Decision and Game Theory for Security First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings /

This book constitutes the refereed proceedings of the First International Conference on Decision and Game Theory for Security, GameSec 2010, held in Berlin, Germany, in November 2010. The 12 revised full papers and 6 revised short papers presented were carefully reviewed and selected from numerous s...

Full description

Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Alpcan, Tansu. (Editor), Buttyǹ, Levente. (Editor), Baras, John S. (Editor)
Format: Electronic
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg, 2010.
Series:Lecture Notes in Computer Science, 6442
Subjects:
Online Access:https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-3-642-17197-0
LEADER 02884nam a22005775i 4500
001 11388
003 DE-He213
005 20130725202949.0
007 cr nn 008mamaa
008 101122s2010 gw | s |||| 0|eng d
020 # # |a 9783642171970  |9 978-3-642-17197-0 
024 7 # |a 10.1007/978-3-642-17197-0  |2 doi 
050 # 4 |a QA76.9.A25 
072 # 7 |a URY  |2 bicssc 
072 # 7 |a COM053000  |2 bisacsh 
082 0 4 |a 005.82  |2 23 
100 1 # |a Alpcan, Tansu.  |e editor. 
245 1 0 |a Decision and Game Theory for Security  |b First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings /  |c edited by Tansu Alpcan, Levente Buttyǹ, John S. Baras.  |h [electronic resource] : 
264 # 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg,  |c 2010. 
300 # # |a X, 281p. 60 illus.  |b online resource. 
336 # # |a text  |b txt  |2 rdacontent 
337 # # |a computer  |b c  |2 rdamedia 
338 # # |a online resource  |b cr  |2 rdacarrier 
347 # # |a text file  |b PDF  |2 rda 
490 1 # |a Lecture Notes in Computer Science,  |v 6442  |x 0302-9743 ; 
520 # # |a This book constitutes the refereed proceedings of the First International Conference on Decision and Game Theory for Security, GameSec 2010, held in Berlin, Germany, in November 2010. The 12 revised full papers and 6 revised short papers presented were carefully reviewed and selected from numerous submissions and focus on analytical models based on game, information, communication, optimization, decision, and control theories that are applied to diverse security topics. The papers are organized in topical sections on security investments and planning, privacy and anonymity, adversarial and robust control, network security and botnets, authorization and authentication, as well as theory and algorithms for security. 
650 # 0 |a Computer science. 
650 # 0 |a Computer Communication Networks. 
650 # 0 |a Data protection. 
650 # 0 |a Data encryption (Computer science). 
650 # 0 |a Computer software. 
650 # 0 |a Information Systems. 
650 # 0 |a Mathematics. 
650 1 4 |a Computer Science. 
650 2 4 |a Data Encryption. 
650 2 4 |a Computer Communication Networks. 
650 2 4 |a Systems and Data Security. 
650 2 4 |a Algorithm Analysis and Problem Complexity. 
650 2 4 |a Management of Computing and Information Systems. 
650 2 4 |a Game Theory, Economics, Social and Behav. Sciences. 
700 1 # |a Buttyǹ, Levente.  |e editor. 
700 1 # |a Baras, John S.  |e editor. 
710 2 # |a SpringerLink (Online service) 
773 0 # |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783642171963 
830 # 0 |a Lecture Notes in Computer Science,  |v 6442  |x 0302-9743 ; 
856 4 0 |u https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-3-642-17197-0 
912 # # |a ZDB-2-SCS 
912 # # |a ZDB-2-LNC 
950 # # |a Computer Science (Springer-11645)