Decision and Game Theory for Security : 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings (Security and Cryptology)

個数:
電子版価格
¥9,017
  • 電子版あり

Decision and Game Theory for Security : 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings (Security and Cryptology)

  • オンデマンド(OD/POD)版です。キャンセルは承れません。
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 638 p.
  • 言語 ENG
  • 商品コード 9783030015534

Full Description

The 28 revised full papers presented together with 8 short papers were carefully reviewed and selected from 44 submissions.Among the topical areas covered were: use of game theory; control theory; and mechanism design for security and privacy; decision making for cybersecurity and security requirements engineering; security and privacy for the Internet-of-Things; cyber-physical systems; cloud computing; resilient control systems, and critical infrastructure; pricing; economic incentives; security investments, and cyber insurance for dependable and secure systems; risk assessment and security risk management; security and privacy of wireless and mobile communications, including user location privacy; sociotechnological and behavioral approaches to security; deceptive technologies in cybersecurity and privacy; empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy; and adversarial machine learning and crowdsourcing, and the role of artificial intelligence in system security.

Contents

Use of game theory.- Control theory and mechanism design for security and privacy.- Decision making for cybersecurity and security requirements engineering.- Security and privacy for the Internet-of-Things.- Cyber-physical systems.- cloud computing.- Resilient control systems, and critical infrastructure.- Pricing.- Economic incentives.- Security investments, and cyber insurance for dependable and secure systems.- Risk assessment and security risk management.- Security and privacy of wireless and mobile communications, including user location privacy.- Sociotechnological and behavioral approaches to security.- Deceptive technologies in cybersecurity and privacy.- Empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy.- Adversarial machine learning and crowdsourcing, and the role of artificial intelligence in system security.

最近チェックした商品