Decision and Game Theory for Security
Springer International Publishing (Verlag)
978-3-031-26368-2 (ISBN)
Deception in Security.- The Risk of Attacker Behavioral Learning: Can Attacker Fool Defender under Uncertainty? .-Casino Rationale: Countering attacker deception in zero-sum Stackelberg security games of bounded rationality.- Cyber Deception against Zero-day Attacks: A Game Theoretic Approach.- Planning and Learning in Dynamic Enviroments.- On Almost-Sure Intention Deception Planning that Exploits Imperfect Observers.- Using Deception in Markov Game to Understand Adversarial Behaviors through a Capture-The-Flag Environment.- Robust Moving Target Defense against Unknown Attacks: A Meta-Reinforcement Learning Approach.- Security Games.- Synchronization in Security Games.- Multiple Oracle Algorithm to Solve Continuous Games.- Optimal Pursuit of Surveilling Agents near a High Value Target.- Adversarial Learning and Optimization.- On Poisoned Wardrop Equilibrium in Congestion Games.- Reward Delay Attacks on Deep Reinforcement Learning.- An Exploration of Poisoning Attacks on Data-based Decision Making.- Novel Applications and new Game Models.- A Network Centrality Game for Epidemic Control.- Optimizing Intrusion Detection Systems Placement against Network Virus Spreading using a Partially Observable Stochastic Minimum-Threat Path Game.- Voting Games to Model Protocol Stability and Security of Proof-of-Work Cryptocurrencies.
Erscheinungsdatum | 14.02.2023 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science |
Zusatzinfo | XII, 319 p. 90 illus., 79 illus. in color. |
Verlagsort | Cham |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 510 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Schlagworte | Applications • Artificial Intelligence • computer crime • Computer Networks • Computer Science • Computer Security • Computer systems • computer vision • conference proceedings • cryptography • Data Security • DoS attacks • Education • Engineering • Game Theory • Informatics • Internet • learning • Mathematics • Nash Equilibrium • Network Protocols • Network Security • Research • Signal Processing |
ISBN-10 | 3-031-26368-5 / 3031263685 |
ISBN-13 | 978-3-031-26368-2 / 9783031263682 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich