語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Decision and game theory for securit...
~
GameSec (Conference) (2023 :)
FindBook
Google Book
Amazon
博客來
Decision and game theory for security = 14th International Conference, GameSec 2023, Avignon, France, October 18-20, 2023 : proceedings /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Decision and game theory for security/ edited by Jie Fu, Tomas Kroupa, Yezekael Hayel.
其他題名:
14th International Conference, GameSec 2023, Avignon, France, October 18-20, 2023 : proceedings /
其他題名:
GameSec 2023
其他作者:
Fu, Jie.
團體作者:
GameSec (Conference)
出版者:
Cham :Springer Nature Switzerland : : 2023.,
面頁冊數:
xxix, 390 p. :ill., digital ;24 cm.
內容註:
Mechanism design and imperfect information -- Observable Perfect Equilibrium -- Playing Repeated Coopetitive Polymatrix Games with Small Manipulation Cost -- Rule Enforcing Through Ordering -- Security Games -- Multi-defender Security Games with Schedules -- Asymmetric Centrality Game against Network Epidemic Propagation -- Shades of Grey: Strategic Bimatrix Stopping Games for Modelling (Un)Ethical Hacking Roles -- Learning in security games -- Characterizing and Improving the Robustness of Predict-Then-Optimize Frameworks -- Quantisation Effects in Adversarial Cyber-Physical GamesTakuma Adams -- Scalable Learning of Intrusion Responses through Recursive Decomposition -- Cyber deception -- Honeypot Allocation for Cyber Deception in Dynamic Tactical Networks: A Game Theoretic Approach -- Optimal Resource Allocation for Proactive Defense with Deception in Probabilistic Attack Graphs -- The Credential is Not Enough: Combining Honeypots and Fake Credentials for Cyber-Defense -- Economics of security -- Does Cyber-insurance Benefit the Insured or the Attacker? -- A Game of Cyber-Insurance -- Rational Broadcast Protocols against Timid Adversaries -- FlipPath Game to Counter Stealthy Attacks in SDN-based Tactical Networks -- Information and privacy -- Double-sided Information Asymmetry in Double Extortion Ransomware -- Opacity-enforcing active perception and control against eavesdropping attacks -- A Game-Theoretic Analysis of Auditing Differentially Private Algorithms with Epistemically Disparate Herd -- Modeling and Analysis of a Nonlinear Security Game with Mixed Armament -- Short articles -- Incentive-Based Software Security: Fair Micro-Payments for Writing Secure Code -- Using Game Theory Approach for COVID-19 Risk Analysis and Medical Resource Allocation -- Shapley Value to Rank Vulnerabilities on Attack Graphs: Applications to Cyberdeception -- Solving security models with perfect observability.
Contained By:
Springer Nature eBook
標題:
Computer security - Congresses. -
電子資源:
https://doi.org/10.1007/978-3-031-50670-3
ISBN:
9783031506703
Decision and game theory for security = 14th International Conference, GameSec 2023, Avignon, France, October 18-20, 2023 : proceedings /
Decision and game theory for security
14th International Conference, GameSec 2023, Avignon, France, October 18-20, 2023 : proceedings /[electronic resource] :GameSec 2023edited by Jie Fu, Tomas Kroupa, Yezekael Hayel. - Cham :Springer Nature Switzerland :2023. - xxix, 390 p. :ill., digital ;24 cm. - Lecture notes in computer science,141670302-9743 ;. - Lecture notes in computer science ;14167..
Mechanism design and imperfect information -- Observable Perfect Equilibrium -- Playing Repeated Coopetitive Polymatrix Games with Small Manipulation Cost -- Rule Enforcing Through Ordering -- Security Games -- Multi-defender Security Games with Schedules -- Asymmetric Centrality Game against Network Epidemic Propagation -- Shades of Grey: Strategic Bimatrix Stopping Games for Modelling (Un)Ethical Hacking Roles -- Learning in security games -- Characterizing and Improving the Robustness of Predict-Then-Optimize Frameworks -- Quantisation Effects in Adversarial Cyber-Physical GamesTakuma Adams -- Scalable Learning of Intrusion Responses through Recursive Decomposition -- Cyber deception -- Honeypot Allocation for Cyber Deception in Dynamic Tactical Networks: A Game Theoretic Approach -- Optimal Resource Allocation for Proactive Defense with Deception in Probabilistic Attack Graphs -- The Credential is Not Enough: Combining Honeypots and Fake Credentials for Cyber-Defense -- Economics of security -- Does Cyber-insurance Benefit the Insured or the Attacker? -- A Game of Cyber-Insurance -- Rational Broadcast Protocols against Timid Adversaries -- FlipPath Game to Counter Stealthy Attacks in SDN-based Tactical Networks -- Information and privacy -- Double-sided Information Asymmetry in Double Extortion Ransomware -- Opacity-enforcing active perception and control against eavesdropping attacks -- A Game-Theoretic Analysis of Auditing Differentially Private Algorithms with Epistemically Disparate Herd -- Modeling and Analysis of a Nonlinear Security Game with Mixed Armament -- Short articles -- Incentive-Based Software Security: Fair Micro-Payments for Writing Secure Code -- Using Game Theory Approach for COVID-19 Risk Analysis and Medical Resource Allocation -- Shapley Value to Rank Vulnerabilities on Attack Graphs: Applications to Cyberdeception -- Solving security models with perfect observability.
This book constitutes the refereed proceedings of the 14th International Conference on Decision and Game Theory for Security, GameSec 2023, held in Avignon, France, during October 18-20, 2023. The 19 full papers and 4 short papers included in this book were carefully reviewed and selected from 33 submissions. They were organized in topical sections as follows: Mechanism design and imperfect information, Security Games, Learning in security games, Cyber deception, Economics of security, Information and privacy and Short articles.
ISBN: 9783031506703
Standard No.: 10.1007/978-3-031-50670-3doiSubjects--Topical Terms:
622818
Computer security
--Congresses.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Decision and game theory for security = 14th International Conference, GameSec 2023, Avignon, France, October 18-20, 2023 : proceedings /
LDR
:03693nmm a2200373 a 4500
001
2389875
003
DE-He213
005
20231228134503.0
006
m d
007
cr nn 008maaau
008
250916s2023 sz s 0 eng d
020
$a
9783031506703
$q
(electronic bk.)
020
$a
9783031506697
$q
(paper)
024
7
$a
10.1007/978-3-031-50670-3
$2
doi
035
$a
978-3-031-50670-3
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
G192 2023
111
2
$a
GameSec (Conference)
$n
(14th :
$d
2023 :
$c
Avignon, France)
$3
3755838
245
1 0
$a
Decision and game theory for security
$h
[electronic resource] :
$b
14th International Conference, GameSec 2023, Avignon, France, October 18-20, 2023 : proceedings /
$c
edited by Jie Fu, Tomas Kroupa, Yezekael Hayel.
246
3
$a
GameSec 2023
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2023.
300
$a
xxix, 390 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
0302-9743 ;
$v
14167
505
0
$a
Mechanism design and imperfect information -- Observable Perfect Equilibrium -- Playing Repeated Coopetitive Polymatrix Games with Small Manipulation Cost -- Rule Enforcing Through Ordering -- Security Games -- Multi-defender Security Games with Schedules -- Asymmetric Centrality Game against Network Epidemic Propagation -- Shades of Grey: Strategic Bimatrix Stopping Games for Modelling (Un)Ethical Hacking Roles -- Learning in security games -- Characterizing and Improving the Robustness of Predict-Then-Optimize Frameworks -- Quantisation Effects in Adversarial Cyber-Physical GamesTakuma Adams -- Scalable Learning of Intrusion Responses through Recursive Decomposition -- Cyber deception -- Honeypot Allocation for Cyber Deception in Dynamic Tactical Networks: A Game Theoretic Approach -- Optimal Resource Allocation for Proactive Defense with Deception in Probabilistic Attack Graphs -- The Credential is Not Enough: Combining Honeypots and Fake Credentials for Cyber-Defense -- Economics of security -- Does Cyber-insurance Benefit the Insured or the Attacker? -- A Game of Cyber-Insurance -- Rational Broadcast Protocols against Timid Adversaries -- FlipPath Game to Counter Stealthy Attacks in SDN-based Tactical Networks -- Information and privacy -- Double-sided Information Asymmetry in Double Extortion Ransomware -- Opacity-enforcing active perception and control against eavesdropping attacks -- A Game-Theoretic Analysis of Auditing Differentially Private Algorithms with Epistemically Disparate Herd -- Modeling and Analysis of a Nonlinear Security Game with Mixed Armament -- Short articles -- Incentive-Based Software Security: Fair Micro-Payments for Writing Secure Code -- Using Game Theory Approach for COVID-19 Risk Analysis and Medical Resource Allocation -- Shapley Value to Rank Vulnerabilities on Attack Graphs: Applications to Cyberdeception -- Solving security models with perfect observability.
520
$a
This book constitutes the refereed proceedings of the 14th International Conference on Decision and Game Theory for Security, GameSec 2023, held in Avignon, France, during October 18-20, 2023. The 19 full papers and 4 short papers included in this book were carefully reviewed and selected from 33 submissions. They were organized in topical sections as follows: Mechanism design and imperfect information, Security Games, Learning in security games, Cyber deception, Economics of security, Information and privacy and Short articles.
650
0
$a
Computer security
$v
Congresses.
$3
622818
650
0
$a
Game theory
$x
Congresses.
$3
658202
650
1 4
$a
Data and Information Security.
$3
3538510
650
2 4
$a
Computer Engineering and Networks.
$3
3538504
650
2 4
$a
Artificial Intelligence.
$3
769149
700
1
$a
Fu, Jie.
$3
3560354
700
1
$a
Kroupa, Tomas.
$3
3755839
700
1
$a
Hayel, Yezekael.
$3
3628235
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
14167.
$3
3755840
856
4 0
$u
https://doi.org/10.1007/978-3-031-50670-3
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9500639
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入