000745375 000__ 03231cam\a2200577Mi\4500 000745375 001__ 745375 000745375 005__ 20230306141305.0 000745375 006__ m\\\\\o\\d\\\\\\\\ 000745375 007__ cr\nn\nnnunnun 000745375 008__ 151111s2015\\\\sz\\\\\\od\\\\100\0\eng\d 000745375 020__ $$a9783319255941$$qelectronic book 000745375 020__ $$a3319255940$$qelectronic book 000745375 020__ $$z9783319255934 000745375 0247_ $$a10.1007/978-3-319-25594-1$$2doi 000745375 035__ $$aSP(OCoLC)ocn932169959 000745375 035__ $$aSP(OCoLC)932169959 000745375 040__ $$aNUI$$beng$$cNUI$$dOCLCO$$dORU$$dYDXCP$$dOCLCF$$dGW5XE$$dOCLCO 000745375 049__ $$aISEA 000745375 050_4 $$aQA76.76.A65 000745375 08204 $$a005.7$$223 000745375 1112_ $$aGameSec (Conference)$$n(6th :$$d2015 :$$cLondon, England) 000745375 24510 $$aDecision and Game Theory for Security$$h[electronic resource] :$$b6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedings /$$cedited by MHR Khouzani, Emmanouil Panaousis, George Theodorakopoulos. 000745375 2463_ $$aGameSec 2015 000745375 264_1 $$aCham :$$bSpringer,$$c2015. 000745375 300__ $$a1 online resource (x, 371 pages) :$$billustrations. 000745375 336__ $$atext$$btxt$$2rdacontent 000745375 337__ $$acomputer$$bc$$2rdamedia 000745375 338__ $$aonline resource$$bcr$$2rdacarrier 000745375 347__ $$atext file$$bPDF$$2rda 000745375 4901_ $$aLecture Notes in Computer Science,$$x0302-9743 ;$$v9406 000745375 4901_ $$aLNCS sublibrary. SL 4, Security and cryptology 000745375 506__ $$aAccess limited to authorized users. 000745375 520__ $$aThis book constitutes the refereed proceedings of the 6th International Conference on Decision and Game Theory for Security, GameSec 2015, held in London, UK, in November 2015. The 16 revised full papers presented together with 5 short papers were carefully reviewed and selected from 37 submissions. Game and decision theory has emerged as a valuable systematic framework with powerful analytical tools in dealing with the intricacies involved in making sound and sensible security decisions. For instance, game theory provides methodical approaches to account for interdependencies of security decisions, the role of hidden and asymmetric information, the perception of risks and costs in human behaviour, the incentives/limitations of the attackers, and much more. Combined with our classical approach to computer and network security, and drawing from various fields such as economic, social and behavioural sciences, game and decision theory is playing a fundamental role in the development of the pillars of the "science of security". 000745375 650_0 $$aComputer security$$vCongresses. 000745375 650_0 $$aGame theory$$vCongresses. 000745375 650_0 $$aComputer science. 000745375 650_0 $$aComputer networks. 000745375 650_0 $$aComputer security. 000745375 650_0 $$aAlgorithms. 000745375 650_0 $$aManagement information systems. 000745375 650_0 $$aGame theory. 000745375 7001_ $$aKhouzani, MHR.$$eeditor. 000745375 7001_ $$aPanaousis, Emmanouil.$$eeditor. 000745375 7001_ $$aTheodorakopoulos, George.$$eeditor. 000745375 77608 $$iPrint version:$$z9783319255934 000745375 830_0 $$aLecture notes in computer science ;$$v9406. 000745375 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 000745375 85280 $$bebk$$hSpringerLink 000745375 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-25594-1$$zOnline Access$$91397441.1 000745375 909CO $$ooai:library.usi.edu:745375$$pGLOBAL_SET 000745375 980__ $$aEBOOK 000745375 980__ $$aBIB 000745375 982__ $$aEbook 000745375 983__ $$aOnline 000745375 994__ $$a92$$bISE