|
|
Showing 1 - 4 of
4 matches in All Departments
|
Decision and Game Theory for Security - 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings (Paperback, 1st ed. 2019)
Tansu Alpcan, Yevgeniy Vorobeychik, John S. Baras, Gyoergy Dan
|
R1,489
Discovery Miles 14 890
|
Ships in 18 - 22 working days
|
This book constitutes the refereed proceedings of the 10th
International Conference on Decision and Game Theory for Security,
GameSec 2019,held in Stockholm, Sweden, in October 2019.The 21 full
papers presented together with 11 short papers were carefully
reviewed and selected from 47 submissions.The papers focus on
protection of heterogeneous, large-scale and dynamic cyber-physical
systems as well as managing security risks faced by critical
infrastructures through rigorous and practically-relevant
analytical methods.
|
Decision and Game Theory for Security - 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings (Paperback, 1st ed. 2016)
Quanyan Zhu, Tansu Alpcan, Emmanouil Panaousis, Milind Tambe, William Casey
|
R2,661
Discovery Miles 26 610
|
Ships in 18 - 22 working days
|
This book constitutes the refereed proceedings of the 7th
International Conference on Decision and Game Theory for Security,
GameSec 2016, held in New York, NY, USA, in November 2016. The 18
revised full papers presented together with 8 short papers and 5
poster papers were carefully reviewed and selected from 40
submissions. The papers are organized in topical sections on
network security; security risks and investments; special
track-validating models; decision making for privacy; security
games; incentives and cybersecurity mechanisms; and intrusion
detection and information limitations in security.
Presenting state-of-the-art research into methods of wireless
spectrum allocation based on game theory and mechanism design, this
innovative and comprehensive book provides a strong foundation for
the design of future wireless mechanisms and spectrum markets.
Prominent researchers showcase a diverse range of novel insights
and approaches to the increasing demand for limited spectrum
resources, with a consistent emphasis on theoretical methods,
analytical results and practical examples. Covering fundamental
underlying principles, licensed spectrum sharing, opportunistic
spectrum sharing, and wider technical and economic considerations,
this singular book will be of interest to academic and industrial
researchers, wireless industry practitioners, and regulators
interested in the foundations of cutting-edge spectrum management.
Covering attack detection, malware response, algorithm and
mechanism design, privacy, and risk management, this comprehensive
work applies unique quantitative models derived from decision,
control, and game theories to understanding diverse network
security problems. It provides the reader with a system-level
theoretical understanding of network security, and is essential
reading for researchers interested in a quantitative approach to
key incentive and resource allocation issues in the field. It also
provides practitioners with an analytical foundation that is useful
for formalising decision-making processes in network security.
|
|