Decision and game theory for security first International Conference, Gamesec 2010, Berlin, Germany, November 22-23, 2010, proceedings

Securing complex and networked systems has become increasingly important as these systems play an indispensable role in modern life at the turn of the - formation age. Concurrently, security of ubiquitous communication, data, and computing poses novel research challenges. Security is a multi-faceted...

Descripción completa

Detalles Bibliográficos
Otros Autores: Alpcan, Tansu, 1975- (-), Buttyan, Levente, Baras, John S.
Formato: Libro electrónico
Idioma:Inglés
Publicado: Berlin ; New York : Springer 2010.
Edición:1st ed. 2010.
Colección:Lecture notes in computer science ; 6442.
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009712955206719
Tabla de Contenidos:
  • Security Investments and Planning
  • Design of Network Topology in an Adversarial Environment
  • Optimal Information Security Investment with Penetration Testing
  • Privacy and Anonymity
  • Tracking Games in Mobile Networks
  • gPath: A Game-Theoretic Path Selection Algorithm to Protect Tor’s Anonymity
  • When Do Firms Invest in Privacy-Preserving Technologies?
  • Adversarial and Robust Control
  • Adversarial Control in a Delay Tolerant Network
  • Security Interdependencies for Networked Control Systems with Identical Agents
  • Robust Control in Sparse Mobile Ad-Hoc Networks
  • Network Security and Botnets
  • A Game-Theoretical Approach for Finding Optimal Strategies in a Botnet Defense Model
  • ISPs and Ad Networks Against Botnet Ad Fraud
  • A Localization Game in Wireless Sensor Networks
  • Effective Multimodel Anomaly Detection Using Cooperative Negotiation
  • Authorization and Authentication
  • The Password Game: Negative Externalities from Weak Password Practices
  • Towards a Game Theoretic Authorisation Model
  • Theory and Algorithms for Security
  • Disperse or Unite? A Mathematical Model of Coordinated Attack
  • Uncertainty in Interdependent Security Games
  • Attack–Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent
  • Methods and Algorithms for Infinite Bayesian Stackelberg Security Games.