000711877 000__ 02700cam\a2200481Ii\4500 000711877 001__ 711877 000711877 005__ 20230306140214.0 000711877 006__ m\\\\\o\\d\\\\\\\\ 000711877 007__ cr\cn\nnnunnun 000711877 008__ 141016s2014\\\\sz\a\\\\o\\\\\101\0\eng\d 000711877 020__ $$a9783319126012$$qelectronic book 000711877 020__ $$a3319126016$$qelectronic book 000711877 020__ $$z9783319126005 000711877 0247_ $$a10.1007/978-3-319-12601-2$$2doi 000711877 035__ $$aSP(OCoLC)ocn893106157 000711877 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dYDXCP$$dUPM 000711877 049__ $$aISEA 000711877 050_4 $$aTK5105.59 000711877 08204 $$a005.8$$223 000711877 1112_ $$aGameSec (Conference)$$n(5th :$$d2014 :$$cLos Angeles, Calif.) 000711877 24510 $$aDecision and game theory for security$$h[electronic resource] :$$b5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings /$$cRadha Poovendran, Walid Saad (eds.). 000711877 2463_ $$aGameSec 2014 000711877 264_1 $$aCham :$$bSpringer,$$c2014. 000711877 300__ $$a1 online resource (xii, 381 pages) :$$billustrations. 000711877 336__ $$atext$$btxt$$2rdacontent 000711877 337__ $$acomputer$$bc$$2rdamedia 000711877 338__ $$aonline resource$$bcr$$2rdacarrier 000711877 4901_ $$aLecture Notes in Computer Science,$$x0302-9743 ;$$v8840 000711877 4901_ $$aLNCS sublibrary. SL 4, Security and cryptology 000711877 500__ $$aInternational conference proceedings. 000711877 500__ $$aIncludes author index. 000711877 506__ $$aAccess limited to authorized users. 000711877 520__ $$aThis book constitutes the refereed proceedings of the 5th International Conference on Decision and Game Theory for Security, GameSec 2014, held in Los Angeles, CA, USA, in November 2014. The 16 revised full papers presented together with 7 short papers were carefully reviewed and selected from numerous submissions. The covered topics cover multiple facets of cyber security that include: rationality of adversary, game-theoretic cryptographic techniques, vulnerability discovery and assessment, multi-goal security analysis, secure computation, economic-oriented security, and surveillance for security. Those aspects are covered in a multitude of domains that include networked systems, wireless communications, border patrol security, and control systems. 000711877 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed October 16, 2014). 000711877 650_0 $$aComputer networks$$xSecurity measures$$vCongresses. 000711877 7001_ $$aPoovendran, Radha,$$eeditor. 000711877 7001_ $$aSaad, Walid,$$eeditor. 000711877 830_0 $$aLecture notes in computer science ;$$v8840. 000711877 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 000711877 85280 $$bebk$$hSpringerLink 000711877 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://dx.doi.org/10.1007/978-3-319-12601-2$$zOnline Access 000711877 909CO $$ooai:library.usi.edu:711877$$pGLOBAL_SET 000711877 980__ $$aEBOOK 000711877 980__ $$aBIB 000711877 982__ $$aEbook 000711877 983__ $$aOnline 000711877 994__ $$a92$$bISE