top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalit√† di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Decision and game theory for security : second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011, proceedings / John S. Baras, Jonathan Katz, Eitan Altman (eds.).
Decision and game theory for security : second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011, proceedings / John S. Baras, Jonathan Katz, Eitan Altman (eds.).
Creatore [GameSec (Conference) (2nd : 2011 : College Park, MD)]
Estensione 1 online resource (x, 257 pages).
Disciplina 005.8
Accesso persona Baras, John S.
Katz, Jonathan, 1974-
Altman, Eitan
Genere/Forma Electronic books
Conference papers and proceedings
Soggetto non controllato Computer science
Computer Communication Networks
Data protection
Computer software
Information Systems
Systems and Data Security
Algorithm Analysis and Problem Complexity
Management of Computing and Information Systems
Game Theory, Economics, Social and Behav. Sciences
ISBN 9783642252808
364225280X
9783642252792
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro; Title; Preface; Organization; Table of Contents; Plenary Keynotes; Beyond Nash Equilibrium: Solution Concepts for the 21st Century; References; Network Security Games: Combining Game Theory, Behavioral Economics, and Network Measurements; References; Attacks, Adversaries, and Game Theory; Indices of Power in Optimal IDS Default Configuration: Theory and Examples; Introduction; Related Work; IDS Performance Evaluation; Attack Graphs; Game-Theoretical Methods; Attacker and Detector Model; Cooperative Game Model; Shapley Values and B-C Index; An Example
Multiple Attack Sequences and Multinear ExtensionMultilinear Extension (MLE); Multilinear Approximation; Optimal Default Configuration; An Example; Conclusion; References; Exploiting Adversary's Risk Profiles in Imperfect Information Security Games; Introduction; High Card; Game Parameters; A Round of Play; Sidepots; Round Resolution; Rules in a Nutshell; Examples; Diplomacy; Computer Security; Simulation; Probability of Winning; Utility Functions; Non-modeling Bots; Modeling Bot; Results; Conclusions; References; Wireless Adhoc and Sensor Networks
An Anti-jamming Strategy for Channel Access in Cognitive Radio NetworksIntroduction; Problem Modeling and Solution; Numerical Results; Conclusions; Application to CR; References; Node Capture Games: A Game Theoretic Approach to Modeling and Mitigating Node Capture Attacks; Introduction; Background and Preliminaries; Network Model; Adversarial Model; Related Work on Distributed Clone Detection Model; Analytical Models of Node Capture Attacks; Linear Dynamical Model; Stochastic Model; A Game Theoretic Approach to Modeling Node Capture Attacks; Games Based on the Linear Dynamical Model
Games Based on the Queueing ModelSimulation Results; Conclusion; References; Multi-variate Quickest Detection of Significant Change Process; Introduction; Detection of Disorder at Sensors; Formulation of the Problem; Construction of the Optimal Detection Strategy; The Aggregated Decision via the Cooperative Game; A Simple Game; The Aggregated Decision Rule; A Non-cooperative Stopping Game; The Finite Horizon Game; Infinite Horizon Game; Determining the Strategies of Sensors; Final Remarks; Algorithm; References; Network Games
Interplay between Security Providers, Consumers, and Attackers: A Weighted Congestion Game ApproachIntroduction; Model; User Data Valuation; Security Systems Performance; The Attacker Point of View; User Preferences; User Equilibrium; Structure of a User Equilibrium; The Case of Several Providers with the Same Price; Game Equilibrium as a Solution of an Optimization Problem; Price of Anarchy of the User Game; Pricing Decisions of Security Providers; Licensed versus Free Security Provider; Competition among Providers: The Risk of Price War; Conclusions; References
Record Nr. NYU-006478987
[GameSec (Conference) (2nd : 2011 : College Park, MD)]  
Materiale a stampa
Lo trovi qui: New York University
Decision and game theory for security : second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011, proceedings / John S. Baras, Jonathan Katz, Eitan Altman (eds.).
Decision and game theory for security : second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011, proceedings / John S. Baras, Jonathan Katz, Eitan Altman (eds.).
Creatore [GameSec (Conference) (2nd : 2011 : College Park, MD)]
Estensione 1 online resource (x, 257 pages).
Disciplina 005.8
Accesso persona Baras, John S.
Katz, Jonathan, 1974-
Altman, Eitan
Soggetto non controllato Computer science
Computer Communication Networks
Data protection
Computer software
Information Systems
Systems and Data Security
Algorithm Analysis and Problem Complexity
Management of Computing and Information Systems
Game Theory, Economics, Social and Behav. Sciences
ISBN 9783642252808
364225280X
9783642252792
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro; Title; Preface; Organization; Table of Contents; Plenary Keynotes; Beyond Nash Equilibrium: Solution Concepts for the 21st Century; References; Network Security Games: Combining Game Theory, Behavioral Economics, and Network Measurements; References; Attacks, Adversaries, and Game Theory; Indices of Power in Optimal IDS Default Configuration: Theory and Examples; Introduction; Related Work; IDS Performance Evaluation; Attack Graphs; Game-Theoretical Methods; Attacker and Detector Model; Cooperative Game Model; Shapley Values and B-C Index; An Example
Multiple Attack Sequences and Multinear ExtensionMultilinear Extension (MLE); Multilinear Approximation; Optimal Default Configuration; An Example; Conclusion; References; Exploiting Adversary's Risk Profiles in Imperfect Information Security Games; Introduction; High Card; Game Parameters; A Round of Play; Sidepots; Round Resolution; Rules in a Nutshell; Examples; Diplomacy; Computer Security; Simulation; Probability of Winning; Utility Functions; Non-modeling Bots; Modeling Bot; Results; Conclusions; References; Wireless Adhoc and Sensor Networks
An Anti-jamming Strategy for Channel Access in Cognitive Radio NetworksIntroduction; Problem Modeling and Solution; Numerical Results; Conclusions; Application to CR; References; Node Capture Games: A Game Theoretic Approach to Modeling and Mitigating Node Capture Attacks; Introduction; Background and Preliminaries; Network Model; Adversarial Model; Related Work on Distributed Clone Detection Model; Analytical Models of Node Capture Attacks; Linear Dynamical Model; Stochastic Model; A Game Theoretic Approach to Modeling Node Capture Attacks; Games Based on the Linear Dynamical Model
Games Based on the Queueing ModelSimulation Results; Conclusion; References; Multi-variate Quickest Detection of Significant Change Process; Introduction; Detection of Disorder at Sensors; Formulation of the Problem; Construction of the Optimal Detection Strategy; The Aggregated Decision via the Cooperative Game; A Simple Game; The Aggregated Decision Rule; A Non-cooperative Stopping Game; The Finite Horizon Game; Infinite Horizon Game; Determining the Strategies of Sensors; Final Remarks; Algorithm; References; Network Games
Interplay between Security Providers, Consumers, and Attackers: A Weighted Congestion Game ApproachIntroduction; Model; User Data Valuation; Security Systems Performance; The Attacker Point of View; User Preferences; User Equilibrium; Structure of a User Equilibrium; The Case of Several Providers with the Same Price; Game Equilibrium as a Solution of an Optimization Problem; Price of Anarchy of the User Game; Pricing Decisions of Security Providers; Licensed versus Free Security Provider; Competition among Providers: The Risk of Price War; Conclusions; References
Record Nr. STANFORD-a9408458
[GameSec (Conference) (2nd : 2011 : College Park, MD)]  
Materiale a stampa
Lo trovi qui: Stanford University
Decision and game theory for security : second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011, proceedings / John S. Baras, Jonathan Katz, Eitan Altman (eds.).
Decision and game theory for security : second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011, proceedings / John S. Baras, Jonathan Katz, Eitan Altman (eds.).
Creatore [GameSec (Conference) (2nd : 2011 : College Park, MD)]
Estensione 1 online resource (x, 257 pages).
Accesso persona Baras, John S.
Katz, Jonathan, 1974-
Altman, Eitan
Genere/Forma Electronic books
Conference papers and proceedings
Soggetto non controllato Computer science
Computer Communication Networks
Data protection
Computer software
Information Systems
Systems and Data Security
Algorithm Analysis and Problem Complexity
Management of Computing and Information Systems
Game Theory, Economics, Social and Behav. Sciences
ISBN 9783642252808
364225280X
9783642252792
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UCHICAGO-11076239
[GameSec (Conference) (2nd : 2011 : College Park, MD)]  
Materiale a stampa
Lo trovi qui: University of Chicago
Decision and game theory for security : second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011, proceedings / John S. Baras, Jonathan Katz, Eitan Altman (eds.).
Decision and game theory for security : second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011, proceedings / John S. Baras, Jonathan Katz, Eitan Altman (eds.).
Creatore [GameSec (Conference) (2nd : 2011 : College Park, MD)]
Estensione 1 online resource (x, 257 pages).
Disciplina 005.8
Accesso persona Baras, John S.
Katz, Jonathan, 1974-
Altman, Eitan
Genere/Forma Electronic books
Conference papers and proceedings
Soggetto non controllato Computer science
Computer Communication Networks
Data protection
Computer software
Information Systems
Systems and Data Security
Algorithm Analysis and Problem Complexity
Management of Computing and Information Systems
Game Theory, Economics, Social and Behav. Sciences
ISBN 9783642252808
364225280X
9783642252792
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. NYU-004372491
[GameSec (Conference) (2nd : 2011 : College Park, MD)]  
Materiale a stampa
Lo trovi qui: New York University