Decision and Game Theory for Security 7th International Conference GameSec 2016 New York NY USA November 2 4 2016 Proceedings 1st Edition Quanyan Zhu – Ebook Instant Download/Delivery ISBN(s): 3319474138, 9783319474137
Product details:
- ISBN 10: 3319474138
- ISBN 13: 9783319474137
- Author: Quanyan
This book constitutes the refereed proceedings of the 7th International Conference on Decision and Game Theory for Security, GameSec 2016, held in New York, NY, USA, in November 2016. The 18 revised full papers presented together with 8 short papers and 5 poster papers were carefully reviewed and selected from 40 submissions. The papers are organized in topical sections on network security; security risks and investments; special track-validating models; decision making for privacy; security games; incentives and cybersecurity mechanisms; and intrusion detection and information limitations in security.
Table of contents:
1. Network Security
Resilience of Routing in Parallel Link Networks
Deception-Based Game Theoretical Approach to Mitigate DoS Attacks
Data Exfiltration Detection and Prevention: Virtually Distributed POMDPs for Practically Safer Networks
On the Mitigation of Interference Imposed by Intruders in Passive RFID Networks
2. Security Risks and Investments
Risk Averse Stackelberg Security Games with Quantal Response
Optimal and Game-Theoretic Deployment of Security Investments in Interdependent Assets
Dynamics on Linear Influence Network Games Under Stochastic Environments
3. Special Track-Validating Models
Patrolling a Pipeline
Optimal Allocation of Police Patrol Resources Using a Continuous-Time Crime Model
A Methodology to Apply a Game Theoretic Model of Security Risks Interdependencies Between ICT and Electric Infrastructures
4. Decision Making for Privacy
On the Adoption of Privacy-enhancing Technologies
FlipLeakage: A Game-Theoretic Approach to Protect Against Stealthy Attackers in the Presence of Information Leakage
Scalar Quadratic-Gaussian Soft Watermarking Games
Strategies for Voter-Initiated Election Audits
5. Security Games
Combining Graph Contraction and Strategy Generation for Green Security Games
Divide to Defend: Collusive Security Games
A Game-Theoretic Approach to Respond to Attacker Lateral Movement
GADAPT: A Sequential Game-Theoretic Framework for Designing Defense-in-Depth Strategies Against Advanced Persistent Threats
6. Incentives and Cybersecurity Mechanisms
Optimal Contract Design Under Asymmetric Information for Cloud-Enabled Internet of Controlled Things
Becoming Cybercriminals: Incentives in Networks with Interdependent Security
A Logic for the Compliance Budget
A Game-Theoretic Analysis of Deception over Social Networks Using Fake Avatars
7. Intrusion Detection and Information Limitations in Security
People also search:
decision making and game theory
security games game theory
decision theory vs game theory
security level game theory
security strategy game theory