Decision and game theory for security : first international conference, GameSec 2010, Berlin, Germany, November 22 - 23, 2010 ; proceedings (English)
- New search for: GameSec
- Further information on GameSec:
- http://d-nb.info/gnd/16091228-3
- New search for: Alpcan, Tansu
- New search for: Buttyán, Levente
- New search for: Baras, John S.
- New search for: GameSec
- Further information on GameSec:
- http://d-nb.info/gnd/16091228-3
2010
-
ISBN:
- Conference Proceedings / Electronic Resource
-
Title:Decision and game theory for security : first international conference, GameSec 2010, Berlin, Germany, November 22 - 23, 2010 ; proceedings
-
Contributors:
-
Conference:GameSec ; 1 ; 2010 ; Berlin
Conference on Decision and Game Theory for Security ; 1 ; 2010 ; Berlin -
Published in:
-
Publisher:
- New search for: Springer
-
Place of publication:Berlin [u.a.]
-
Publication date:2010
-
Size:Online-Ressource (XII 265 S.)
-
Remarks:Campusweiter Zugriff (Universität Hannover). - Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Keine Weitergabe an Dritte. Kein systematisches Downloaden durch Robots.
Literaturangaben -
ISBN:
-
DOI:
-
Type of media:Conference Proceedings
-
Type of material:Electronic Resource
-
Language:English
- New search for: 004
- Further information on Dewey Decimal Classification
- New search for: 54.38
- Further information on Basic classification
-
Keywords:
-
Classification:
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Design of Network Topology in an Adversarial EnvironmentGueye, A. / Walrand, J.C. / Anantharam, V. et al. | 2010
- 21
-
Optimal Information Security Investment with Penetration TestingBohme, R. / Felegyhazi, M. et al. | 2010
- 38
-
Tracking Games in Mobile NetworksHumbert, M. / Manshaei, M.H. / Freudiger, J. / Hubaux, J.-P. et al. | 2010
- 58
-
gPath: A Game-Theoretic Path Selection Algorithm to Protect Tor's AnonymityZhang, N. / Yu, W. / Fu, X. / Das, S.K. et al. | 2010
- 72
-
When Do Firms Invest in Privacy-Preserving Technologies?Kantarcioglu, M. / Bensoussan, A. / Hoe, S. et al. | 2010
- 87
-
Adversarial Control in a Delay Tolerant NetworkAltman, E. / Basar, T. / Kavitha, V. et al. | 2010
- 107
-
Security Interdependencies for Networked Control Systems with Identical AgentsAmin, S. / Schwartz, G.A. / Sastry, S.S. et al. | 2010
- 123
-
Robust Control in Sparse Mobile Ad-Hoc NetworksAltman, E. / Aram, A. / Basar, T. / Touati, C. / Sarkar, S. et al. | 2010
- 135
-
A Game-Theoretical Approach for Finding Optimal Strategies in a Botnet Defense ModelBensoussan, A. / Kantarcioglu, M. / Hoe, S. et al. | 2010
- 149
-
ISPs and Ad Networks against Botnet Ad FraudVratonjic, N. / Manshaei, M.H. / Raya, M. / Hubaux, J.-P. et al. | 2010
- 168
-
A Localization Game in Wireless Sensor NetworksGatti, N. / Monga, M. / Sicari, S. et al. | 2010
- 180
-
Effective Multimodel Anomaly Detection Using Cooperative NegotiationVolpatto, A. / Maggi, F. / Zanero, S. et al. | 2010
- 192
-
The Password Game: Negative Externalities from Weak Password PracticesPreibusch, S. / Bonneau, J. et al. | 2010
- 208
-
Towards a Game Theoretic Authorisation ModelSalim, F. / Reid, J. / Dulleck, U. / Dawson, E. et al. | 2010
- 220
-
Disperse or Unite? A Mathematical Model of Coordinated AttackAlpern, S. / Fokkink, R. / Kelder, J.o.d. / Lidbetter, T. et al. | 2010
- 234
-
Uncertainty in Interdependent Security GamesJohnson, B. / Grossklags, J. / Christin, N. / Chuang, J. et al. | 2010
- 245
-
Attack-Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are EquivalentKordy, B. / Mauw, S. / Melissen, M. / Schweitzer, P. et al. | 2010
- 257
-
Methods and Algorithms for Infinite Bayesian Stackelberg Security Games (Extended Abstract)Kiekintveld, C. / Marecki, J. / Tambe, M. et al. | 2010