Game theoretic risk analysis of security threats:
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
New York [u.a.]
Springer
2009
|
Ausgabe: | 1. ed. |
Schriftenreihe: | International Series in Operations Research & Management Science
128 |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | VI, 236 Seiten graphische Darstellungen, Karten |
ISBN: | 9780387877662 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV035356672 | ||
003 | DE-604 | ||
005 | 20220215 | ||
007 | t | ||
008 | 090310s2009 gw |||| |||| 00||| eng d | ||
015 | |a 08,N37,0886 |2 dnb | ||
016 | 7 | |a 990120279 |2 DE-101 | |
020 | |a 9780387877662 |c Gb. : ca. EUR 81.59 (freier Pr.), ca. sfr 127.00 (freier Pr.) |9 978-0-387-87766-2 | ||
035 | |a (OCoLC)262894267 | ||
035 | |a (DE-599)DNB990120279 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-12 |a DE-M347 | ||
050 | 0 | |a T57.92 | |
082 | 0 | |a 519.3 |2 22 | |
084 | |a QH 435 |0 (DE-625)141585: |2 rvk | ||
084 | |a 670 |2 sdnb | ||
084 | |a 8 |2 ssgn | ||
245 | 1 | 0 | |a Game theoretic risk analysis of security threats |c edited by Vicki M. Bier, M. Naceur Azaiez |
250 | |a 1. ed. | ||
264 | 1 | |a New York [u.a.] |b Springer |c 2009 | |
300 | |a VI, 236 Seiten |b graphische Darstellungen, Karten | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a International Series in Operations Research & Management Science |v 128 | |
650 | 4 | |a Game theory | |
650 | 4 | |a Risk assessment | |
650 | 4 | |a Wireless communication systems |x Security measures | |
650 | 0 | 7 | |a Spieltheorie |0 (DE-588)4056243-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Risikoanalyse |0 (DE-588)4137042-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitspolitik |0 (DE-588)4116489-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitsplanung |0 (DE-588)4217560-4 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Sicherheitsplanung |0 (DE-588)4217560-4 |D s |
689 | 0 | 1 | |a Spieltheorie |0 (DE-588)4056243-8 |D s |
689 | 0 | 2 | |a Risikoanalyse |0 (DE-588)4137042-9 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Sicherheitspolitik |0 (DE-588)4116489-1 |D s |
689 | 1 | 1 | |a Spieltheorie |0 (DE-588)4056243-8 |D s |
689 | 1 | 2 | |a Risikoanalyse |0 (DE-588)4137042-9 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Bier, Vicki M. |d 1955- |0 (DE-588)1251856837 |4 edt | |
700 | 1 | |a Azaiez, Mohamed Naceur |0 (DE-588)1194848028 |4 edt | |
830 | 0 | |a International Series in Operations Research & Management Science |v 128 |w (DE-604)BV011630976 |9 128 | |
856 | 4 | 2 | |m Digitalisierung BSBMuenchen |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017160734&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
Datensatz im Suchindex
_version_ | 1805074595445735424 |
---|---|
adam_text |
TABLE
OF
CONTENTS
Why Both Game Theory and Reliability Theory
Are Important in Defending Infrastructure against
Intelligent Attacks
.1
Viciá M.
Bier, University of Wisconsin-Madison, USA
Louis A. (Tony) Cox, Jr., Cox Associates, Inc., and University of
Colorado Denver, USA
M. Naceur Azaiez, King
Saud
University, Saudi Arabia
Game Theory Models of Intelligent Actors in
Reliability Analysis: An Overview of the State of
the Art
.13
Seth D. Guikema, Johns Hopkins University, USA
Optimizing Defense Strategies for Complex Multi-
State Systems
.33
Gregory
Levititi,
The Israel Electric Corporation Ltd., Israel
Defending Against Terrorism, Natural Disaster,
and All Hazards
.65
Kjell
Hausken,
University of
Stavanger,
Norway
Vicki M. Bier, University of Wisconsin-Madison, USA
Jun Zhuang,
University at Buffalo (The State University of New York),
USA
A Bayesian Model for a Game of Information in
Optimal Attack/Defense Strategies
.99
M. Naceur Azaiez, King
Saud
University, Saudi Arabia
Search for a Malevolent Needle in a Benign
Haystack
.125
Donald
P.
Gaver,
Naval Postgraduate School, USA
Kevin D. Glazebrook, Lancaster University, United Kingdom
Patricia A. Jacobs, Naval Postgraduate School, USA
vi
Table of Contents
7
Games and Risk Analysis: Three Examples of
Single and Alternate Moves
.147
M. Elisabeth
Patë-Cornell,
Stanford University, USA, with the
collaboration of
Russ
Garber,
Seth Guikema, and Paul Kucik
8
Making Telecommunications Networks Resilient
against Terrorist Attacks
.175
Louis A. (Tony) Cox, Jr., Cox Associates, Inc., and University of
Colorado Denver, USA
9
Improving Reliability through Multi-Path Routing
and Link Defence: An Application of Game
Theory to Transport
.199
Urszula Kanturska,
Amp, United Kingdom
Jan-Dirk Schmöcker,
Tokyo Institute of Technology, Japan
Achille
Fonzone, Polytechnic of
Bari,
Italy
Michael G. H. Bell, Imperial College London, United Kingdom
Index
.229 |
any_adam_object | 1 |
author2 | Bier, Vicki M. 1955- Azaiez, Mohamed Naceur |
author2_role | edt edt |
author2_variant | v m b vm vmb m n a mn mna |
author_GND | (DE-588)1251856837 (DE-588)1194848028 |
author_facet | Bier, Vicki M. 1955- Azaiez, Mohamed Naceur |
building | Verbundindex |
bvnumber | BV035356672 |
callnumber-first | T - Technology |
callnumber-label | T57 |
callnumber-raw | T57.92 |
callnumber-search | T57.92 |
callnumber-sort | T 257.92 |
callnumber-subject | T - General Technology |
classification_rvk | QH 435 |
ctrlnum | (OCoLC)262894267 (DE-599)DNB990120279 |
dewey-full | 519.3 |
dewey-hundreds | 500 - Natural sciences and mathematics |
dewey-ones | 519 - Probabilities and applied mathematics |
dewey-raw | 519.3 |
dewey-search | 519.3 |
dewey-sort | 3519.3 |
dewey-tens | 510 - Mathematics |
discipline | Mathematik Wirtschaftswissenschaften |
edition | 1. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV035356672</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20220215</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">090310s2009 gw |||| |||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">08,N37,0886</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">990120279</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780387877662</subfield><subfield code="c">Gb. : ca. EUR 81.59 (freier Pr.), ca. sfr 127.00 (freier Pr.)</subfield><subfield code="9">978-0-387-87766-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)262894267</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB990120279</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield><subfield code="a">DE-M347</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">T57.92</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">519.3</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">QH 435</subfield><subfield code="0">(DE-625)141585:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">670</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">8</subfield><subfield code="2">ssgn</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Game theoretic risk analysis of security threats</subfield><subfield code="c">edited by Vicki M. Bier, M. Naceur Azaiez</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">VI, 236 Seiten</subfield><subfield code="b">graphische Darstellungen, Karten</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">International Series in Operations Research & Management Science</subfield><subfield code="v">128</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Game theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Risk assessment</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless communication systems</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Spieltheorie</subfield><subfield code="0">(DE-588)4056243-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Risikoanalyse</subfield><subfield code="0">(DE-588)4137042-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitspolitik</subfield><subfield code="0">(DE-588)4116489-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsplanung</subfield><subfield code="0">(DE-588)4217560-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Sicherheitsplanung</subfield><subfield code="0">(DE-588)4217560-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Spieltheorie</subfield><subfield code="0">(DE-588)4056243-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Risikoanalyse</subfield><subfield code="0">(DE-588)4137042-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Sicherheitspolitik</subfield><subfield code="0">(DE-588)4116489-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Spieltheorie</subfield><subfield code="0">(DE-588)4056243-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Risikoanalyse</subfield><subfield code="0">(DE-588)4137042-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bier, Vicki M.</subfield><subfield code="d">1955-</subfield><subfield code="0">(DE-588)1251856837</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Azaiez, Mohamed Naceur</subfield><subfield code="0">(DE-588)1194848028</subfield><subfield code="4">edt</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">International Series in Operations Research & Management Science</subfield><subfield code="v">128</subfield><subfield code="w">(DE-604)BV011630976</subfield><subfield code="9">128</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung BSBMuenchen</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017160734&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV035356672 |
illustrated | Not Illustrated |
indexdate | 2024-07-20T05:28:00Z |
institution | BVB |
isbn | 9780387877662 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-017160734 |
oclc_num | 262894267 |
open_access_boolean | |
owner | DE-12 DE-M347 |
owner_facet | DE-12 DE-M347 |
physical | VI, 236 Seiten graphische Darstellungen, Karten |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Springer |
record_format | marc |
series | International Series in Operations Research & Management Science |
series2 | International Series in Operations Research & Management Science |
spelling | Game theoretic risk analysis of security threats edited by Vicki M. Bier, M. Naceur Azaiez 1. ed. New York [u.a.] Springer 2009 VI, 236 Seiten graphische Darstellungen, Karten txt rdacontent n rdamedia nc rdacarrier International Series in Operations Research & Management Science 128 Game theory Risk assessment Wireless communication systems Security measures Spieltheorie (DE-588)4056243-8 gnd rswk-swf Risikoanalyse (DE-588)4137042-9 gnd rswk-swf Sicherheitspolitik (DE-588)4116489-1 gnd rswk-swf Sicherheitsplanung (DE-588)4217560-4 gnd rswk-swf (DE-588)4143413-4 Aufsatzsammlung gnd-content Sicherheitsplanung (DE-588)4217560-4 s Spieltheorie (DE-588)4056243-8 s Risikoanalyse (DE-588)4137042-9 s DE-604 Sicherheitspolitik (DE-588)4116489-1 s Bier, Vicki M. 1955- (DE-588)1251856837 edt Azaiez, Mohamed Naceur (DE-588)1194848028 edt International Series in Operations Research & Management Science 128 (DE-604)BV011630976 128 Digitalisierung BSBMuenchen application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017160734&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Game theoretic risk analysis of security threats International Series in Operations Research & Management Science Game theory Risk assessment Wireless communication systems Security measures Spieltheorie (DE-588)4056243-8 gnd Risikoanalyse (DE-588)4137042-9 gnd Sicherheitspolitik (DE-588)4116489-1 gnd Sicherheitsplanung (DE-588)4217560-4 gnd |
subject_GND | (DE-588)4056243-8 (DE-588)4137042-9 (DE-588)4116489-1 (DE-588)4217560-4 (DE-588)4143413-4 |
title | Game theoretic risk analysis of security threats |
title_auth | Game theoretic risk analysis of security threats |
title_exact_search | Game theoretic risk analysis of security threats |
title_full | Game theoretic risk analysis of security threats edited by Vicki M. Bier, M. Naceur Azaiez |
title_fullStr | Game theoretic risk analysis of security threats edited by Vicki M. Bier, M. Naceur Azaiez |
title_full_unstemmed | Game theoretic risk analysis of security threats edited by Vicki M. Bier, M. Naceur Azaiez |
title_short | Game theoretic risk analysis of security threats |
title_sort | game theoretic risk analysis of security threats |
topic | Game theory Risk assessment Wireless communication systems Security measures Spieltheorie (DE-588)4056243-8 gnd Risikoanalyse (DE-588)4137042-9 gnd Sicherheitspolitik (DE-588)4116489-1 gnd Sicherheitsplanung (DE-588)4217560-4 gnd |
topic_facet | Game theory Risk assessment Wireless communication systems Security measures Spieltheorie Risikoanalyse Sicherheitspolitik Sicherheitsplanung Aufsatzsammlung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017160734&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV011630976 |
work_keys_str_mv | AT biervickim gametheoreticriskanalysisofsecuritythreats AT azaiezmohamednaceur gametheoreticriskanalysisofsecuritythreats |