Decision and Game Theory for Security (Record no. 89754)

000 -LEADER
fixed length control field 05816nam a22007095i 4500
001 - CONTROL NUMBER
control field 978-3-030-64793-3
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240730175037.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 201221s2020 sz | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783030647933
-- 978-3-030-64793-3
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/978-3-030-64793-3
Source of number or code doi
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
072 #7 - SUBJECT CATEGORY CODE
Subject category code UR
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code UTN
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM053000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code UR
Source thema
072 #7 - SUBJECT CATEGORY CODE
Subject category code UTN
Source thema
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
245 10 - TITLE STATEMENT
Title Decision and Game Theory for Security
Medium [electronic resource] :
Remainder of title 11th International Conference, GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings /
Statement of responsibility, etc. edited by Quanyan Zhu, John S. Baras, Radha Poovendran, Juntao Chen.
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2020.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Cham :
Name of producer, publisher, distributor, manufacturer Springer International Publishing :
-- Imprint: Springer,
Date of production, publication, distribution, manufacture, or copyright notice 2020.
300 ## - PHYSICAL DESCRIPTION
Extent XI, 518 p. 131 illus., 111 illus. in color.
Other physical details online resource.
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
347 ## - DIGITAL FILE CHARACTERISTICS
File type text file
Encoding format PDF
Source rda
490 1# - SERIES STATEMENT
Series statement Security and Cryptology,
International Standard Serial Number 2946-1863 ;
Volume/sequential designation 12513
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Machine Learning and Security -- Distributed Generative Adversarial Networks for Anomaly Detection -- Learning and Planning in the Feature Deception Problem -- A Realistic Approach for Network Traffic Obfuscation using Adversarial Machine Learning -- Adversarial Deep Reinforcement Learning based Adaptive Moving Target Defense -- Lie Another Day: Demonstrating Bias in a Multi-Round Cyber Deception Game of Questionable Veracity -- Cyber Deception -- Exploiting Bounded Rationality in Risk-based Cyber Camouflage Games -- Farsighted Risk Mitigation of Lateral Movement Using Dynamic Cognitive Honeypots -- Harnessing the Power of Deception in Attack Graph-Based Security Games -- Decoy Allocation Games on Graphs with Temporal Logic Objectives -- Popular Imperceptibility Measures in Visual Adversarial Attacks are Far from Human Perception -- Cyber-Physical System Security -- Secure Discrete-Time Linear-Quadratic Mean-Field Games -- Detection of Dynamically Changing Leaders in Complex Swarms from ObservedDynamic Data -- Moving Target Defense for Robust Monitoring of Electric Grid Transformers in Adversarial Environments -- Security of Network Systems -- Blocking Adversarial Influence in Social Networks -- Normalizing Flow Policies for Multi-agent Systems -- A Game Theoretic Framework for Software Diversity for Network Security -- Partially Observable Stochastic Games for Cyber Deception against Network Epidemic -- Combating Online Counterfeits: A Game-Theoretic Analysis of Cyber Supply Chain Ecosystem -- Theoretic Foundations of Security Games -- On the Characterization of Saddle Point Equilibrium for Security Games with Additive Utility -- MASAGE: Model-Agnostic Sequential and Adaptive Game Estimation -- Using One-Sided Partially Observable Stochastic Games for Solving Zero-Sum Security Games with Sequential Attacks -- A Data-Driven Distributionally Robust Game using Wasserstein Distance -- Security Games over Lexicographic Orders -- Game Theory on Attack Graph for Cyber Deception -- Attacking Machine Learning Models for Social Good -- A Review of Multi Agent Perimeter Defense Games -- Hardware Security and Trust: A New Battlefield of Information -- A Data Mining Friendly Anonymization Scheme for System Logs using Distance Mapping -- Security Games with Insider Threats -- Securing Next-Generation Wireless Networks: Challenges and Opportunities. .
520 ## - SUMMARY, ETC.
Summary, etc. This book constitutes the refereed proceedings of the 11th International Conference on Decision and Game Theory for Security, GameSec 2020,held in College Park, MD, USA, in October 2020. Due to COVID-19 pandemic the conference was held virtually The 21 full papers presented together with 2 short papers were carefully reviewed and selected from 29 submissions. The papers focus on machine learning and security; cyber deception; cyber-physical systems security; security of network systems; theoretic foundations of security games; emerging topics.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data protection.
9 (RLIN) 7245
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Artificial intelligence.
9 (RLIN) 3407
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cryptography.
9 (RLIN) 1973
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data encryption (Computer science).
9 (RLIN) 9168
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
9 (RLIN) 3969
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Image processing
General subdivision Digital techniques.
9 (RLIN) 4145
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer vision.
9 (RLIN) 115207
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer engineering.
9 (RLIN) 10164
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks .
9 (RLIN) 31572
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data and Information Security.
9 (RLIN) 31990
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Artificial Intelligence.
9 (RLIN) 3407
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cryptology.
9 (RLIN) 31769
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Mobile and Network Security.
9 (RLIN) 33624
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer Imaging, Vision, Pattern Recognition and Graphics.
9 (RLIN) 31569
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer Engineering and Networks.
9 (RLIN) 115208
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Zhu, Quanyan.
Relator term editor.
Relationship edt
-- http://id.loc.gov/vocabulary/relators/edt
9 (RLIN) 115209
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Baras, John S.
Relator term editor.
Relationship edt
-- http://id.loc.gov/vocabulary/relators/edt
9 (RLIN) 115210
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Poovendran, Radha.
Relator term editor.
Relationship edt
-- http://id.loc.gov/vocabulary/relators/edt
9 (RLIN) 115211
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Chen, Juntao.
Relator term editor.
Relationship edt
-- http://id.loc.gov/vocabulary/relators/edt
9 (RLIN) 115212
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
9 (RLIN) 115213
773 0# - HOST ITEM ENTRY
Title Springer Nature eBook
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Printed edition:
International Standard Book Number 9783030647926
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Printed edition:
International Standard Book Number 9783030647940
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Security and Cryptology,
International Standard Serial Number 2946-1863 ;
Volume/sequential designation 12513
9 (RLIN) 115214
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://doi.org/10.1007/978-3-030-64793-3">https://doi.org/10.1007/978-3-030-64793-3</a>
912 ## -
-- ZDB-2-SCS
912 ## -
-- ZDB-2-SXCS
912 ## -
-- ZDB-2-LNC
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks-Lecture Notes in CS

No items available.