000 | 02905nam a22006255i 4500 | ||
---|---|---|---|
001 | 978-3-642-25280-8 | ||
003 | DE-He213 | ||
005 | 20240423125747.0 | ||
007 | cr nn 008mamaa | ||
008 | 111109s2011 gw | s |||| 0|eng d | ||
020 |
_a9783642252808 _9978-3-642-25280-8 |
||
024 | 7 |
_a10.1007/978-3-642-25280-8 _2doi |
|
050 | 4 | _aQA76.76.A65 | |
072 | 7 |
_aUB _2bicssc |
|
072 | 7 |
_aCOM005000 _2bisacsh |
|
072 | 7 |
_aUX _2thema |
|
082 | 0 | 4 |
_a005.3 _223 |
245 | 1 | 0 |
_aDecision and Game Theory for Security _h[electronic resource] : _bSecond International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011, Proceedings / _cedited by John S. Baras, Jonathan Katz, Eitan Altman. |
250 | _a1st ed. 2011. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2011. |
|
300 |
_aX, 259 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v7037 |
|
520 | _aThis book constitutes the refereed proceedings of the Second International Conference on Decision and Game Theory for Security, GameSec 2011, held in College Park, Maryland, USA, in November 2011. The 16 revised full papers and 2 plenary keynotes presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on attacks, adversaries, and game theory, wireless adhoc and sensor networks, network games, security insurance, security and trust in social networks and security investments. | ||
650 | 0 | _aApplication software. | |
650 | 0 | _aComputer networks . | |
650 | 0 | _aData protection. | |
650 | 0 | _aAlgorithms. | |
650 | 0 |
_aElectronic data processing _xManagement. |
|
650 | 0 | _aGame theory. | |
650 | 1 | 4 | _aComputer and Information Systems Applications. |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aAlgorithms. |
650 | 2 | 4 | _aIT Operations. |
650 | 2 | 4 | _aGame Theory. |
700 | 1 |
_aBaras, John S. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aKatz, Jonathan. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aAltman, Eitan. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783642252792 |
776 | 0 | 8 |
_iPrinted edition: _z9783642252815 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v7037 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-642-25280-8 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cSPRINGER | ||
999 |
_c181417 _d181417 |