Vai al contenuto principale della pagina

Decision and game theory for security : second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011, proceedings / John S. Baras, Jonathan Katz, Eitan Altman (eds.).



(Visualizza formato Marc21)    (visualizza in BIBRAME 2.0)

Creatore: GameSec (Conference) (2nd : 2011 : College Park, MD)
Titolo: Decision and game theory for security : second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011, proceedings / John S. Baras, Jonathan Katz, Eitan Altman (eds.).
Link to work: Decision and game theory for security Visualizza cluster
Pubblicazione: Berlin ; New York : Springer, ©2011
Estensione: 1 online resource (x, 257 pages).
Tipo formato: computer
Tipo contenuto: text
Tipo supporto: online resource
Disciplina: 005.8
Titolo uniforme di collana: Lecture notes in computer science 7037.
LNCS sublibrary. SL 4, Security and cryptology.
Index term-Uncontrolled: Computer science
Computer Communication Networks
Data protection
Computer software
Information Systems
Systems and Data Security
Algorithm Analysis and Problem Complexity
Management of Computing and Information Systems
Game Theory, Economics, Social and Behav. Sciences
Soggetto non controllato: Computer science
Computer Communication Networks
Data protection
Computer software
Information Systems
Systems and Data Security
Algorithm Analysis and Problem Complexity
Management of Computing and Information Systems
Game Theory, Economics, Social and Behav. Sciences
Termine d'indicizzazione-Occupazione: Computer science
Computer Communication Networks
Data protection
Computer software
Information Systems
Systems and Data Security
Algorithm Analysis and Problem Complexity
Management of Computing and Information Systems
Game Theory, Economics, Social and Behav. Sciences
Classificazione LOC: QA76.9.A25 G36 2011
Creatori/Collaboratori: Baras, John S.
Katz, Jonathan, , 1974-
Altman, Eitan
Contenuto supplementare: Includes bibliographical references and author index.
Nota di contenuto: Intro; Title; Preface; Organization; Table of Contents; Plenary Keynotes; Beyond Nash Equilibrium: Solution Concepts for the 21st Century; References; Network Security Games: Combining Game Theory, Behavioral Economics, and Network Measurements; References; Attacks, Adversaries, and Game Theory; Indices of Power in Optimal IDS Default Configuration: Theory and Examples; Introduction; Related Work; IDS Performance Evaluation; Attack Graphs; Game-Theoretical Methods; Attacker and Detector Model; Cooperative Game Model; Shapley Values and B-C Index; An Example
Multiple Attack Sequences and Multinear ExtensionMultilinear Extension (MLE); Multilinear Approximation; Optimal Default Configuration; An Example; Conclusion; References; Exploiting Adversary's Risk Profiles in Imperfect Information Security Games; Introduction; High Card; Game Parameters; A Round of Play; Sidepots; Round Resolution; Rules in a Nutshell; Examples; Diplomacy; Computer Security; Simulation; Probability of Winning; Utility Functions; Non-modeling Bots; Modeling Bot; Results; Conclusions; References; Wireless Adhoc and Sensor Networks
An Anti-jamming Strategy for Channel Access in Cognitive Radio NetworksIntroduction; Problem Modeling and Solution; Numerical Results; Conclusions; Application to CR; References; Node Capture Games: A Game Theoretic Approach to Modeling and Mitigating Node Capture Attacks; Introduction; Background and Preliminaries; Network Model; Adversarial Model; Related Work on Distributed Clone Detection Model; Analytical Models of Node Capture Attacks; Linear Dynamical Model; Stochastic Model; A Game Theoretic Approach to Modeling Node Capture Attacks; Games Based on the Linear Dynamical Model
Games Based on the Queueing ModelSimulation Results; Conclusion; References; Multi-variate Quickest Detection of Significant Change Process; Introduction; Detection of Disorder at Sensors; Formulation of the Problem; Construction of the Optimal Detection Strategy; The Aggregated Decision via the Cooperative Game; A Simple Game; The Aggregated Decision Rule; A Non-cooperative Stopping Game; The Finite Horizon Game; Infinite Horizon Game; Determining the Strategies of Sensors; Final Remarks; Algorithm; References; Network Games
Interplay between Security Providers, Consumers, and Attackers: A Weighted Congestion Game ApproachIntroduction; Model; User Data Valuation; Security Systems Performance; The Attacker Point of View; User Preferences; User Equilibrium; Structure of a User Equilibrium; The Case of Several Providers with the Same Price; Game Equilibrium as a Solution of an Optimization Problem; Price of Anarchy of the User Game; Pricing Decisions of Security Providers; Licensed versus Free Security Provider; Competition among Providers: The Risk of Price War; Conclusions; References
Sommario/riassunto: This book constitutes the refereed proceedings of the Second International Conference on Decision and Game Theory for Security, GameSec 2011, held in College Park, Maryland, USA, in November 2011. The 16 revised full papers and 2 plenary keynotes presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on attacks, adversaries, and game theory, wireless adhoc and sensor networks, network games, security insurance, security and trust in social networks and security investments.
Collana: Lecture notes in computer science, 0302-9743 ; 7037
LNCS sublibrary. SL 4, Security and cryptology
ISBN: 9783642252808
364225280X
9783642252792
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: a9408458
Localizzazioni e accesso elettronico https://stanford.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-642-25280-8
Lo trovi qui: Stanford University
Item: Permalink to OPAC
Altra ed. diverso supporto: Printed edition: 9783642252792