000 | 03803nam a22005295i 4500 | ||
---|---|---|---|
001 | 978-3-319-75871-8 | ||
003 | DE-He213 | ||
005 | 20210201191430.0 | ||
007 | cr nn 008mamaa | ||
008 | 180228s2018 gw | s |||| 0|eng d | ||
020 |
_a9783319758718 _9978-3-319-75871-8 |
||
050 | 4 | _aTK1-9971 | |
072 | 7 |
_aTJK _2bicssc |
|
072 | 7 |
_aTEC041000 _2bisacsh |
|
072 | 7 |
_aTJK _2thema |
|
082 | 0 | 4 |
_a621.382 _223 |
100 | 1 |
_aHe, Xiaofan. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
245 | 1 | 0 |
_aDynamic Games for Network Security _h[electronic resource] / _cby Xiaofan He, Huaiyu Dai. |
250 | _a1st ed. 2018. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2018. |
|
300 |
_aX, 74 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSpringerBriefs in Electrical and Computer Engineering, _x2191-8112 |
|
500 | _aAcceso multiusuario | ||
520 | _aThe goal of this SpringerBrief is to collect and systematically present the state-of-the-art in this research field and the underlying game-theoretic and learning tools to the broader audience with general network security and engineering backgrounds. Particularly, the exposition of this book begins with a brief introduction of relevant background knowledge in Chapter 1, followed by a review of existing applications of SG in addressing various dynamic network security problems in Chapter 2. A detailed treatment of dynamic security games with information asymmetry is given in Chapters 3-5. Specifically, dynamic security games with extra information that concerns security competitions, where the defender has an informational advantage over the adversary are discussed in Chapter 3. The complementary scenarios where the defender lacks information about the adversary is examined in Chapter 4 through the lens of incomplete information SG. Chapter 5 is devoted to the exploration of how to proactively create information asymmetry for the defender's benefit. The primary audience for this brief includes network engineers interested in security decision-making in dynamic network security problems. Researchers interested in the state-of-the-art research on stochastic game theory and its applications in network security will be interested in this SpringerBrief as well. Also graduate and undergraduate students interested in obtaining comprehensive information on stochastic game theory and applying it to address relevant research problems can use this SpringerBrief as a study guide. Lastly, concluding remarks and our perspective for future works are presented in Chapter 6. | ||
541 |
_fUABC ; _cTemporal ; _d01/01/2021-12/31/2023. |
||
650 | 0 | _aElectrical engineering. | |
650 | 0 | _aData protection. | |
650 | 1 | 4 |
_aCommunications Engineering, Networks. _0https://scigraph.springernature.com/ontologies/product-market-codes/T24035 |
650 | 2 | 4 |
_aSecurity. _0https://scigraph.springernature.com/ontologies/product-market-codes/I28000 |
700 | 1 |
_aDai, Huaiyu. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783319758701 |
776 | 0 | 8 |
_iPrinted edition: _z9783319758725 |
830 | 0 |
_aSpringerBriefs in Electrical and Computer Engineering, _x2191-8112 |
|
856 | 4 | 0 |
_zLibro electrónico _uhttp://148.231.10.114:2048/login?url=https://doi.org/10.1007/978-3-319-75871-8 |
912 | _aZDB-2-ENG | ||
912 | _aZDB-2-SXE | ||
942 | _cLIBRO_ELEC | ||
999 |
_c243425 _d243424 |