|
|
|
|
LEADER |
02884nam a22005775i 4500 |
001 |
11388 |
003 |
DE-He213 |
005 |
20130725202949.0 |
007 |
cr nn 008mamaa |
008 |
101122s2010 gw | s |||| 0|eng d |
020 |
# |
# |
|a 9783642171970
|9 978-3-642-17197-0
|
024 |
7 |
# |
|a 10.1007/978-3-642-17197-0
|2 doi
|
050 |
# |
4 |
|a QA76.9.A25
|
072 |
# |
7 |
|a URY
|2 bicssc
|
072 |
# |
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.82
|2 23
|
100 |
1 |
# |
|a Alpcan, Tansu.
|e editor.
|
245 |
1 |
0 |
|a Decision and Game Theory for Security
|b First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings /
|c edited by Tansu Alpcan, Levente Buttyǹ, John S. Baras.
|h [electronic resource] :
|
264 |
# |
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg,
|c 2010.
|
300 |
# |
# |
|a X, 281p. 60 illus.
|b online resource.
|
336 |
# |
# |
|a text
|b txt
|2 rdacontent
|
337 |
# |
# |
|a computer
|b c
|2 rdamedia
|
338 |
# |
# |
|a online resource
|b cr
|2 rdacarrier
|
347 |
# |
# |
|a text file
|b PDF
|2 rda
|
490 |
1 |
# |
|a Lecture Notes in Computer Science,
|v 6442
|x 0302-9743 ;
|
520 |
# |
# |
|a This book constitutes the refereed proceedings of the First International Conference on Decision and Game Theory for Security, GameSec 2010, held in Berlin, Germany, in November 2010. The 12 revised full papers and 6 revised short papers presented were carefully reviewed and selected from numerous submissions and focus on analytical models based on game, information, communication, optimization, decision, and control theories that are applied to diverse security topics. The papers are organized in topical sections on security investments and planning, privacy and anonymity, adversarial and robust control, network security and botnets, authorization and authentication, as well as theory and algorithms for security.
|
650 |
# |
0 |
|a Computer science.
|
650 |
# |
0 |
|a Computer Communication Networks.
|
650 |
# |
0 |
|a Data protection.
|
650 |
# |
0 |
|a Data encryption (Computer science).
|
650 |
# |
0 |
|a Computer software.
|
650 |
# |
0 |
|a Information Systems.
|
650 |
# |
0 |
|a Mathematics.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Data Encryption.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Algorithm Analysis and Problem Complexity.
|
650 |
2 |
4 |
|a Management of Computing and Information Systems.
|
650 |
2 |
4 |
|a Game Theory, Economics, Social and Behav. Sciences.
|
700 |
1 |
# |
|a Buttyǹ, Levente.
|e editor.
|
700 |
1 |
# |
|a Baras, John S.
|e editor.
|
710 |
2 |
# |
|a SpringerLink (Online service)
|
773 |
0 |
# |
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642171963
|
830 |
# |
0 |
|a Lecture Notes in Computer Science,
|v 6442
|x 0302-9743 ;
|
856 |
4 |
0 |
|u https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-3-642-17197-0
|
912 |
# |
# |
|a ZDB-2-SCS
|
912 |
# |
# |
|a ZDB-2-LNC
|
950 |
# |
# |
|a Computer Science (Springer-11645)
|