Dynamic Games for Network Security

The goal of this SpringerBrief is to collect and systematically present the state-of-the-art in this research field and the underlying game-theoretic and learning tools to the broader audience with general network security and engineering backgrounds. Particularly, the exposition of this book begins...

Celý popis

Uloženo v:
Podrobná bibliografie
Hlavní autor: He, Xiaofan (Autor)
Médium: Elektronický zdroj E-kniha
Jazyk:angličtina
Vydáno: Cham : Springer International Publishing, 2018.
Vydání:1st ed. 2018.
Edice:SpringerBriefs in Electrical and Computer Engineering,
Témata:
ISBN:9783319758718
ISSN:2191-8112
On-line přístup: Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!

MARC

LEADER 00000nam a22000005i 4500
003 SK-BrCVT
005 20220618120416.0
007 cr nn 008mamaa
008 180228s2018 gw | s |||| 0|eng d
020 |a 9783319758718 
024 7 |a 10.1007/978-3-319-75871-8  |2 doi 
035 |a CVTIDW08594 
040 |a Springer-Nature  |b eng  |c CVTISR  |e AACR2 
041 |a eng 
100 1 |a He, Xiaofan.  |4 aut 
245 1 0 |a Dynamic Games for Network Security  |h [electronic resource] /  |c by Xiaofan He, Huaiyu Dai. 
250 |a 1st ed. 2018. 
260 1 |a Cham :  |b Springer International Publishing,  |c 2018. 
300 |a X, 74 p.  |b online resource. 
490 1 |a SpringerBriefs in Electrical and Computer Engineering,  |x 2191-8112 
500 |a Engineering  
516 |a text file PDF 
520 |a The goal of this SpringerBrief is to collect and systematically present the state-of-the-art in this research field and the underlying game-theoretic and learning tools to the broader audience with general network security and engineering backgrounds. Particularly, the exposition of this book begins with a brief introduction of relevant background knowledge in Chapter 1, followed by a review of existing applications of SG in addressing various dynamic network security problems in Chapter 2. A detailed treatment of dynamic security games with information asymmetry is given in Chapters 3-5. Specifically, dynamic security games with extra information that concerns security competitions, where the defender has an informational advantage over the adversary are discussed in Chapter 3. The complementary scenarios where the defender lacks information about the adversary is examined in Chapter 4 through the lens of incomplete information SG. Chapter 5 is devoted to the exploration of how to proactively create information asymmetry for the defender's benefit. The primary audience for this brief includes network engineers interested in security decision-making in dynamic network security problems. Researchers interested in the state-of-the-art research on stochastic game theory and its applications in network security will be interested in this SpringerBrief as well. Also graduate and undergraduate students interested in obtaining comprehensive information on stochastic game theory and applying it to address relevant research problems can use this SpringerBrief as a study guide. Lastly, concluding remarks and our perspective for future works are presented in Chapter 6. 
650 0 |a Electrical engineering. 
650 0 |a Data protection. 
856 4 0 |u http://hanproxy.cvtisr.sk/han/cvti-ebook-springer-eisbn-978-3-319-75871-8  |y Vzdialený prístup pre registrovaných používateľov 
910 |b ZE05874 
919 |a 978-3-319-75871-8 
974 |a andrea.lebedova  |f Elektronické zdroje 
992 |a SUD 
999 |c 274995  |d 274995