|
Showing 1 - 18 of
18 matches in All Departments
This book provides an overview of state-of-the-art implementations
of quantum random number generators (QRNGs), and especially
examines their relation to classical statistical randomness models
and numerical techniques for computing random numbers. The reader -
who ideally has a background in classical statistics, computer
science, or cryptography - is introduced to the world of quantum
bits step by step, and explicit relations between QRNGs and their
classical counterparts are identified along the way. Random number
generation is a major pillar of cryptography. Capitalizing on the
randomness inherent in quantum phenomena is a rapidly evolving
branch of quantum cryptography with countless applications for the
future. The value of quantum randomness for cryptographic purposes
is empirically demonstrated in statistical evaluations of QRNGs'
performance compared to classical techniques for true and
pseudorandom number generation. The book then provides an overview
of technical implementations of QRNGs, before a concluding
discussion of major achievements and remaining obstacles in the
field rounds out the coverage, while also opening the door for
future research directions.
The chapters in this volume explore how various methods from game
theory can be utilized to optimize security and risk-management
strategies. Emphasizing the importance of connecting theory and
practice, they detail the steps involved in selecting, adapting,
and analyzing game-theoretic models in security engineering and
provide case studies of successful implementations in different
application domains. Practitioners who are not experts in game
theory and are uncertain about incorporating it into their work
will benefit from this resource, as well as researchers in applied
mathematics and computer science interested in current developments
and future directions. The first part of the book presents the
theoretical basics, covering various different game-theoretic
models related to and suitable for security engineering. The second
part then shows how these models are adopted, implemented, and
analyzed. Surveillance systems, interconnected networks, and power
grids are among the different application areas discussed. Finally,
in the third part, case studies from business and industry of
successful applications of game-theoretic models are presented, and
the range of applications discussed is expanded to include such
areas as cloud computing, Internet of Things, and water utility
networks.
This book focuses on practical implementation details,
telecommunication techniques, security and technology challenges
and approaches to implementing quantum technology in modern
telecommunication systems. The authors use their extensive
practical academic and industrial experience in network
technologies and provide details from international projects in
quantum cryptography in which they actively participate. Using a
variety of examples, analogies, illustrations, tables, and features
from practical quantum network realizations, the authors provide a
unique view of quantum technology from an engineering
telecommunication standpoint, allowing the reader to identify the
advantages and challenges of quantum technology. This book also
addresses challenges posed by quantum technology such as network
organization, passive and active eavesdropping, and future trends
in QKD such as Software Defined Networking (SDN) with QKD and
application QKD in 5G networks. It is conceived through eight
chapters by treating the following thematic units separately:
Fundamentals of Quantum Key Distribution, QoS architecture/mode,
QoS MAC layer, QoS signaling techniques for key management and
session negotiation purpose and QoS routing protocols that minimize
the consumption of key material through the equitable utilization
of network resources when finding an optimal path. Through numerous
information on practical solutions, simulation examples,
illustrations, and analysis, readers can easily distinguish the
specificity of quantum technology and understand the challenges and
methods of practical implementation of quantum cryptography in
common telecommunications standards. Researchers working in quantum
technology and applied networking security as well as
advanced-level students studying computer science and electrical
engineering will benefit from this book. Professionals working
within these related fields will also benefit from this book.
This book presents a compendium of selected game- and
decision-theoretic models to achieve and assess the security of
critical infrastructures. Given contemporary reports on security
incidents of various kinds, we can see a paradigm shift to attacks
of an increasingly heterogeneous nature, combining different
techniques into what we know as an advanced persistent threat.
Security precautions must match these diverse threat patterns in an
equally diverse manner; in response, this book provides a wealth of
techniques for protection and mitigation. Much traditional security
research has a narrow focus on specific attack scenarios or
applications, and strives to make an attack "practically
impossible." A more recent approach to security views it as a
scenario in which the cost of an attack exceeds the potential
reward. This does not rule out the possibility of an attack but
minimizes its likelihood to the least possible risk. The book
follows this economic definition of security, offering a management
scientific view that seeks a balance between security investments
and their resulting benefits. It focuses on optimization of
resources in light of threats such as terrorism and advanced
persistent threats. Drawing on the authors' experience and inspired
by real case studies, the book provides a systematic approach to
critical infrastructure security and resilience. Presenting a
mixture of theoretical work and practical success stories, the book
is chiefly intended for students and practitioners seeking an
introduction to game- and decision-theoretic techniques for
security. The required mathematical concepts are self-contained,
rigorously introduced, and illustrated by case studies. The book
also provides software tools that help guide readers in the
practical use of the scientific models and computational
frameworks.
|
Decision and Game Theory for Security - 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings (Paperback, 1st ed. 2017)
Stefan Rass, Boan, Christopher Kiekintveld, Fei Fang, Stefan Schauer
|
R1,543
Discovery Miles 15 430
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the 8th
International Conference on Decision and Game Theory for Security,
GameSec 2017, held in Vienna, Austria, in October 2017. The 24
revised full papers presented together with 4 short papers were
carefully reviewed and selected from 71 submissions.The papers
address topics such as Game theory and mechanism design for
security and privacy; Pricing and economic incentives for building
dependable and secure systems; Dynamic control, learning, and
optimization and approximation techniques; Decision making and
decision theory for cybersecurity and security requirements
engineering; Socio-technological and behavioral approaches to
security; Risk assessment and risk management; Security investment
and cyber insurance; Security and privacy for the
Internet-of-Things (IoT), cyber-physical systems, resilient control
systems; New approaches for security and privacy in cloud computing
and for critical infrastructure; Security and privacy of wireless
and mobile communications, including user location privacy; Game
theory for intrusion detection; and Empirical and experimental
studies with game-theoretic or optimization analysis for security
and privacy.
|
Decision and Game Theory for Security - 12th International Conference, GameSec 2021, Virtual Event, October 25-27, 2021, Proceedings (Paperback, 1st ed. 2021)
Branislav Bosansky, Cleotilde Gonzalez, Stefan Rass, Arunesh Sinha
|
R2,218
Discovery Miles 22 180
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the 12th
International Conference on Decision and Game Theory for Security,
GameSec 2021,held in October 2021. Due to COVID-19 pandemic the
conference was held virtually. The 20 full papers presented were
carefully reviewed and selected from 37 submissions. The papers
focus on Theoretical Foundations in Equilibrium Computation;
Machine Learning and Game Theory; Ransomware; Cyber-Physical
Systems Security; Innovations in Attacks and Defenses.
Robotics is becoming more and more ubiquitous, but the pressure to
bring systems to market occasionally goes at the cost of neglecting
security mechanisms during the development, deployment or while in
production. As a result, contemporary robotic systems are
vulnerable to diverse attack patterns, and a posteriori hardening
is at least challenging, if not impossible at all. This book aims
to stipulate the inclusion of security in robotics from the
earliest design phases onward and with a special focus on the
cost-benefit tradeoff that can otherwise be an inhibitor for the
fast development of affordable systems. We advocate quantitative
methods of security management and design, covering vulnerability
scoring systems tailored to robotic systems, and accounting for the
highly distributed nature of robots as an interplay of potentially
very many components. A powerful quantitative approach to
model-based security is offered by game theory, providing a rich
spectrum of techniques to optimize security against various kinds
of attacks. Such a multi-perspective view on security is necessary
to address the heterogeneity and complexity of robotic systems.
This book is intended as an accessible starter for the theoretician
and practitioner working in the field.
Studienarbeit aus dem Jahr 2013 im Fachbereich Politik - Sonstige
Themen, Note: 1,3, Friedrich-Alexander-Universitat
Erlangen-Nurnberg (Politikwissenschaften), Veranstaltung: Das
politische System Indiens, Sprache: Deutsch, Abstract: Indien,
insbesondere die religiose Kultur des Subkontinents, gilt im Westen
als eine tolerante, multikulturelle und friedliche Gesellschaft.
Der Erfolg der straff organisierten hindunationalistischen Partei
BJP wurde Ende der achtziger und neunziger Jahre von der ganzen
Welt umso mehr mit Besorgnis aufgenommen. Sie propagierten, gepragt
von der Hindutva-Ideologie, die Hindu Rashta, eine durch Hindus
kulturell dominierte Gesellschaft. Befurchtungen vor
Destabilisierung, theokratischer Diktatur und einem nuklearen Krieg
mit Pakistan wurden laut. Durch die Zerstorung der Babri-Moschee,
die zahlreiche Menschenleben forderte, und die Ermordung Mahatma
Gandhis durch einen Hindunationalisten hatte die internationale
Gemeinschaft schon mehrmals ein sehr gewalttatiges Bild auf die
politisch extremen Hindus bekommen. Es wurden eine weitere
Eskalation und Intensivierung des Konflikts vermutet. Die indische
Demokratie war augenscheinlich ins Wanken geraten. Zwei Jahrzehnte
spater befindet sich die Bewegung in der Opposition und daruber
hinaus in einer Sinnkrise. Die hindunationalistische
Vielparteienkoalition der National Democratic Alliance hat sich in
den Wahlen 2004 nicht mehr durchsetzen konnen. Diese Arbeit
beschaftigt sich mit dem Erfolg der Nationalisten und den
Hintergrunden des baldigen Abstiegs der zuvor aufstrebenden
Bewegung, nach nur einer Legislaturperiode. Indien als Land,
welches von kulturellen und ethnischen Konflikten durchzogen ist
und in dem breite Bevolkerungsschichten in Armut leben, bietet
eigentlich einen idealen Nahrboden fur radikales Gedankengut. Im
Zuge der Modernisierung und Globalisierung tun sich immer grossere
Spalten auf und die Gesellschaft ist einem radikalen Wandel
unterworfen. Hindus und Muslime konkurrieren u
Facharbeit (Schule) aus dem Jahr 2011 im Fachbereich
Gemeinschaftskunde / Sozialkunde, Note: 15,
Gustav-von-Schlor-Schule Staatliche Fachoberschule und
Berufsoberschule, Weiden, Sprache: Deutsch, Abstract: "Ihr seid
jetzt also auch mit den Facebook-Kids zusammen" so begann der
sogenannte Bruder Fuhrer Gadaffi ein folgeschweres Gesprach mit
vier oppositionellen Juristen aus Bengasi. Dies zeigt von der
Arroganz des Revolutionsfuhrers und Ignoranz der Lage in seinem
eigenen Land. Denn direkt nach diesem Gesprach vereinbarten die
vier Rechtsgelehrten "den 17. Februar zum Tag des Zorns
auszurufen," der unter anderem ein Ausloser fur die darauf
folgenden Ausschreitungen in Libyen war und ein Einschreiten der
westlichen Welt nach sich zog. Mit dem Beginn des sogenannten
Arabischen Fruhlings, den Revolutionen im Nahen Osten am Anfang
2011, anderte sich die Machtstruktur in der arabischen Welt
grundlegend. Besonders in Libyen kam es dabei zu gewaltsamen
Auseinandersetzungen zwischen der Bevolkerung und der Regierung,
bei denen sich Gaddafis Militarapparat mit seiner gesamten Macht
gegen die drohende Veranderung stemmte. Um die Bevolkerung zu
schutzen, musste die UN handeln. Sie verhangte Sanktionen,
Reiseverbote und ermoglichte die Einrichtung einer Flugverbotszone
uber dem Nachbarland Agyptens. Die Vereinten Nationen sind eine
weltweite Organisation, die der internationalen Friedenssicherung
dient. Winston Churchill sagte einmal: "Die UNO wurde nicht
gegrundet, um uns den Himmel zu bringen, sondern um uns vor der
Holle zu bewahren." Dies trifft oft sehr genau auf die Missionen
der Vereinten Nationen und besonders den Einsatz im Norden Afrikas
zu. Aufgrund dieser aktuellen und schwerwiegenden Geschehnisse habe
ich mich naher mit der UNO, ihrer Struktur, den
Handlungsmoglichkeiten bei internationalen Konflikten und
insbesondere ihrem Eingreifen in der Libyen-Krise beschaftigt. Des
Weiteren habe ich mich mit grundlegenden Problemen der Vereinten
Nationen und Kontroversen in ih
|
|