000 | 04433nam a22006375i 4500 | ||
---|---|---|---|
001 | 978-3-031-26369-9 | ||
003 | DE-He213 | ||
005 | 20240207153511.0 | ||
007 | cr nn 008mamaa | ||
008 | 230208s2023 sz | s |||| 0|eng d | ||
020 |
_a9783031263699 _9978-3-031-26369-9 |
||
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aDecision and Game Theory for Security _h[electronic resource] : _b13th International Conference, GameSec 2022, Pittsburgh, PA, USA, October 26-28, 2022, Proceedings / _cedited by Fei Fang, Haifeng Xu, Yezekael Hayel. |
250 | _a1st ed. 2023. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2023. |
|
300 |
_aXII, 319 p. 90 illus., 79 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v13727 |
|
500 | _aAcceso multiusuario | ||
505 | 0 | _aDeception in Security -- The Risk of Attacker Behavioral Learning: Can Attacker Fool Defender under Uncertainty? .-Casino Rationale: Countering attacker deception in zero-sum Stackelberg security games of bounded rationality -- Cyber Deception against Zero-day Attacks: A Game Theoretic Approach -- Planning and Learning in Dynamic Enviroments -- On Almost-Sure Intention Deception Planning that Exploits Imperfect Observers -- Using Deception in Markov Game to Understand Adversarial Behaviors through a Capture-The-Flag Environment -- Robust Moving Target Defense against Unknown Attacks: A Meta-Reinforcement Learning Approach -- Security Games -- Synchronization in Security Games -- Multiple Oracle Algorithm to Solve Continuous Games -- Optimal Pursuit of Surveilling Agents near a High Value Target -- Adversarial Learning and Optimization -- On Poisoned Wardrop Equilibrium in Congestion Games -- Reward Delay Attacks on Deep Reinforcement Learning -- An Exploration of Poisoning Attacks on Data-based Decision Making -- Novel Applications and new Game Models -- A Network Centrality Game for Epidemic Control -- Optimizing Intrusion Detection Systems Placement against Network Virus Spreading using a Partially Observable Stochastic Minimum-Threat Path Game -- Voting Games to Model Protocol Stability and Security of Proof-of-Work Cryptocurrencies. | |
520 | _aThis book constitutes the refereed proceedings of the 13th International Conference on Decision and Game Theory for Security, GameSec 2022, held in October 2022 in Pittsburgh, PA, USA. The 15 full papers presented were carefully reviewed and selected from 39 submissions. The papers are grouped thematically on: deception in security; planning and learning in dynamic environments; security games; adversarial learning and optimization; novel applications and new game models. | ||
541 |
_fUABC ; _cPerpetuidad |
||
650 | 0 | _aData protection. | |
650 | 0 | _aComputer engineering. | |
650 | 0 | _aComputer networks . | |
650 | 0 | _aArtificial intelligence. | |
650 | 1 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aComputer Engineering and Networks. |
650 | 2 | 4 | _aArtificial Intelligence. |
650 | 2 | 4 | _aComputer Engineering and Networks. |
700 | 1 |
_aFang, Fei. _eeditor. _0(orcid)0000-0003-2256-8329 _1https://orcid.org/0000-0003-2256-8329 _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aXu, Haifeng. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aHayel, Yezekael. _eeditor. _0(orcid)0000-0003-3891-3916 _1https://orcid.org/0000-0003-3891-3916 _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031263682 |
776 | 0 | 8 |
_iPrinted edition: _z9783031263705 |
830 | 0 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v13727 |
|
856 | 4 | 0 |
_zLibro electrónico _uhttp://libcon.rec.uabc.mx:2048/login?url=https://doi.org/10.1007/978-3-031-26369-9 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cLIBRO_ELEC | ||
999 |
_c260797 _d260796 |