,

Decision and Game Theory for Security

5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014, Proceedings

Specificaties
Paperback, 381 blz. | Engels
Springer International Publishing | 2014e druk, 2014
ISBN13: 9783319126005
Rubricering
Springer International Publishing 2014e druk, 2014 9783319126005
Onderdeel van serie Lecture Notes in Computer Science
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

This book constitutes the refereed proceedings of the 5th International Conference on Decision and Game Theory for Security, GameSec 2014, held in Los Angeles, CA, USA, in November 2014.

The 16 revised full papers presented together with 7 short papers were carefully reviewed and selected from numerous submissions. The covered topics cover multiple facets of cyber security that include: rationality of adversary, game-theoretic cryptographic techniques, vulnerability discovery and assessment, multi-goal security analysis, secure computation, economic-oriented security, and surveillance for security. Those aspects are covered in a multitude of domains that include networked systems, wireless communications, border patrol security, and control systems.

Specificaties

ISBN13:9783319126005
Taal:Engels
Bindwijze:paperback
Aantal pagina's:381
Uitgever:Springer International Publishing
Druk:2014

Inhoudsopgave

<p>Defending Against Opportunistic Criminals: New Game-Theoretic Frameworks and Algorithms.- Addressing Scalability and Robustness in Security Games with Multiple Boundedly Rational Adversaries.- Empirical Game-Theoretic Analysis of an Adaptive Cyber-Defense Scenario.- Strategic Discovery and Sharing of Vulnerabilities in Competitive Environments.- Optimal Contracts for Outsourced Computation.- A Supervisory Control Approach to Dynamic Cyber-Security.- Numerical Computation of Multi-goal Security Strategies.- Realizable Rational Multiparty Cryptographic Protocols.- Limiting Adversarial Budget in Quantitative Security Assessment.- FlipThem: Modeling Targeted Attacks with FlipIt for Multiple Resources.- Secure Message Delivery Games for Device-to-Device Communications.- A Three-Stage Colonel Blotto Game: When to Provide More Information to an Adversary.- Toward Optimal Network Topology Design for Fast and Secure Distributed Computation.- An Economic Model and Simulation Results of App Adoption Decisions on Networks with Interdependent Privacy Consequences.- Cybersecurity Games and Investments: A Decision Support Approach.- Data Integrity and Availability Verification Game in Untrusted Cloud Storage.- Empirical Comparisons of Descriptive Multi-objective Adversary Models in Stackelberg Security Games.- A Dynamic Bayesian Security Game Framework for Strategic Defense Mechanism Design.- Can Less Be More? A Game-Theoretic Analysis of Filtering vs. Investment.- Online Learning Methods for Border Patrol Resource Allocation.- A Distributed Optimization Algorithm for Attack-Resilient Wide-Area Monitoring of Power Systems: Theoretical and Experimental Methods.- Testing for Hardware Trojans: A Game-Theoretic Approach.- Surveillance for Security as a Pursuit-Evasion Game.</p>

Rubrieken

    Personen

      Trefwoorden

        Decision and Game Theory for Security