000916088 000__ 03540cam\a2200553Ii\4500 000916088 001__ 916088 000916088 005__ 20230306150523.0 000916088 006__ m\\\\\o\\d\\\\\\\\ 000916088 007__ cr\cn\nnnunnun 000916088 008__ 191030s2019\\\\sz\a\\\\o\\\\\100\0\eng\d 000916088 019__ $$a1125995691$$a1126610210 000916088 020__ $$a9783030324308$$q(electronic book) 000916088 020__ $$a3030324303$$q(electronic book) 000916088 020__ $$z9783030324292 000916088 0247_ $$a10.1007/978-3-030-32430-8$$2doi 000916088 0247_ $$a10.1007/978-3-030-32 000916088 035__ $$aSP(OCoLC)on1125324608 000916088 035__ $$aSP(OCoLC)1125324608$$z(OCoLC)1125995691$$z(OCoLC)1126610210 000916088 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dLQU$$dUKMGB 000916088 049__ $$aISEA 000916088 050_4 $$aQA76.76.A65 000916088 08204 $$a005.8$$223 000916088 1112_ $$aGameSec (Conference)$$n(10th :$$d2019 :$$cStockholm, Sweden) 000916088 24510 $$aDecision and game theory for security :$$b10th International Conference, GameSec 2019, Stockholm, Sweden, October 30-November 1, 2019, Proceedings /$$cTansu Alpcan, Yevgeniy Vorobeychik, John S. Baras, György Dán (eds.). 000916088 2463_ $$aGameSec 2019 000916088 264_1 $$aCham, Switzerland :$$bSpringer,$$c2019. 000916088 300__ $$a1 online resource (xi, 584 pages) :$$billustrations. 000916088 336__ $$atext$$btxt$$2rdacontent 000916088 337__ $$acomputer$$bc$$2rdamedia 000916088 338__ $$aonline resource$$bcr$$2rdacarrier 000916088 4901_ $$aLecture notes in computer science ;$$v11836 000916088 4901_ $$aLNCS sublibrary. SL 4, Security and cryptology 000916088 500__ $$aInternational conference proceedings. 000916088 5050_ $$aGame theory, control, and mechanism design for security and privacy -- Decision making for cybersecurity and security requirements engineering -- Security and privacy for the Internet-of-Things, cyber-physical systems, cloud computing, resilient control systems, and critical infrastructure -- Pricing, economic incentives, security investments, and cyber insurance for dependable and secure systems -- Risk assessment and security risk management -- Security and privacy of wireless and mobile communications, including user location privacy -- Socio-technological and behavioral approaches to security -- Empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy -- Adversarial Machine Learning and the role of AI in system security. 000916088 506__ $$aAccess limited to authorized users. 000916088 520__ $$aThis book constitutes the refereed proceedings of the 10th International Conference on Decision and Game Theory for Security, GameSec 2019,held in Stockholm, Sweden, in October 2019. The 21 full papers presented together with 11 short papers were carefully reviewed and selected from 47 submissions.The papers focus on protection of heterogeneous, large-scale and dynamic cyber-physical systems as well as managing security risks faced by critical infrastructures through rigorous and practically-relevant analytical methods. 000916088 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed October 30, 2019). 000916088 650_0 $$aComputer security$$vCongresses. 000916088 650_0 $$aGame theory$$vCongresses. 000916088 7001_ $$aAlpcan, Tansu,$$d1975-$$eeditor. 000916088 7001_ $$aVorobeychik, Yevgeniy,$$eeditor. 000916088 7001_ $$aBaras, John S.,$$eeditor. 000916088 7001_ $$aDán, György,$$eeditor. 000916088 830_0 $$aLecture notes in computer science ;$$v11836. 000916088 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 000916088 852__ $$bebk 000916088 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-030-32430-8$$zOnline Access$$91397441.1 000916088 909CO $$ooai:library.usi.edu:916088$$pGLOBAL_SET 000916088 980__ $$aEBOOK 000916088 980__ $$aBIB 000916088 982__ $$aEbook 000916088 983__ $$aOnline 000916088 994__ $$a92$$bISE