Listing 1 - 3 of 3 |
Sort by
|
Choose an application
This book constitutes the refereed proceedings of the 6th International Conference on Decision and Game Theory for Security, GameSec 2015, held in London, UK, in November 2015. The 16 revised full papers presented together with 5 short papers were carefully reviewed and selected from 37 submissions. Game and decision theory has emerged as a valuable systematic framework with powerful analytical tools in dealing with the intricacies involved in making sound and sensible security decisions. For instance, game theory provides methodical approaches to account for interdependencies of security decisions, the role of hidden and asymmetric information, the perception of risks and costs in human behaviour, the incentives/limitations of the attackers, and much more. Combined with our classical approach to computer and network security, and drawing from various fields such as economic, social and behavioural sciences, game and decision theory is playing a fundamental role in the development of the pillars of the "science of security".
Computer Science --- Engineering & Applied Sciences --- Computer science. --- Computer communication systems. --- Computer security. --- Algorithms. --- Management information systems. --- Game theory. --- Computer Science. --- Information Systems Applications (incl. Internet). --- Computer Communication Networks. --- Systems and Data Security. --- Algorithm Analysis and Problem Complexity. --- Management of Computing and Information Systems. --- Game Theory, Economics, Social and Behav. Sciences. --- Games, Theory of --- Theory of games --- Mathematical models --- Mathematics --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Algorism --- Algebra --- Arithmetic --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Foundations --- Protection --- Security measures --- Distributed processing --- Computer software. --- Information Systems. --- Mathematics. --- Math --- Software, Computer --- Computer networks --- Game theory --- Computer programs --- Security measures. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
This book constitutes the refereed proceedings of the 6th International Conference on Decision and Game Theory for Security, GameSec 2015, held in London, UK, in November 2015. The 16 revised full papers presented together with 5 short papers were carefully reviewed and selected from 37 submissions. Game and decision theory has emerged as a valuable systematic framework with powerful analytical tools in dealing with the intricacies involved in making sound and sensible security decisions. For instance, game theory provides methodical approaches to account for interdependencies of security decisions, the role of hidden and asymmetric information, the perception of risks and costs in human behaviour, the incentives/limitations of the attackers, and much more. Combined with our classical approach to computer and network security, and drawing from various fields such as economic, social and behavioural sciences, game and decision theory is playing a fundamental role in the development of the pillars of the "science of security".
Complex analysis --- Operational research. Game theory --- Computer science --- Programming --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- Recreation. Games. Sports. Corp. expression --- MIS (management informatie systeem) --- complexe analyse (wiskunde) --- applicatiebeheer --- apps --- computers --- informatica --- spellen --- informatiesystemen --- speltheorie --- algoritmen --- computerbeveiliging --- informatica management --- computernetwerken --- computerkunde --- architectuur (informatica)
Choose an application
This book constitutes the refereed proceedings of the 7th International Conference on Decision and Game Theory for Security, GameSec 2016, held in New York, NY, USA, in November 2016. The 18 revised full papers presented together with 8 short papers and 5 poster papers were carefully reviewed and selected from 40 submissions. The papers are organized in topical sections on network security; security risks and investments; special track-validating models; decision making for privacy; security games; incentives and cybersecurity mechanisms; and intrusion detection and information limitations in security.
Computer science. --- Computer communication systems. --- Computer security. --- Algorithms. --- Management information systems. --- Game theory. --- Computer Science. --- Information Systems Applications (incl. Internet). --- Systems and Data Security. --- Computer Communication Networks. --- Algorithm Analysis and Problem Complexity. --- Management of Computing and Information Systems. --- Game Theory, Economics, Social and Behav. Sciences. --- Games, Theory of --- Theory of games --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Algorism --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Informatics --- Security measures --- Protection of computer systems --- Protection --- Mathematical models --- Mathematics --- Sociotechnical systems --- Information resources management --- Management --- Algebra --- Arithmetic --- Data protection --- Security systems --- Hacking --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Science --- Communication systems --- Foundations --- Distributed processing --- Computer software. --- Information Systems. --- Mathematics. --- Math --- Software, Computer --- Computer security --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Listing 1 - 3 of 3 |
Sort by
|