楼主: iverping
1112 7

[文献讨论] Game Theory for Security and Risk Management From Theory to Practice [推广有奖]

  • 5关注
  • 3粉丝

学科带头人

40%

还不是VIP/贵宾

-

威望
0
论坛币
19577 个
通用积分
95.5965
学术水平
54 点
热心指数
46 点
信用等级
46 点
经验
112962 点
帖子
2030
精华
0
在线时间
646 小时
注册时间
2013-10-19
最后登录
2023-3-13

相似文件 换一批

+2 论坛币
k人 参与回答

经管之家送您一份

应届毕业生专属福利!

求职就业群
赵安豆老师微信:zhaoandou666

经管之家联合CDA

送您一个全额奖学金名额~ !

感谢您参与论坛问题回答

经管之家送您两个论坛币!

+2 论坛币

[Static & Dynamic Game Theory_ Foundations & Applications] Stefan Rass, Stef.zip (6.79 MB, 需要: 10 个论坛币) 本附件包括:
  • [Static & Dynamic Game Theory_ Foundations & Applications] Stefan Rass, Stefan Schauer - Game Theory for Security and Risk Management (2018, Springer International Publishing_Birkhauser).pdf
Static & Dynamic Game Theory: Foundations & ApplicationsFree Preview
[size=1.1]© 2018
Game Theory for Security and Risk ManagementFrom Theory to Practice

Editors: Rass, Stefan, Schauer, Stefan (Eds.)



[size=1.6]
  • Provides a link from theory to practice in security engineering and risk management for practitioners
[size=1.3]see more benefits



The chapters in this volume explore how various methods from game theory can be utilized to optimize security and risk-management strategies.  Emphasizing the importance of connecting theory and practice, they detail the steps involved in selecting, adapting, and analyzing game-theoretic models in security engineering and provide case studies of successful implementations in different application domains.  Practitioners who are not experts in game theory and are uncertain about incorporating it into their work will benefit from this resource, as well as researchers in applied mathematics and computer science interested in current developments and future directions.

The first part of the book presents the theoretical basics, covering various different game-theoretic models related to and suitable for security engineering.  The second part then shows how these models are adopted, implemented, and analyzed.  Surveillance systems, interconnected networks, and power grids are among the different application areas discussed.  Finally, in the third part, case studies from business and industry of successful applications of game-theoretic models are presented, and the range of applications discussed is expanded to include such areas as cloud computing, Internet of Things, and water utility networks.







Table of contents [size=1.3](16 chapters)
  • [size=1.6]Utilizing Game Theory for Security Risk Assessment

    [size=1.1]Rajbhandari, Lisa (et al.)

    [size=1.1]Pages 3-19


    [size=1.3]Preview [color=rgb(255, 255, 255) !important][size=1.3]Buy Chapter $29.95
  • [size=1.6]Decision Making When Consequences Are Random

    [size=1.1]Rass, Stefan

    [size=1.1]Pages 21-46


  • [size=1.6]Security Strategies and Multi-Criteria Decision Making

    [size=1.1]Rass, Stefan

    [size=1.1]Pages 47-74


  • [size=1.6]A Scalable Decomposition Method for the Dynamic Defense of Cyber Networks

    [size=1.1]Rasouli, Mohammad (et al.)

    [size=1.1]Pages 75-98


  • [size=1.6]Factored Markov Game Theory for Secure Interdependent Infrastructure Networks

    [size=1.1]Huang, Linan (et al.)

    [size=1.1]Pages 99-126



  • [size=1.6]G-DPS: A Game-Theoretical Decision-Making Framework for Physical Surveillance Games

    [size=1.1]Alshawish, Ali (et al.)

    [size=1.1]Pages 129-156


  • [size=1.6]A Game-Theoretic Framework for Securing Interdependent Assets in Networks

    [size=1.1]Hota, Ashish R. (et al.)

    [size=1.1]Pages 157-184


  • [size=1.6]Random Damage in Interconnected Networks

    [size=1.1]König, Sandra (et al.)

    [size=1.1]Pages 185-201


  • [size=1.6]Optimal Dispatch of Electrical Transmission Systems Considering Interdependencies with Natural Gas Systems

    [size=1.1]Hong, Tianqi (et al.)

    [size=1.1]Pages 203-222


  • [size=1.6]Managing Security Risks Interdependencies Between ICT and Electric Infrastructures: A Game Theoretical Analysis

    [size=1.1]Ismail, Ziad (et al.)

    [size=1.1]Pages 223-250


  • [size=1.6]Security and Interdependency in a Public Cloud: A Game-Theoretic Approach

    [size=1.1]Kamhoua, Charles A. (et al.)

    [size=1.1]Pages 253-284


  • [size=1.6]A Risk Management Approach for Highly Interconnected Networks

    [size=1.1]Schauer, Stefan

    [size=1.1]Pages 285-311


  • [size=1.6]Protecting Water Utility Networks from Advanced Persistent Threats: A Case Study

    [size=1.1]Gouglidis, Antonios (et al.)

    [size=1.1]Pages 313-333


  • [size=1.6]Assessing the Impact of Malware Attacks in Utility Networks

    [size=1.1]König, Sandra (et al.)

    [size=1.1]Pages 335-351


  • [size=1.6]Game-Theoretic Optimization for Physical Surveillance of Critical Infrastructures: A Case Study

    [size=1.1]Alshawish, Ali (et al.)

    [size=1.1]Pages 353-389


  • [size=1.6]Smart SECPLAN: A Process Implementation Tool for Hybrid Risk Management

    [size=1.1]Zambrano, Alberto (et al.)

    [size=1.1]pages 391-418


  • [size=1.1]https://www.springer.com/la/book/9783319752679




二维码

扫码加我 拉你入群

请注明:姓名-公司-职位

以便审核进群资格,未注明则拒绝

关键词:Game Theory Management Managemen Practice security

已有 1 人评分论坛币 收起 理由
zhou_yl + 60 精彩帖子

总评分: 论坛币 + 60   查看全部评分

沙发
zhou_yl 发表于 2019-5-1 16:58:55 来自手机 |只看作者 |坛友微信交流群
谢谢分享

使用道具

藤椅
胡明敏 发表于 2019-5-1 18:37:00 |只看作者 |坛友微信交流群
谢谢分享

使用道具

板凳
edmcheng 发表于 2019-5-2 12:04:41 |只看作者 |坛友微信交流群
Thanks

使用道具

报纸
eeabcde 发表于 2019-5-10 07:52:10 |只看作者 |坛友微信交流群
感谢分享

使用道具

地板
wl5f 在职认证  发表于 2019-6-30 23:25:18 |只看作者 |坛友微信交流群
谢谢分享

使用道具

7
saplow 发表于 2022-9-28 10:48:11 |只看作者 |坛友微信交流群
好贴就点赞,一起拿积分

使用道具

8
三江鸿 发表于 2023-1-9 10:39:47 来自手机 |只看作者 |坛友微信交流群
点个赞感谢分享

使用道具

您需要登录后才可以回帖 登录 | 我要注册

本版微信群
加JingGuanBbs
拉您进交流群

京ICP备16021002-2号 京B2-20170662号 京公网安备 11010802022788号 论坛法律顾问:王进律师 知识产权保护声明   免责及隐私声明

GMT+8, 2024-5-1 09:43