Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    gbv_1653049774
    Format: Online-Ressource (X, 265 p. 57 illus, online resource)
    ISBN: 9783319027869
    Series Statement: Lecture Notes in Computer Science 8252
    Content: This book constitutes the refereed proceedings of the 4th International Conference on Decision and Game Theory for Security, GameSec 2013, held in Fort Worth, TX, USA, in November 2013. The 15 revised full papers presented were carefully reviewed and selected from numerous submissions. The conference focuses on analytical models based on game, information, communication, optimization, decision, and control theories that are applied to diverse security topics. At the same time, the connection between theoretical models and real world security problems are emphasized to establish the important feedback loop between theory and practice. Observing the scarcity of venues for researchers who try to develop a deeper theoretical understanding of the underlying incentive and resource allocation issues in security, we believe that GameSec will fill an important void and serve as a distinguished forum of highest standards for years to come
    Note: Literaturangaben
    Additional Edition: ISBN 9783319027852
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9783319027852
    Additional Edition: Erscheint auch als Druck-Ausgabe Decision and game theory for security Cham [u.a.] : Springer, 2013 ISBN 3319027859
    Additional Edition: ISBN 9783319027852
    Language: English
    Keywords: Netzwerkverwaltung ; Netzwerktopologie ; Spieltheorie ; Kryptoanalyse ; Privatsphäre ; Trusted Computing ; Eindringerkennung ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages