語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Dynamic Games for Network Security
~
SpringerLink (Online service)
Dynamic Games for Network Security
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Dynamic Games for Network Security/ by Xiaofan He, Huaiyu Dai.
作者:
He, Xiaofan.
其他作者:
Dai, Huaiyu.
面頁冊數:
X, 74 p.online resource. :
Contained By:
Springer Nature eBook
標題:
Electrical engineering. -
電子資源:
https://doi.org/10.1007/978-3-319-75871-8
ISBN:
9783319758718
Dynamic Games for Network Security
He, Xiaofan.
Dynamic Games for Network Security
[electronic resource] /by Xiaofan He, Huaiyu Dai. - 1st ed. 2018. - X, 74 p.online resource. - SpringerBriefs in Electrical and Computer Engineering,2191-8112. - SpringerBriefs in Electrical and Computer Engineering,.
The goal of this SpringerBrief is to collect and systematically present the state-of-the-art in this research field and the underlying game-theoretic and learning tools to the broader audience with general network security and engineering backgrounds. Particularly, the exposition of this book begins with a brief introduction of relevant background knowledge in Chapter 1, followed by a review of existing applications of SG in addressing various dynamic network security problems in Chapter 2. A detailed treatment of dynamic security games with information asymmetry is given in Chapters 3–5. Specifically, dynamic security games with extra information that concerns security competitions, where the defender has an informational advantage over the adversary are discussed in Chapter 3. The complementary scenarios where the defender lacks information about the adversary is examined in Chapter 4 through the lens of incomplete information SG. Chapter 5 is devoted to the exploration of how to proactively create information asymmetry for the defender’s benefit. The primary audience for this brief includes network engineers interested in security decision-making in dynamic network security problems. Researchers interested in the state-of-the-art research on stochastic game theory and its applications in network security will be interested in this SpringerBrief as well. Also graduate and undergraduate students interested in obtaining comprehensive information on stochastic game theory and applying it to address relevant research problems can use this SpringerBrief as a study guide. Lastly, concluding remarks and our perspective for future works are presented in Chapter 6.
ISBN: 9783319758718
Standard No.: 10.1007/978-3-319-75871-8doiSubjects--Topical Terms:
596380
Electrical engineering.
LC Class. No.: TK1-9971
Dewey Class. No.: 621.382
Dynamic Games for Network Security
LDR
:02993nam a22003855i 4500
001
993411
003
DE-He213
005
20200704103434.0
007
cr nn 008mamaa
008
201225s2018 gw | s |||| 0|eng d
020
$a
9783319758718
$9
978-3-319-75871-8
024
7
$a
10.1007/978-3-319-75871-8
$2
doi
035
$a
978-3-319-75871-8
050
4
$a
TK1-9971
072
7
$a
TJK
$2
bicssc
072
7
$a
TEC041000
$2
bisacsh
072
7
$a
TJK
$2
thema
082
0 4
$a
621.382
$2
23
100
1
$a
He, Xiaofan.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1202391
245
1 0
$a
Dynamic Games for Network Security
$h
[electronic resource] /
$c
by Xiaofan He, Huaiyu Dai.
250
$a
1st ed. 2018.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2018.
300
$a
X, 74 p.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
SpringerBriefs in Electrical and Computer Engineering,
$x
2191-8112
520
$a
The goal of this SpringerBrief is to collect and systematically present the state-of-the-art in this research field and the underlying game-theoretic and learning tools to the broader audience with general network security and engineering backgrounds. Particularly, the exposition of this book begins with a brief introduction of relevant background knowledge in Chapter 1, followed by a review of existing applications of SG in addressing various dynamic network security problems in Chapter 2. A detailed treatment of dynamic security games with information asymmetry is given in Chapters 3–5. Specifically, dynamic security games with extra information that concerns security competitions, where the defender has an informational advantage over the adversary are discussed in Chapter 3. The complementary scenarios where the defender lacks information about the adversary is examined in Chapter 4 through the lens of incomplete information SG. Chapter 5 is devoted to the exploration of how to proactively create information asymmetry for the defender’s benefit. The primary audience for this brief includes network engineers interested in security decision-making in dynamic network security problems. Researchers interested in the state-of-the-art research on stochastic game theory and its applications in network security will be interested in this SpringerBrief as well. Also graduate and undergraduate students interested in obtaining comprehensive information on stochastic game theory and applying it to address relevant research problems can use this SpringerBrief as a study guide. Lastly, concluding remarks and our perspective for future works are presented in Chapter 6.
650
0
$a
Electrical engineering.
$3
596380
650
0
$a
Data protection.
$3
557764
650
1 4
$a
Communications Engineering, Networks.
$3
669809
650
2 4
$a
Security.
$3
1114130
700
1
$a
Dai, Huaiyu.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1202392
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783319758701
776
0 8
$i
Printed edition:
$z
9783319758725
830
0
$a
SpringerBriefs in Electrical and Computer Engineering,
$x
2191-8112
$3
1253713
856
4 0
$u
https://doi.org/10.1007/978-3-319-75871-8
912
$a
ZDB-2-ENG
912
$a
ZDB-2-SXE
950
$a
Engineering (SpringerNature-11647)
950
$a
Engineering (R0) (SpringerNature-43712)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入