Decision and Game Theory for Security: 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014, Proceedings by Radha PoovendranDecision and Game Theory for Security: 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014, Proceedings by Radha Poovendran

Decision and Game Theory for Security: 5th International Conference, GameSec 2014, Los Angeles, CA…

byRadha PoovendranEditorWalid Saad

Paperback | October 13, 2014

Pricing and Purchase Info

$82.52 online 
$96.95 list price save 14%
Earn 413 plum® points

Prices and offers may vary in store

Quantity:

In stock online

Ships free on orders over $25

Not available in stores

about

This book constitutes the refereed proceedings of the 5th International Conference on Decision and Game Theory for Security, GameSec 2014, held in Los Angeles, CA, USA, in November 2014.

The 16 revised full papers presented together with 7 short papers were carefully reviewed and selected from numerous submissions. The covered topics cover multiple facets of cyber security that include: rationality of adversary, game-theoretic cryptographic techniques, vulnerability discovery and assessment, multi-goal security analysis, secure computation, economic-oriented security, and surveillance for security. Those aspects are covered in a multitude of domains that include networked systems, wireless communications, border patrol security, and control systems.

Title:Decision and Game Theory for Security: 5th International Conference, GameSec 2014, Los Angeles, CA…Format:PaperbackDimensions:381 pagesPublished:October 13, 2014Publisher:Springer-Verlag/Sci-Tech/TradeLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:3319126008

ISBN - 13:9783319126005

Look for similar items by category:

Reviews

Table of Contents

Defending Against Opportunistic Criminals: New Game-Theoretic Frameworks and Algorithms.- Addressing Scalability and Robustness in Security Games with Multiple Boundedly Rational Adversaries.- Empirical Game-Theoretic Analysis of an Adaptive Cyber-Defense Scenario.- Strategic Discovery and Sharing of Vulnerabilities in Competitive Environments.- Optimal Contracts for Outsourced Computation.- A Supervisory Control Approach to Dynamic Cyber-Security.- Numerical Computation of Multi-goal Security Strategies.- Realizable Rational Multiparty Cryptographic Protocols.- Limiting Adversarial Budget in Quantitative Security Assessment.- FlipThem: Modeling Targeted Attacks with FlipIt for Multiple Resources.- Secure Message Delivery Games for Device-to-Device Communications.- A Three-Stage Colonel Blotto Game: When to Provide More Information to an Adversary.- Toward Optimal Network Topology Design for Fast and Secure Distributed Computation.- An Economic Model and Simulation Results of App Adoption Decisions on Networks with Interdependent Privacy Consequences.- Cybersecurity Games and Investments: A Decision Support Approach.- Data Integrity and Availability Verification Game in Untrusted Cloud Storage.- Empirical Comparisons of Descriptive Multi-objective Adversary Models in Stackelberg Security Games.- A Dynamic Bayesian Security Game Framework for Strategic Defense Mechanism Design.- Can Less Be More? A Game-Theoretic Analysis of Filtering vs. Investment.- Online Learning Methods for Border Patrol Resource Allocation.- A Distributed Optimization Algorithm for Attack-Resilient Wide-Area Monitoring of Power Systems: Theoretical and Experimental Methods.- Testing for Hardware Trojans: A Game-Theoretic Approach.- Surveillance for Security as a Pursuit-Evasion Game.