My Account Log in

1 option

Decision and Game Theory for Security : Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011, Proceedings / edited by John S. Baras, Jonathan Katz, Eitan Altman.

SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online

View online
Format:
Book
Contributor:
Baras, John S., editor.
Katz, Jonathan, 1974- editor.
Altman, Eitan, editor.
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
LNCS sublibrary. Security and cryptology ; SL 4, 7037.
Security and Cryptology ; 7037
Language:
English
Subjects (All):
Application software.
Computer networks.
Computer security.
Algorithms.
Management information systems.
Computer science.
Game theory.
Information Systems Applications (incl. Internet).
Computer Communication Networks.
Systems and Data Security.
Algorithm Analysis and Problem Complexity.
Management of Computing and Information Systems.
Game Theory, Economics, Social and Behav. Sciences.
Local Subjects:
Information Systems Applications (incl. Internet).
Computer Communication Networks.
Systems and Data Security.
Algorithm Analysis and Problem Complexity.
Management of Computing and Information Systems.
Game Theory, Economics, Social and Behav. Sciences.
Physical Description:
1 online resource (X, 259 pages).
Edition:
First edition 2011.
Contained In:
Springer eBooks
Place of Publication:
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2011.
System Details:
text file PDF
Summary:
This book constitutes the refereed proceedings of the Second International Conference on Decision and Game Theory for Security, GameSec 2011, held in College Park, Maryland, USA, in November 2011. The 16 revised full papers and 2 plenary keynotes presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on attacks, adversaries, and game theory, wireless adhoc and sensor networks, network games, security insurance, security and trust in social networks and security investments.
Other Format:
Printed edition:
ISBN:
978-3-642-25280-8
9783642252808
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account