語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Game Theory for Security and Risk Ma...
~
Rass, Stefan.
Game Theory for Security and Risk Management = From Theory to Practice /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Game Theory for Security and Risk Management/ edited by Stefan Rass, Stefan Schauer.
其他題名:
From Theory to Practice /
其他作者:
Rass, Stefan.
面頁冊數:
XXXII, 418 p. 108 illus., 42 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Game theory. -
電子資源:
https://doi.org/10.1007/978-3-319-75268-6
ISBN:
9783319752686
Game Theory for Security and Risk Management = From Theory to Practice /
Game Theory for Security and Risk Management
From Theory to Practice /[electronic resource] :edited by Stefan Rass, Stefan Schauer. - 1st ed. 2018. - XXXII, 418 p. 108 illus., 42 illus. in color.online resource. - Static & Dynamic Game Theory: Foundations & Applications,2363-8516. - Static & Dynamic Game Theory: Foundations & Applications,.
Part I: Theory -- Utilizing Game Theory for Security Risk Assessment -- Decision Making when Consequences are Random -- Security Strategies and Multi-Criteria Decision Making -- A Scalable Decomposition Method for the Dynamic Defense of Cyber Networks -- Factored Markov Game Theory for Secure Interdependent Infrastructure Networks -- Part II: Practice -- G-DPS: A Game-Theoretical Decision-Making Framework for Physical Surveillance Games -- A Game-Theoretic Framework for Securing Interdependent Assets in Networks -- Random Damage in interconnected Networks -- Optimal Dispatch of Electric Transmission Systems Considering Interdependencies with Natural Gas Systems -- Managing Security Risks Interdependencies between ICT and Electric Infrastructures: A Game-Theoretical Analysis -- Part III: Case Studies -- Security and Interdependency in a Public Cloud: A Game-Theoretic Approach -- A Risk Management Approach for Highly Interconnected Networks -- Protecting Water Utility Networks from Advanced Persistent Threats: A Case Study -- Assessing the Impact of Malware Attacks in Utility Networks -- Game-Theoretic Optimization for Physical Surveillance of Critical Infrastructures: A Case Study -- Smart SECPLAN: A Process Implementation Tool for Hybrid Risk Management.
The chapters in this volume explore how various methods from game theory can be utilized to optimize security and risk-management strategies. Emphasizing the importance of connecting theory and practice, they detail the steps involved in selecting, adapting, and analyzing game-theoretic models in security engineering and provide case studies of successful implementations in different application domains. Practitioners who are not experts in game theory and are uncertain about incorporating it into their work will benefit from this resource, as well as researchers in applied mathematics and computer science interested in current developments and future directions. The first part of the book presents the theoretical basics, covering various different game-theoretic models related to and suitable for security engineering. The second part then shows how these models are adopted, implemented, and analyzed. Surveillance systems, interconnected networks, and power grids are among the different application areas discussed. Finally, in the third part, case studies from business and industry of successful applications of game-theoretic models are presented, and the range of applications discussed is expanded to include such areas as cloud computing, Internet of Things, and water utility networks.
ISBN: 9783319752686
Standard No.: 10.1007/978-3-319-75268-6doiSubjects--Topical Terms:
556918
Game theory.
LC Class. No.: HB144
Dewey Class. No.: 519
Game Theory for Security and Risk Management = From Theory to Practice /
LDR
:04093nam a22004215i 4500
001
998124
003
DE-He213
005
20200702143201.0
007
cr nn 008mamaa
008
201225s2018 gw | s |||| 0|eng d
020
$a
9783319752686
$9
978-3-319-75268-6
024
7
$a
10.1007/978-3-319-75268-6
$2
doi
035
$a
978-3-319-75268-6
050
4
$a
HB144
050
4
$a
QA269-272
072
7
$a
PBUD
$2
bicssc
072
7
$a
MAT011000
$2
bisacsh
072
7
$a
PBUD
$2
thema
082
0 4
$a
519
$2
23
245
1 0
$a
Game Theory for Security and Risk Management
$h
[electronic resource] :
$b
From Theory to Practice /
$c
edited by Stefan Rass, Stefan Schauer.
250
$a
1st ed. 2018.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Birkhäuser,
$c
2018.
300
$a
XXXII, 418 p. 108 illus., 42 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Static & Dynamic Game Theory: Foundations & Applications,
$x
2363-8516
505
0
$a
Part I: Theory -- Utilizing Game Theory for Security Risk Assessment -- Decision Making when Consequences are Random -- Security Strategies and Multi-Criteria Decision Making -- A Scalable Decomposition Method for the Dynamic Defense of Cyber Networks -- Factored Markov Game Theory for Secure Interdependent Infrastructure Networks -- Part II: Practice -- G-DPS: A Game-Theoretical Decision-Making Framework for Physical Surveillance Games -- A Game-Theoretic Framework for Securing Interdependent Assets in Networks -- Random Damage in interconnected Networks -- Optimal Dispatch of Electric Transmission Systems Considering Interdependencies with Natural Gas Systems -- Managing Security Risks Interdependencies between ICT and Electric Infrastructures: A Game-Theoretical Analysis -- Part III: Case Studies -- Security and Interdependency in a Public Cloud: A Game-Theoretic Approach -- A Risk Management Approach for Highly Interconnected Networks -- Protecting Water Utility Networks from Advanced Persistent Threats: A Case Study -- Assessing the Impact of Malware Attacks in Utility Networks -- Game-Theoretic Optimization for Physical Surveillance of Critical Infrastructures: A Case Study -- Smart SECPLAN: A Process Implementation Tool for Hybrid Risk Management.
520
$a
The chapters in this volume explore how various methods from game theory can be utilized to optimize security and risk-management strategies. Emphasizing the importance of connecting theory and practice, they detail the steps involved in selecting, adapting, and analyzing game-theoretic models in security engineering and provide case studies of successful implementations in different application domains. Practitioners who are not experts in game theory and are uncertain about incorporating it into their work will benefit from this resource, as well as researchers in applied mathematics and computer science interested in current developments and future directions. The first part of the book presents the theoretical basics, covering various different game-theoretic models related to and suitable for security engineering. The second part then shows how these models are adopted, implemented, and analyzed. Surveillance systems, interconnected networks, and power grids are among the different application areas discussed. Finally, in the third part, case studies from business and industry of successful applications of game-theoretic models are presented, and the range of applications discussed is expanded to include such areas as cloud computing, Internet of Things, and water utility networks.
650
0
$a
Game theory.
$3
556918
650
0
$a
Operations research.
$3
573517
650
0
$a
Management science.
$3
719678
650
0
$a
Computer security.
$3
557122
650
0
$a
Decision making.
$3
528319
650
1 4
$a
Game Theory, Economics, Social and Behav. Sciences.
$3
669497
650
2 4
$a
Operations Research, Management Science.
$3
785065
650
2 4
$a
Systems and Data Security.
$3
677062
650
2 4
$a
Operations Research/Decision Theory.
$3
669176
650
2 4
$a
Game Theory.
$3
1102060
700
1
$a
Rass, Stefan.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1171805
700
1
$a
Schauer, Stefan.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1207675
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783319752679
776
0 8
$i
Printed edition:
$z
9783319752693
776
0 8
$i
Printed edition:
$z
9783030091866
830
0
$a
Static & Dynamic Game Theory: Foundations & Applications,
$x
2363-8516
$3
1267939
856
4 0
$u
https://doi.org/10.1007/978-3-319-75268-6
912
$a
ZDB-2-SMA
912
$a
ZDB-2-SXMS
950
$a
Mathematics and Statistics (SpringerNature-11649)
950
$a
Mathematics and Statistics (R0) (SpringerNature-43713)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入