Network security: a decision and game-theoretic approach
Covering attack detection, malware response, algorithm and mechanism design, privacy, and risk management, this comprehensive work applies unique quantitative models derived from decision, control, and game theories to understanding diverse network security problems. It provides the reader with a sy...
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Cambridge
Cambridge University Press
2010
|
Schlagwörter: | |
Links: | https://doi.org/10.1017/CBO9780511760778 https://doi.org/10.1017/CBO9780511760778 https://doi.org/10.1017/CBO9780511760778 |
Zusammenfassung: | Covering attack detection, malware response, algorithm and mechanism design, privacy, and risk management, this comprehensive work applies unique quantitative models derived from decision, control, and game theories to understanding diverse network security problems. It provides the reader with a system-level theoretical understanding of network security, and is essential reading for researchers interested in a quantitative approach to key incentive and resource allocation issues in the field. It also provides practitioners with an analytical foundation that is useful for formalising decision-making processes in network security |
Beschreibung: | Title from publisher's bibliographic system (viewed on 05 Oct 2015) |
Umfang: | 1 online resource (xiv, 314 pages) |
ISBN: | 9780511760778 |
DOI: | 10.1017/CBO9780511760778 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV043943696 | ||
003 | DE-604 | ||
005 | 20220531 | ||
007 | cr|uuu---uuuuu | ||
008 | 161206s2010 xx o|||| 00||| eng d | ||
020 | |a 9780511760778 |c Online |9 978-0-511-76077-8 | ||
024 | 7 | |a 10.1017/CBO9780511760778 |2 doi | |
035 | |a (ZDB-20-CBO)CR9780511760778 | ||
035 | |a (OCoLC)837873394 | ||
035 | |a (DE-599)BVBBV043943696 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-12 |a DE-92 | ||
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Alpcan, Tansu |d 1975- |e Verfasser |0 (DE-588)1199834394 |4 aut | |
245 | 1 | 0 | |a Network security |b a decision and game-theoretic approach |c Tansu Alpcan, Tamer Başar |
264 | 1 | |a Cambridge |b Cambridge University Press |c 2010 | |
300 | |a 1 online resource (xiv, 314 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Title from publisher's bibliographic system (viewed on 05 Oct 2015) | ||
505 | 8 | |a Machine generated contents note: Preface; Notation; Part I. Introduction: 1. Introduction; 2. Network security concepts; Part II. Security Games: 3. Deterministic security games; 4. Stochastic security games; 5. Security games with information limitations; Part III. Decision Making for Network Security: 6. Security risk management; 7. Resource allocation for security; 8. Usability, trust, and privacy; Part IV. Security Attack and Intrusion Detection: 9. Machine learning for intrusion and anomaly detection; 10. Hypothesis testing for attack detection; A. Optimization, game theory, and optimal & robust control; References; Index | |
520 | |a Covering attack detection, malware response, algorithm and mechanism design, privacy, and risk management, this comprehensive work applies unique quantitative models derived from decision, control, and game theories to understanding diverse network security problems. It provides the reader with a system-level theoretical understanding of network security, and is essential reading for researchers interested in a quantitative approach to key incentive and resource allocation issues in the field. It also provides practitioners with an analytical foundation that is useful for formalising decision-making processes in network security | ||
650 | 4 | |a Computer networks / Security measures | |
650 | 4 | |a Game theory | |
700 | 1 | |a Başar, Tamer |d 1946- |e Sonstige |0 (DE-588)170065804 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-0-521-11932-0 |
856 | 4 | 0 | |u https://doi.org/10.1017/CBO9780511760778 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-20-CBO | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-029352667 | |
966 | e | |u https://doi.org/10.1017/CBO9780511760778 |l DE-12 |p ZDB-20-CBO |q BSB_PDA_CBO |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1017/CBO9780511760778 |l DE-92 |p ZDB-20-CBO |q FHN_PDA_CBO |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1818982572752896000 |
---|---|
any_adam_object | |
author | Alpcan, Tansu 1975- |
author_GND | (DE-588)1199834394 (DE-588)170065804 |
author_facet | Alpcan, Tansu 1975- |
author_role | aut |
author_sort | Alpcan, Tansu 1975- |
author_variant | t a ta |
building | Verbundindex |
bvnumber | BV043943696 |
collection | ZDB-20-CBO |
contents | Machine generated contents note: Preface; Notation; Part I. Introduction: 1. Introduction; 2. Network security concepts; Part II. Security Games: 3. Deterministic security games; 4. Stochastic security games; 5. Security games with information limitations; Part III. Decision Making for Network Security: 6. Security risk management; 7. Resource allocation for security; 8. Usability, trust, and privacy; Part IV. Security Attack and Intrusion Detection: 9. Machine learning for intrusion and anomaly detection; 10. Hypothesis testing for attack detection; A. Optimization, game theory, and optimal & robust control; References; Index |
ctrlnum | (ZDB-20-CBO)CR9780511760778 (OCoLC)837873394 (DE-599)BVBBV043943696 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1017/CBO9780511760778 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02890nam a2200421zc 4500</leader><controlfield tag="001">BV043943696</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20220531 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">161206s2010 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780511760778</subfield><subfield code="c">Online</subfield><subfield code="9">978-0-511-76077-8</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1017/CBO9780511760778</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-20-CBO)CR9780511760778</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)837873394</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043943696</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield><subfield code="a">DE-92</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Alpcan, Tansu</subfield><subfield code="d">1975-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1199834394</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Network security</subfield><subfield code="b">a decision and game-theoretic approach</subfield><subfield code="c">Tansu Alpcan, Tamer Başar</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cambridge</subfield><subfield code="b">Cambridge University Press</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xiv, 314 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from publisher's bibliographic system (viewed on 05 Oct 2015)</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Machine generated contents note: Preface; Notation; Part I. Introduction: 1. Introduction; 2. Network security concepts; Part II. Security Games: 3. Deterministic security games; 4. Stochastic security games; 5. Security games with information limitations; Part III. Decision Making for Network Security: 6. Security risk management; 7. Resource allocation for security; 8. Usability, trust, and privacy; Part IV. Security Attack and Intrusion Detection: 9. Machine learning for intrusion and anomaly detection; 10. Hypothesis testing for attack detection; A. Optimization, game theory, and optimal & robust control; References; Index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Covering attack detection, malware response, algorithm and mechanism design, privacy, and risk management, this comprehensive work applies unique quantitative models derived from decision, control, and game theories to understanding diverse network security problems. It provides the reader with a system-level theoretical understanding of network security, and is essential reading for researchers interested in a quantitative approach to key incentive and resource allocation issues in the field. It also provides practitioners with an analytical foundation that is useful for formalising decision-making processes in network security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Game theory</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Başar, Tamer</subfield><subfield code="d">1946-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)170065804</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-0-521-11932-0</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1017/CBO9780511760778</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-20-CBO</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029352667</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1017/CBO9780511760778</subfield><subfield code="l">DE-12</subfield><subfield code="p">ZDB-20-CBO</subfield><subfield code="q">BSB_PDA_CBO</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1017/CBO9780511760778</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-20-CBO</subfield><subfield code="q">FHN_PDA_CBO</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043943696 |
illustrated | Not Illustrated |
indexdate | 2024-12-20T17:49:21Z |
institution | BVB |
isbn | 9780511760778 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029352667 |
oclc_num | 837873394 |
open_access_boolean | |
owner | DE-12 DE-92 |
owner_facet | DE-12 DE-92 |
physical | 1 online resource (xiv, 314 pages) |
psigel | ZDB-20-CBO ZDB-20-CBO BSB_PDA_CBO ZDB-20-CBO FHN_PDA_CBO |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Cambridge University Press |
record_format | marc |
spelling | Alpcan, Tansu 1975- Verfasser (DE-588)1199834394 aut Network security a decision and game-theoretic approach Tansu Alpcan, Tamer Başar Cambridge Cambridge University Press 2010 1 online resource (xiv, 314 pages) txt rdacontent c rdamedia cr rdacarrier Title from publisher's bibliographic system (viewed on 05 Oct 2015) Machine generated contents note: Preface; Notation; Part I. Introduction: 1. Introduction; 2. Network security concepts; Part II. Security Games: 3. Deterministic security games; 4. Stochastic security games; 5. Security games with information limitations; Part III. Decision Making for Network Security: 6. Security risk management; 7. Resource allocation for security; 8. Usability, trust, and privacy; Part IV. Security Attack and Intrusion Detection: 9. Machine learning for intrusion and anomaly detection; 10. Hypothesis testing for attack detection; A. Optimization, game theory, and optimal & robust control; References; Index Covering attack detection, malware response, algorithm and mechanism design, privacy, and risk management, this comprehensive work applies unique quantitative models derived from decision, control, and game theories to understanding diverse network security problems. It provides the reader with a system-level theoretical understanding of network security, and is essential reading for researchers interested in a quantitative approach to key incentive and resource allocation issues in the field. It also provides practitioners with an analytical foundation that is useful for formalising decision-making processes in network security Computer networks / Security measures Game theory Başar, Tamer 1946- Sonstige (DE-588)170065804 oth Erscheint auch als Druckausgabe 978-0-521-11932-0 https://doi.org/10.1017/CBO9780511760778 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Alpcan, Tansu 1975- Network security a decision and game-theoretic approach Machine generated contents note: Preface; Notation; Part I. Introduction: 1. Introduction; 2. Network security concepts; Part II. Security Games: 3. Deterministic security games; 4. Stochastic security games; 5. Security games with information limitations; Part III. Decision Making for Network Security: 6. Security risk management; 7. Resource allocation for security; 8. Usability, trust, and privacy; Part IV. Security Attack and Intrusion Detection: 9. Machine learning for intrusion and anomaly detection; 10. Hypothesis testing for attack detection; A. Optimization, game theory, and optimal & robust control; References; Index Computer networks / Security measures Game theory |
title | Network security a decision and game-theoretic approach |
title_auth | Network security a decision and game-theoretic approach |
title_exact_search | Network security a decision and game-theoretic approach |
title_full | Network security a decision and game-theoretic approach Tansu Alpcan, Tamer Başar |
title_fullStr | Network security a decision and game-theoretic approach Tansu Alpcan, Tamer Başar |
title_full_unstemmed | Network security a decision and game-theoretic approach Tansu Alpcan, Tamer Başar |
title_short | Network security |
title_sort | network security a decision and game theoretic approach |
title_sub | a decision and game-theoretic approach |
topic | Computer networks / Security measures Game theory |
topic_facet | Computer networks / Security measures Game theory |
url | https://doi.org/10.1017/CBO9780511760778 |
work_keys_str_mv | AT alpcantansu networksecurityadecisionandgametheoreticapproach AT basartamer networksecurityadecisionandgametheoreticapproach |