Atjaunināt sīkdatņu piekrišanu

Decision and Game Theory for Security: 9th International Conference, GameSec 2018, Seattle, WA, USA, October 2931, 2018, Proceedings 2018 ed. [Mīkstie vāki]

Edited by , Edited by , Edited by
  • Formāts: Paperback / softback, 638 pages, height x width: 235x155 mm, weight: 985 g, 174 Illustrations, black and white; XIII, 638 p. 174 illus., 1 Paperback / softback
  • Sērija : Security and Cryptology 11199
  • Izdošanas datums: 26-Sep-2018
  • Izdevniecība: Springer Nature Switzerland AG
  • ISBN-10: 303001553X
  • ISBN-13: 9783030015534
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 46,91 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 55,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 638 pages, height x width: 235x155 mm, weight: 985 g, 174 Illustrations, black and white; XIII, 638 p. 174 illus., 1 Paperback / softback
  • Sērija : Security and Cryptology 11199
  • Izdošanas datums: 26-Sep-2018
  • Izdevniecība: Springer Nature Switzerland AG
  • ISBN-10: 303001553X
  • ISBN-13: 9783030015534
Citas grāmatas par šo tēmu:
The 28 revised full papers presented together with 8 short papers were carefully reviewed and selected from 44 submissions.
Among the topical areas covered were: use of game theory; control theory; and mechanism design for security and privacy; decision making for cybersecurity and security requirements engineering; security and privacy for the Internet-of-Things; cyber-physical systems; cloud computing; resilient control systems, and critical infrastructure; pricing; economic incentives; security investments, and cyber insurance for dependable and secure systems; risk assessment and security risk management; security and privacy of wireless and mobile communications, including user location privacy; sociotechnological and behavioral approaches to security; deceptive technologies in cybersecurity and privacy; empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy; and adversarial machine learning and crowdsourcing, and the role of artificial intelligence in system security.

Use of game theory.- Control theory and mechanism design for security and privacy.- Decision making for cybersecurity and security requirements engineering.- Security and privacy for the Internet-of-Things.- Cyber-physical systems.- cloud computing.- Resilient control systems, and critical infrastructure.- Pricing.- Economic incentives.- Security investments, and cyber insurance for dependable and secure systems.- Risk assessment and security risk management.- Security and privacy of wireless and mobile communications, including user location privacy.- Sociotechnological and behavioral approaches to security.- Deceptive technologies in cybersecurity and privacy.- Empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy.- Adversarial machine learning and crowdsourcing, and the role of artificial intelligence in system security.