Buch, Englisch, 534 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 820 g
Reihe: Security and Cryptology
8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings
Buch, Englisch, 534 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 820 g
Reihe: Security and Cryptology
ISBN: 978-3-319-68710-0
Verlag: Springer International Publishing
The 24 revised full papers presented together with 4 short papers were carefully reviewed and selected from 71 submissions.The papers address topics such as Game theory and mechanism design for security and privacy; Pricing and economic incentives for building dependable and secure systems; Dynamic control, learning, and optimization and approximation techniques; Decision making and decision theory for cybersecurity and security requirements engineering; Socio-technological and behavioral approaches to security; Risk assessment and risk management; Security investment and cyber insurance; Security and privacy for the Internet-of-Things (IoT), cyber-physical systems, resilient control systems; New approaches for security and privacy in cloud computing and for critical infrastructure; Security and privacy of wireless and mobile communications, including user location privacy; Game theory for intrusion detection; and Empirical and experimental studies with game-theoretic or optimization analysis for security and privacy.
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
Weitere Infos & Material
Game theory and mechanism design for security and privacy.- Pricing and economic incentives for building dependable and secure systems.- Dynamic control, learning, and optimization and approximation techniques.- Decision making and decision theory for cybersecurity and security requirements engineering.- Socio-technological and behavioral approaches to security.- Risk assessment and risk management.- Security investment and cyber insurance.- Security and privacy for the Internet-of-Things (IoT), cyber-physical systems, resilient control systems.- New approaches for security and privacy in cloud computing and for critical infrastructure.- Security and privacy of wireless and mobile communications, including user location privacy.- Game theory for intrusion detection.- Empirical and experimental studies with game-theoretic or optimization analysis for security and privacy.