Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Decision and game theory for securit...
~
GameSec (Conference) (2023 :)
Linked to FindBook
Google Book
Amazon
博客來
Decision and game theory for security = 14th International Conference, GameSec 2023, Avignon, France, October 18-20, 2023 : proceedings /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Decision and game theory for security/ edited by Jie Fu, Tomas Kroupa, Yezekael Hayel.
Reminder of title:
14th International Conference, GameSec 2023, Avignon, France, October 18-20, 2023 : proceedings /
remainder title:
GameSec 2023
other author:
Fu, Jie.
corporate name:
GameSec (Conference)
Published:
Cham :Springer Nature Switzerland : : 2023.,
Description:
xxix, 390 p. :ill., digital ;24 cm.
[NT 15003449]:
Mechanism design and imperfect information -- Observable Perfect Equilibrium -- Playing Repeated Coopetitive Polymatrix Games with Small Manipulation Cost -- Rule Enforcing Through Ordering -- Security Games -- Multi-defender Security Games with Schedules -- Asymmetric Centrality Game against Network Epidemic Propagation -- Shades of Grey: Strategic Bimatrix Stopping Games for Modelling (Un)Ethical Hacking Roles -- Learning in security games -- Characterizing and Improving the Robustness of Predict-Then-Optimize Frameworks -- Quantisation Effects in Adversarial Cyber-Physical GamesTakuma Adams -- Scalable Learning of Intrusion Responses through Recursive Decomposition -- Cyber deception -- Honeypot Allocation for Cyber Deception in Dynamic Tactical Networks: A Game Theoretic Approach -- Optimal Resource Allocation for Proactive Defense with Deception in Probabilistic Attack Graphs -- The Credential is Not Enough: Combining Honeypots and Fake Credentials for Cyber-Defense -- Economics of security -- Does Cyber-insurance Benefit the Insured or the Attacker? -- A Game of Cyber-Insurance -- Rational Broadcast Protocols against Timid Adversaries -- FlipPath Game to Counter Stealthy Attacks in SDN-based Tactical Networks -- Information and privacy -- Double-sided Information Asymmetry in Double Extortion Ransomware -- Opacity-enforcing active perception and control against eavesdropping attacks -- A Game-Theoretic Analysis of Auditing Differentially Private Algorithms with Epistemically Disparate Herd -- Modeling and Analysis of a Nonlinear Security Game with Mixed Armament -- Short articles -- Incentive-Based Software Security: Fair Micro-Payments for Writing Secure Code -- Using Game Theory Approach for COVID-19 Risk Analysis and Medical Resource Allocation -- Shapley Value to Rank Vulnerabilities on Attack Graphs: Applications to Cyberdeception -- Solving security models with perfect observability.
Contained By:
Springer Nature eBook
Subject:
Computer security - Congresses. -
Online resource:
https://doi.org/10.1007/978-3-031-50670-3
ISBN:
9783031506703
Decision and game theory for security = 14th International Conference, GameSec 2023, Avignon, France, October 18-20, 2023 : proceedings /
Decision and game theory for security
14th International Conference, GameSec 2023, Avignon, France, October 18-20, 2023 : proceedings /[electronic resource] :GameSec 2023edited by Jie Fu, Tomas Kroupa, Yezekael Hayel. - Cham :Springer Nature Switzerland :2023. - xxix, 390 p. :ill., digital ;24 cm. - Lecture notes in computer science,141670302-9743 ;. - Lecture notes in computer science ;14167..
Mechanism design and imperfect information -- Observable Perfect Equilibrium -- Playing Repeated Coopetitive Polymatrix Games with Small Manipulation Cost -- Rule Enforcing Through Ordering -- Security Games -- Multi-defender Security Games with Schedules -- Asymmetric Centrality Game against Network Epidemic Propagation -- Shades of Grey: Strategic Bimatrix Stopping Games for Modelling (Un)Ethical Hacking Roles -- Learning in security games -- Characterizing and Improving the Robustness of Predict-Then-Optimize Frameworks -- Quantisation Effects in Adversarial Cyber-Physical GamesTakuma Adams -- Scalable Learning of Intrusion Responses through Recursive Decomposition -- Cyber deception -- Honeypot Allocation for Cyber Deception in Dynamic Tactical Networks: A Game Theoretic Approach -- Optimal Resource Allocation for Proactive Defense with Deception in Probabilistic Attack Graphs -- The Credential is Not Enough: Combining Honeypots and Fake Credentials for Cyber-Defense -- Economics of security -- Does Cyber-insurance Benefit the Insured or the Attacker? -- A Game of Cyber-Insurance -- Rational Broadcast Protocols against Timid Adversaries -- FlipPath Game to Counter Stealthy Attacks in SDN-based Tactical Networks -- Information and privacy -- Double-sided Information Asymmetry in Double Extortion Ransomware -- Opacity-enforcing active perception and control against eavesdropping attacks -- A Game-Theoretic Analysis of Auditing Differentially Private Algorithms with Epistemically Disparate Herd -- Modeling and Analysis of a Nonlinear Security Game with Mixed Armament -- Short articles -- Incentive-Based Software Security: Fair Micro-Payments for Writing Secure Code -- Using Game Theory Approach for COVID-19 Risk Analysis and Medical Resource Allocation -- Shapley Value to Rank Vulnerabilities on Attack Graphs: Applications to Cyberdeception -- Solving security models with perfect observability.
This book constitutes the refereed proceedings of the 14th International Conference on Decision and Game Theory for Security, GameSec 2023, held in Avignon, France, during October 18-20, 2023. The 19 full papers and 4 short papers included in this book were carefully reviewed and selected from 33 submissions. They were organized in topical sections as follows: Mechanism design and imperfect information, Security Games, Learning in security games, Cyber deception, Economics of security, Information and privacy and Short articles.
ISBN: 9783031506703
Standard No.: 10.1007/978-3-031-50670-3doiSubjects--Topical Terms:
622818
Computer security
--Congresses.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Decision and game theory for security = 14th International Conference, GameSec 2023, Avignon, France, October 18-20, 2023 : proceedings /
LDR
:03693nmm a2200373 a 4500
001
2389875
003
DE-He213
005
20231228134503.0
006
m d
007
cr nn 008maaau
008
250916s2023 sz s 0 eng d
020
$a
9783031506703
$q
(electronic bk.)
020
$a
9783031506697
$q
(paper)
024
7
$a
10.1007/978-3-031-50670-3
$2
doi
035
$a
978-3-031-50670-3
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
G192 2023
111
2
$a
GameSec (Conference)
$n
(14th :
$d
2023 :
$c
Avignon, France)
$3
3755838
245
1 0
$a
Decision and game theory for security
$h
[electronic resource] :
$b
14th International Conference, GameSec 2023, Avignon, France, October 18-20, 2023 : proceedings /
$c
edited by Jie Fu, Tomas Kroupa, Yezekael Hayel.
246
3
$a
GameSec 2023
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2023.
300
$a
xxix, 390 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
0302-9743 ;
$v
14167
505
0
$a
Mechanism design and imperfect information -- Observable Perfect Equilibrium -- Playing Repeated Coopetitive Polymatrix Games with Small Manipulation Cost -- Rule Enforcing Through Ordering -- Security Games -- Multi-defender Security Games with Schedules -- Asymmetric Centrality Game against Network Epidemic Propagation -- Shades of Grey: Strategic Bimatrix Stopping Games for Modelling (Un)Ethical Hacking Roles -- Learning in security games -- Characterizing and Improving the Robustness of Predict-Then-Optimize Frameworks -- Quantisation Effects in Adversarial Cyber-Physical GamesTakuma Adams -- Scalable Learning of Intrusion Responses through Recursive Decomposition -- Cyber deception -- Honeypot Allocation for Cyber Deception in Dynamic Tactical Networks: A Game Theoretic Approach -- Optimal Resource Allocation for Proactive Defense with Deception in Probabilistic Attack Graphs -- The Credential is Not Enough: Combining Honeypots and Fake Credentials for Cyber-Defense -- Economics of security -- Does Cyber-insurance Benefit the Insured or the Attacker? -- A Game of Cyber-Insurance -- Rational Broadcast Protocols against Timid Adversaries -- FlipPath Game to Counter Stealthy Attacks in SDN-based Tactical Networks -- Information and privacy -- Double-sided Information Asymmetry in Double Extortion Ransomware -- Opacity-enforcing active perception and control against eavesdropping attacks -- A Game-Theoretic Analysis of Auditing Differentially Private Algorithms with Epistemically Disparate Herd -- Modeling and Analysis of a Nonlinear Security Game with Mixed Armament -- Short articles -- Incentive-Based Software Security: Fair Micro-Payments for Writing Secure Code -- Using Game Theory Approach for COVID-19 Risk Analysis and Medical Resource Allocation -- Shapley Value to Rank Vulnerabilities on Attack Graphs: Applications to Cyberdeception -- Solving security models with perfect observability.
520
$a
This book constitutes the refereed proceedings of the 14th International Conference on Decision and Game Theory for Security, GameSec 2023, held in Avignon, France, during October 18-20, 2023. The 19 full papers and 4 short papers included in this book were carefully reviewed and selected from 33 submissions. They were organized in topical sections as follows: Mechanism design and imperfect information, Security Games, Learning in security games, Cyber deception, Economics of security, Information and privacy and Short articles.
650
0
$a
Computer security
$v
Congresses.
$3
622818
650
0
$a
Game theory
$x
Congresses.
$3
658202
650
1 4
$a
Data and Information Security.
$3
3538510
650
2 4
$a
Computer Engineering and Networks.
$3
3538504
650
2 4
$a
Artificial Intelligence.
$3
769149
700
1
$a
Fu, Jie.
$3
3560354
700
1
$a
Kroupa, Tomas.
$3
3755839
700
1
$a
Hayel, Yezekael.
$3
3628235
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
14167.
$3
3755840
856
4 0
$u
https://doi.org/10.1007/978-3-031-50670-3
950
$a
Computer Science (SpringerNature-11645)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9500639
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login