000 03803nam a22005295i 4500
001 978-3-319-75871-8
003 DE-He213
005 20210201191430.0
007 cr nn 008mamaa
008 180228s2018 gw | s |||| 0|eng d
020 _a9783319758718
_9978-3-319-75871-8
050 4 _aTK1-9971
072 7 _aTJK
_2bicssc
072 7 _aTEC041000
_2bisacsh
072 7 _aTJK
_2thema
082 0 4 _a621.382
_223
100 1 _aHe, Xiaofan.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
245 1 0 _aDynamic Games for Network Security
_h[electronic resource] /
_cby Xiaofan He, Huaiyu Dai.
250 _a1st ed. 2018.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2018.
300 _aX, 74 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSpringerBriefs in Electrical and Computer Engineering,
_x2191-8112
500 _aAcceso multiusuario
520 _aThe goal of this SpringerBrief is to collect and systematically present the state-of-the-art in this research field and the underlying game-theoretic and learning tools to the broader audience with general network security and engineering backgrounds. Particularly, the exposition of this book begins with a brief introduction of relevant background knowledge in Chapter 1, followed by a review of existing applications of SG in addressing various dynamic network security problems in Chapter 2. A detailed treatment of dynamic security games with information asymmetry is given in Chapters 3-5. Specifically, dynamic security games with extra information that concerns security competitions, where the defender has an informational advantage over the adversary are discussed in Chapter 3. The complementary scenarios where the defender lacks information about the adversary is examined in Chapter 4 through the lens of incomplete information SG. Chapter 5 is devoted to the exploration of how to proactively create information asymmetry for the defender's benefit. The primary audience for this brief includes network engineers interested in security decision-making in dynamic network security problems. Researchers interested in the state-of-the-art research on stochastic game theory and its applications in network security will be interested in this SpringerBrief as well. Also graduate and undergraduate students interested in obtaining comprehensive information on stochastic game theory and applying it to address relevant research problems can use this SpringerBrief as a study guide. Lastly, concluding remarks and our perspective for future works are presented in Chapter 6.
541 _fUABC ;
_cTemporal ;
_d01/01/2021-12/31/2023.
650 0 _aElectrical engineering.
650 0 _aData protection.
650 1 4 _aCommunications Engineering, Networks.
_0https://scigraph.springernature.com/ontologies/product-market-codes/T24035
650 2 4 _aSecurity.
_0https://scigraph.springernature.com/ontologies/product-market-codes/I28000
700 1 _aDai, Huaiyu.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783319758701
776 0 8 _iPrinted edition:
_z9783319758725
830 0 _aSpringerBriefs in Electrical and Computer Engineering,
_x2191-8112
856 4 0 _zLibro electrónico
_uhttp://148.231.10.114:2048/login?url=https://doi.org/10.1007/978-3-319-75871-8
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cLIBRO_ELEC
999 _c243425
_d243424