My Account Log in

1 option

Decision and Game Theory for Security : 13th International Conference, GameSec 2022, Pittsburgh, PA, USA, October 26–28, 2022, Proceedings / edited by Fei Fang, Haifeng Xu, Yezekael Hayel.

SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online

View online
Format:
Book
Contributor:
Xu, Haifeng, editor.
Hayel, Yezekael, editor.
Fang, Fei, editor.
Series:
Lecture Notes in Computer Science, 1611-3349 ; 13727
Language:
English
Subjects (All):
Data protection.
Computer engineering.
Computer networks.
Artificial intelligence.
Data and Information Security.
Computer Engineering and Networks.
Artificial Intelligence.
Local Subjects:
Data and Information Security.
Computer Engineering and Networks.
Artificial Intelligence.
Physical Description:
1 online resource (324 pages)
Edition:
1st ed. 2023.
Place of Publication:
Cham : Springer International Publishing : Imprint: Springer, 2023.
Summary:
This book constitutes the refereed proceedings of the 13th International Conference on Decision and Game Theory for Security, GameSec 2022, held in October 2022 in Pittsburgh, PA, USA. The 15 full papers presented were carefully reviewed and selected from 39 submissions. The papers are grouped thematically on: deception in security; planning and learning in dynamic environments; security games; adversarial learning and optimization; novel applications and new game models.
Contents:
Deception in Security
The Risk of Attacker Behavioral Learning: Can Attacker Fool Defender under Uncertainty? .-Casino Rationale: Countering attacker deception in zero-sum Stackelberg security games of bounded rationality
Cyber Deception against Zero-day Attacks: A Game Theoretic Approach
Planning and Learning in Dynamic Enviroments
On Almost-Sure Intention Deception Planning that Exploits Imperfect Observers
Using Deception in Markov Game to Understand Adversarial Behaviors through a Capture-The-Flag Environment
Robust Moving Target Defense against Unknown Attacks: A Meta-Reinforcement Learning Approach
Security Games
Synchronization in Security Games
Multiple Oracle Algorithm to Solve Continuous Games
Optimal Pursuit of Surveilling Agents near a High Value Target
Adversarial Learning and Optimization
On Poisoned Wardrop Equilibrium in Congestion Games
Reward Delay Attacks on Deep Reinforcement Learning
An Exploration of Poisoning Attacks on Data-based Decision Making
Novel Applications and new Game Models
A Network Centrality Game for Epidemic Control
Optimizing Intrusion Detection Systems Placement against Network Virus Spreading using a Partially Observable Stochastic Minimum-Threat Path Game
Voting Games to Model Protocol Stability and Security of Proof-of-Work Cryptocurrencies.
Notes:
Includes index.
Other Format:
Print version: Fang, Fei Decision and Game Theory for Security
ISBN:
9783031263699
3031263693

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

Find

Home Release notes

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Find catalog Using Articles+ Using your account