My Account Log in

1 option

Decision and Game Theory for Security : First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings / edited by Tansu Alpcan, Levente Buttyán, John S. Baras.

ACM Digital Library Available online

View online
Format:
Book
Contributor:
Alpcan, Tansu, 1975-
Buttyán, Levente.
Baras, John S.
Series:
Security and Cryptology, 2946-1863 ; 6442
Language:
English
Subjects (All):
Cryptography.
Data encryption (Computer science).
Game theory.
Computer networks.
Data protection.
Algorithms.
Electronic data processing--Management.
Electronic data processing.
Cryptology.
Game Theory.
Computer Communication Networks.
Data and Information Security.
IT Operations.
Local Subjects:
Cryptology.
Game Theory.
Computer Communication Networks.
Data and Information Security.
Algorithms.
IT Operations.
Physical Description:
1 online resource (X, 281 p. 60 illus.)
Edition:
1st ed. 2010.
Place of Publication:
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2010.
Language Note:
English
Summary:
Securing complex and networked systems has become increasingly important as these systems play an indispensable role in modern life at the turn of the - formation age. Concurrently, security of ubiquitous communication, data, and computing poses novel research challenges. Security is a multi-faceted problem due to the complexity of underlying hardware, software, and network inter- pendencies as well as human and social factors. It involves decision making on multiple levels and multiple time scales, given the limited resources available to both malicious attackers and administrators defending networked systems. - cision and game theory provides a rich set of analyticalmethods and approaches to address various resource allocation and decision-making problems arising in security. This edited volume contains the contributions presented at the inaugural Conference on Decision and Game Theory for Security - GameSec 2010. These 18 articles (12 full and 6 short papers) are thematically categorized into the following six sections: – “Security investments and planning” contains two articles, which present optimization methods for (security) investments when facing adversaries. – “Privacy and anonymity” has three articles discussing location privacy, - line anonymity, and economic aspects of privacy. – “Adversarial and robust control” contains three articles, which investigate security and robustness aspects of control in networks. – “Networksecurityandbotnets”hasfourarticlesfocusingondefensivestra- giesagainstbotnetsaswellasdetectionofmaliciousadversariesinnetworks. – “Authorizationandauthentication”hasanarticleonpasswordpracticesand another one presenting a game-theoretic authorization model. – “Theory and algorithms for security” containsfour articles on various th- retic and algorithmic aspects of security.
Contents:
Security Investments and Planning
Design of Network Topology in an Adversarial Environment
Optimal Information Security Investment with Penetration Testing
Privacy and Anonymity
Tracking Games in Mobile Networks
gPath: A Game-Theoretic Path Selection Algorithm to Protect Tor’s Anonymity
When Do Firms Invest in Privacy-Preserving Technologies?
Adversarial and Robust Control
Adversarial Control in a Delay Tolerant Network
Security Interdependencies for Networked Control Systems with Identical Agents
Robust Control in Sparse Mobile Ad-Hoc Networks
Network Security and Botnets
A Game-Theoretical Approach for Finding Optimal Strategies in a Botnet Defense Model
ISPs and Ad Networks Against Botnet Ad Fraud
A Localization Game in Wireless Sensor Networks
Effective Multimodel Anomaly Detection Using Cooperative Negotiation
Authorization and Authentication
The Password Game: Negative Externalities from Weak Password Practices
Towards a Game Theoretic Authorisation Model
Theory and Algorithms for Security
Disperse or Unite? A Mathematical Model of Coordinated Attack
Uncertainty in Interdependent Security Games
Attack–Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent
Methods and Algorithms for Infinite Bayesian Stackelberg Security Games.
Notes:
Bibliographic Level Mode of Issuance: Monograph
Includes bibliographical references and index.
ISBN:
1-280-39042-5
9786613568342
3-642-17197-4

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account