Decision and Game Theory for Security : 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedings / edited by MHR Khouzani, Emmanouil Panaousis, George Theodorakopoulos.
This book constitutes the refereed proceedings of the 6th International Conference on Decision and Game Theory for Security, GameSec 2015, held in London, UK, in November 2015. The 16 revised full papers presented together with 5 short papers were carefully reviewed and selected from 37 submissions....
Saved in:
Online Access: |
Full Text (via Springer) |
---|---|
Corporate Author: | |
Other Authors: | , , |
Other title: | GameSec 2015. |
Format: | Conference Proceeding eBook |
Language: | English |
Published: |
Cham :
Springer,
2015.
|
Series: | Lecture notes in computer science ;
9406. LNCS sublibrary. Security and cryptology. |
Subjects: |
MARC
LEADER | 00000cam a2200000Mi 4500 | ||
---|---|---|---|
001 | b8565049 | ||
006 | m o d | ||
007 | cr ||||||||||| | ||
008 | 151111s2015 sz a od 100 0 eng d | ||
005 | 20240418151318.5 | ||
019 | |a 932002802 |a 961872479 |a 963337884 |a 964905799 |a 1005773102 |a 1011989548 |a 1027516961 |a 1048167135 |a 1058871350 |a 1066636308 |a 1081295448 |a 1086530509 |a 1110827727 |a 1112597849 | ||
020 | |a 9783319255941 |q (electronic bk.) | ||
020 | |a 3319255940 |q (electronic bk.) | ||
020 | |z 9783319255934 | ||
020 | |z 3319255932 | ||
024 | 7 | |a 10.1007/978-3-319-25594-1 | |
035 | |a (OCoLC)spr932169959 | ||
035 | |a (OCoLC)932169959 |z (OCoLC)932002802 |z (OCoLC)961872479 |z (OCoLC)963337884 |z (OCoLC)964905799 |z (OCoLC)1005773102 |z (OCoLC)1011989548 |z (OCoLC)1027516961 |z (OCoLC)1048167135 |z (OCoLC)1058871350 |z (OCoLC)1066636308 |z (OCoLC)1081295448 |z (OCoLC)1086530509 |z (OCoLC)1110827727 |z (OCoLC)1112597849 | ||
037 | |a spr978-3-319-25594-1 | ||
040 | |a NUI |b eng |e pn |c NUI |d OCLCO |d ORU |d YDXCP |d OCLCF |d GW5XE |d OCLCO |d OCL |d OCLCO |d OHI |d OCLCO |d OCLCQ |d OCLCO |d IAO |d JBG |d IAD |d IAS |d KSU |d ICN |d SOI |d VT2 |d OCLCQ |d ILO |d ESU |d OCLCQ |d IOG |d U3W |d OCLCA |d OCLCQ |d TFW |d OCLCQ |d AU@ |d WYU |d EBLCP |d UKMGB |d OCLCQ |d DCT |d ERF |d OCLCQ | ||
049 | |a GWRE | ||
050 | 4 | |a QA76.76.A65 | |
111 | 2 | |a GameSec (Conference) |n (6th : |d 2015 : |c London, England) | |
245 | 1 | 0 | |a Decision and Game Theory for Security : |b 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedings / |c edited by MHR Khouzani, Emmanouil Panaousis, George Theodorakopoulos. |
246 | 3 | |a GameSec 2015. | |
264 | 1 | |a Cham : |b Springer, |c 2015. | |
300 | |a 1 online resource (x, 371 pages) : |b color illustrations. | ||
336 | |a text |b txt |2 rdacontent. | ||
337 | |a computer |b c |2 rdamedia. | ||
338 | |a online resource |b cr |2 rdacarrier. | ||
347 | |a text file. | ||
347 | |b PDF. | ||
490 | 1 | |a Lecture Notes in Computer Science, |x 0302-9743 ; |v 9406. | |
490 | 1 | |a LNCS sublibrary. SL 4, Security and cryptology. | |
505 | 0 | |a Intro; Preface; Organization; Contents; Full Papers; A Game-Theoretic Approach to IP Address Randomization in Decoy-Based Cyber Defense; 1 Introduction; 2 Related Work; 3 Model and Preliminaries; 3.1 Virtual Network Model; 3.2 Adversary Model; 4 Modeling Interaction with Single Decoy; 4.1 Timing-Based Decoy Detection Game; 4.2 Fingerprinting-Based Decoy Detection Game; 5 Characterization of Optimal IP Address Randomization Strategy by Network; 5.1 Game Formulation; 5.2 Optimal Strategy of the System; 5.3 Optimal Strategy of the Adversary; 6 Simulation Study; 7 Conclusion; References. | |
505 | 8 | |a Attack-Aware Cyber Insurance for Risk Sharing in Computer Networks1 Introduction; 1.1 Related Works; 1.2 Organization of the Paper; 2 Game-Theoretic Model for Cyber Insurance; 3 Analysis of the Cyber Insurance Model; 3.1 Separable Utilities; 3.2 Case Study: Cyber Insurance Under Infection Dynamics; 4 Conclusion; References; Beware the Soothsayer: From Attack Prediction Accuracy to Predictive Reliability in Security Games; 1 Introduction; 2 Background: Network Security Games; 3 Related Work; 4 Adversary Behavioral Models; 4.1 The Perfectly Rational Model; 4.2 The Quantal Response Model. | |
505 | 8 | |a 4.3 The Subjective Utility Quantal Response Model4.4 The SUQR Graph-Aware Model; 5 Defender Strategy Generation; 6 Human Subject Experiments; 6.1 Experimental Overview; 6.2 Experiment Data Composition; 6.3 Data Analysis Metrics; 7 Predictive Reliability Analysis; 7.1 SSG Experiment; 7.2 SSG Predictive Reliability; 7.3 NSG Predictive Reliability; 7.4 Training Set Size; 8 Predictive Reliability Factors; 8.1 Training Set Feature: EAS; 9 Graph Features and Their Impacts on Predictive Reliability; 10 Conclusion; References; Games of Timing for Security in Dynamic Environments; 1 Introduction. | |
505 | 8 | |a 2 Related Work2.1 Security Economics and Games of Timing; 2.2 Theoretical Analyses of FlipIt; 2.3 Behavioral Studies of FlipIt; 3 Model; 3.1 Players and Choices; 3.2 Environment; 3.3 Consequences; 4 Analysis; 5 Numerical Examples; 6 Conclusion; References; Threshold FlipThem: When the Winner Does Not Need to Take All; 1 Introduction; 1.1 Prior Work; 2 The Multi-party FlipIt Model; 3 Obtaining Nash Equilibria in Continuous Time for a Stochastic Process; 3.1 Simple Example, FlipThem0F(n, n, d,): Full Threshold, Full Reset; 3.2 FlipThemF(n, t, d,): (n, t)-Threshold, Full Reset. | |
505 | 8 | |a 3.3 FlipThemS(n, t, d,): (n, t)-Threshold, Single ResetReferences; A Game Theoretic Model for Defending Against Stealthy Attacks with Limited Resources; 1 Introduction; 2 Game Model; 2.1 Basic Model; 2.2 Defender's Problem; 2.3 Attacker's Problem; 3 Best Responses; 3.1 Defender's Best Response; 3.2 Attacker's Best Response; 3.3 Simplified Optimization Problems; 4 Nash Equilibria; 5 Sequential Game; 6 Numerical Result; 7 Conclusion; References; Passivity-Based Distributed Strategies for Stochastic Stackelberg Security Games; 1 Introduction; 2 Related Work; 3 Model and Game Formulation. | |
520 | |a This book constitutes the refereed proceedings of the 6th International Conference on Decision and Game Theory for Security, GameSec 2015, held in London, UK, in November 2015. The 16 revised full papers presented together with 5 short papers were carefully reviewed and selected from 37 submissions. Game and decision theory has emerged as a valuable systematic framework with powerful analytical tools in dealing with the intricacies involved in making sound and sensible security decisions. For instance, game theory provides methodical approaches to account for interdependencies of security decisions, the role of hidden and asymmetric information, the perception of risks and costs in human behaviour, the incentives/limitations of the attackers, and much more. Combined with our classical approach to computer and network security, and drawing from various fields such as economic, social and behavioural sciences, game and decision theory is playing a fundamental role in the development of the pillars of the "science of security." | ||
546 | |a English. | ||
650 | 0 | |a Computer security |v Congresses. | |
650 | 0 | |a Game theory |v Congresses. | |
650 | 0 | |a Computer science. | |
650 | 0 | |a Computer networks. | |
650 | 0 | |a Computer security. | |
650 | 0 | |a Algorithms. | |
650 | 0 | |a Management information systems. | |
650 | 0 | |a Game theory. | |
650 | 7 | |a Algorithms. |2 fast |0 (OCoLC)fst00805020. | |
650 | 7 | |a Computer networks. |2 fast |0 (OCoLC)fst00872297. | |
650 | 7 | |a Computer science. |2 fast |0 (OCoLC)fst00872451. | |
650 | 7 | |a Computer security. |2 fast |0 (OCoLC)fst00872484. | |
650 | 7 | |a Game theory. |2 fast |0 (OCoLC)fst00937501. | |
650 | 7 | |a Management information systems. |2 fast |0 (OCoLC)fst01007271. | |
655 | 7 | |a Conference papers and proceedings |2 fast |0 (OCoLC)fst01423772. | |
700 | 1 | |a Khouzani, M. H. R., |e editor. | |
700 | 1 | |a Panaousis, Emmanouil, |e editor. | |
700 | 1 | |a Theodorakopoulos, George, |e editor. | |
776 | 0 | 8 | |i Printed edition: |z 9783319255934. |
856 | 4 | 0 | |u https://colorado.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-319-25594-1 |z Full Text (via Springer) |
830 | 0 | |a Lecture notes in computer science ; |v 9406. | |
830 | 0 | |a LNCS sublibrary. |n SL 4, |p Security and cryptology. | |
907 | |a .b85650493 |b 11-22-21 |c 03-28-16 | ||
915 | |a M | ||
998 | |a web |b - - |c f |d b |e - |f eng |g sz |h 0 |i 1 | ||
956 | |b Springer Nature - Springer Computer Science eBooks 2015 English International | ||
956 | |a Springer e-books | ||
956 | |b Springer Nature - Springer Computer Science eBooks 2015 English International | ||
956 | |a Springer Computer Science eBooks 2015 English/International | ||
999 | f | f | |i 0a02e3a5-02a6-55ee-a44c-f6f91643ace1 |s ef21acfd-d133-5dbe-9216-d77af7640a2f |
952 | f | f | |p Can circulate |a University of Colorado Boulder |b Online |c Online |d Online |e QA76.76.A65 |h Library of Congress classification |i Ebooks, Prospector |n 1 |