Decision and game theory for security first International Conference, Gamesec 2010, Berlin, Germany, November 22-23, 2010, proceedings
Securing complex and networked systems has become increasingly important as these systems play an indispensable role in modern life at the turn of the - formation age. Concurrently, security of ubiquitous communication, data, and computing poses novel research challenges. Security is a multi-faceted...
Otros Autores: | , , |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Berlin ; New York :
Springer
2010.
|
Edición: | 1st ed. 2010. |
Colección: | Lecture notes in computer science ;
6442. |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009712955206719 |
Tabla de Contenidos:
- Security Investments and Planning
- Design of Network Topology in an Adversarial Environment
- Optimal Information Security Investment with Penetration Testing
- Privacy and Anonymity
- Tracking Games in Mobile Networks
- gPath: A Game-Theoretic Path Selection Algorithm to Protect Tor’s Anonymity
- When Do Firms Invest in Privacy-Preserving Technologies?
- Adversarial and Robust Control
- Adversarial Control in a Delay Tolerant Network
- Security Interdependencies for Networked Control Systems with Identical Agents
- Robust Control in Sparse Mobile Ad-Hoc Networks
- Network Security and Botnets
- A Game-Theoretical Approach for Finding Optimal Strategies in a Botnet Defense Model
- ISPs and Ad Networks Against Botnet Ad Fraud
- A Localization Game in Wireless Sensor Networks
- Effective Multimodel Anomaly Detection Using Cooperative Negotiation
- Authorization and Authentication
- The Password Game: Negative Externalities from Weak Password Practices
- Towards a Game Theoretic Authorisation Model
- Theory and Algorithms for Security
- Disperse or Unite? A Mathematical Model of Coordinated Attack
- Uncertainty in Interdependent Security Games
- Attack–Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent
- Methods and Algorithms for Infinite Bayesian Stackelberg Security Games.