Decision and Game Theory for Security [electronic resource] : 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedings / edited by MHR Khouzani, Emmanouil Panaousis, George Theodorakopoulos.
2015
QA76.76.A65
Linked e-resources
Linked Resource
Online Access
Concurrent users
Unlimited
Authorized users
Authorized users
Document Delivery Supplied
Can lend chapters, not whole ebooks
Details
Title
Decision and Game Theory for Security [electronic resource] : 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedings / edited by MHR Khouzani, Emmanouil Panaousis, George Theodorakopoulos.
Meeting Name
GameSec (Conference) (6th : 2015 : London, England)
ISBN
9783319255941 electronic book
3319255940 electronic book
9783319255934
3319255940 electronic book
9783319255934
Published
Cham : Springer, 2015.
Language
English
Description
1 online resource (x, 371 pages) : illustrations.
Item Number
10.1007/978-3-319-25594-1 doi
Call Number
QA76.76.A65
Dewey Decimal Classification
005.7
Summary
This book constitutes the refereed proceedings of the 6th International Conference on Decision and Game Theory for Security, GameSec 2015, held in London, UK, in November 2015. The 16 revised full papers presented together with 5 short papers were carefully reviewed and selected from 37 submissions. Game and decision theory has emerged as a valuable systematic framework with powerful analytical tools in dealing with the intricacies involved in making sound and sensible security decisions. For instance, game theory provides methodical approaches to account for interdependencies of security decisions, the role of hidden and asymmetric information, the perception of risks and costs in human behaviour, the incentives/limitations of the attackers, and much more. Combined with our classical approach to computer and network security, and drawing from various fields such as economic, social and behavioural sciences, game and decision theory is playing a fundamental role in the development of the pillars of the "science of security".
Access Note
Access limited to authorized users.
Digital File Characteristics
text file PDF
Series
Lecture notes in computer science ; 9406.
LNCS sublibrary. SL 4, Security and cryptology.
LNCS sublibrary. SL 4, Security and cryptology.
Available in Other Form
Print version: 9783319255934
Linked Resources
Online Access
Record Appears in
Online Resources > Ebooks
All Resources
All Resources