | 0 |
_aDecision and Game Theory for Security _h[electronic resource] : _b5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014, Proceedings / _cedited by Radha Poovendran, Walid Saad. |
250 | _a1st ed. 2014. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2014. |
|
300 |
_aXII, 381 p. 83 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v8840 |
|
520 | _aThis book constitutes the refereed proceedings of the 5th International Conference on Decision and Game Theory for Security, GameSec 2014, held in Los Angeles, CA, USA, in November 2014. The 16 revised full papers presented together with 7 short papers were carefully reviewed and selected from numerous submissions. The covered topics cover multiple facets of cyber security that include: rationality of adversary, game-theoretic cryptographic techniques, vulnerability discovery and assessment, multi-goal security analysis, secure computation, economic-oriented security, and surveillance for security. Those aspects are covered in a multitude of domains that include networked systems, wireless communications, border patrol security, and control systems. | ||
650 | 0 |
_aApplication software. _9142865 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aAlgorithms. _93390 |
|
650 | 0 |
_aElectronic data processing _xManagement. _9142866 |
|
650 | 0 |
_aGame theory. _96996 |
|
650 | 1 | 4 |
_aComputer and Information Systems Applications. _9142867 |
650 | 2 | 4 |
_aComputer Communication Networks. _9142868 |
650 | 2 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aAlgorithms. _93390 |
650 | 2 | 4 |
_aIT Operations. _931703 |
650 | 2 | 4 |
_aGame Theory. _96996 |
700 | 1 |
_aPoovendran, Radha. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9142869 |
|
700 | 1 |
_aSaad, Walid. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9142870 |
|
710 | 2 |
_aSpringerLink (Online service) _9142871 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783319126005 |
776 | 0 | 8 |
_iPrinted edition: _z9783319126029 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v8840 _9142872 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-319-12601-2 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c93305 _d93305 |