Decision and game theory for security: 4th international conference, GameSec 2013, Fort Worth, TX, USA, November 11 - 12, 2013 ; proceedings
Gespeichert in:
Format: | Elektronisch Tagungsbericht E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Cham [u.a.]
Springer
2013
|
Schriftenreihe: | Lecture notes in computer science
8252 |
Schlagworte: | |
Online-Zugang: | Volltext Abstract |
Beschreibung: | 1 Online-Ressource |
ISBN: | 3319027859 9783319027869 |
DOI: | 10.1007/978-3-319-02786-9 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV041583047 | ||
003 | DE-604 | ||
005 | 20140225 | ||
007 | cr|uuu---uuuuu | ||
008 | 140122s2013 gw o|||| 10||| eng d | ||
020 | |a 3319027859 |9 3-319-02785-9 | ||
020 | |a 9783319027869 |c eISBN |9 978-3-319-02786-9 | ||
024 | 7 | |a 10.1007/978-3-319-02786-9 |2 doi | |
024 | 3 | |a 9783319027852 | |
028 | 5 | 2 | |a Best.-Nr.: 86328086 |
035 | |a (OCoLC)862045882 | ||
035 | |a (DE-599)BVBBV041583047 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE | ||
049 | |a DE-473 |a DE-M347 |a DE-20 |a DE-703 |a DE-Aug4 |a DE-92 |a DE-29 |a DE-859 |a DE-91 |a DE-706 |a DE-739 |a DE-384 |a DE-634 |a DE-355 | ||
082 | 0 | |a 005.7 | |
084 | |a MAT 920f |2 stub | ||
084 | |a 004 |2 sdnb | ||
084 | |a DAT 461f |2 stub | ||
084 | |a DAT 000 |2 stub | ||
245 | 1 | 0 | |a Decision and game theory for security |b 4th international conference, GameSec 2013, Fort Worth, TX, USA, November 11 - 12, 2013 ; proceedings |c Sajal K. Das ... (eds.) |
264 | 1 | |a Cham [u.a.] |b Springer |c 2013 | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 8252 | |
650 | 0 | 7 | |a Netzwerktopologie |0 (DE-588)4208537-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Spieltheorie |0 (DE-588)4056243-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Eindringerkennung |0 (DE-588)4706627-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Trusted Computing |0 (DE-588)7562931-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Netzwerkverwaltung |0 (DE-588)4314339-8 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2013 |z Fort Worth, Tex. |2 gnd-content | |
689 | 0 | 0 | |a Netzwerkverwaltung |0 (DE-588)4314339-8 |D s |
689 | 0 | 1 | |a Netzwerktopologie |0 (DE-588)4208537-8 |D s |
689 | 0 | 2 | |a Spieltheorie |0 (DE-588)4056243-8 |D s |
689 | 0 | 3 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | 4 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 0 | 5 | |a Trusted Computing |0 (DE-588)7562931-8 |D s |
689 | 0 | 6 | |a Eindringerkennung |0 (DE-588)4706627-1 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Das, Sajal |d 1960- |e Sonstige |0 (DE-588)141294477 |4 oth | |
711 | 2 | |a GameSec |n 4. |d 2013 |c Fort Worth, Tex. |j Sonstige |0 (DE-588)1043953345 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 978-3-319-02785-2 |
830 | 0 | |a Lecture notes in computer science |v 8252 |w (DE-604)BV014880109 |9 8252 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-02786-9 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027028270&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS | ||
912 | |a ZDB-2-LNC | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-027028270 |
Datensatz im Suchindex
_version_ | 1820875551628328960 |
---|---|
adam_text |
DECISION AND GAME THEORY FOR SECURITY
/
: 2013
ABSTRACT / INHALTSTEXT
THIS BOOK CONSTITUTES THE REFEREED PROCEEDINGS OF THE 4TH INTERNATIONAL
CONFERENCE ON DECISION AND GAME THEORY FOR SECURITY, GAMESEC 2013, HELD
IN FORT WORTH, TX, USA, IN NOVEMBER 2013. THE 15 REVISED FULL PAPERS
PRESENTED WERE CAREFULLY REVIEWED AND SELECTED FROM NUMEROUS
SUBMISSIONS. THE CONFERENCE FOCUSES ON ANALYTICAL MODELS BASED ON GAME,
INFORMATION, COMMUNICATION, OPTIMIZATION, DECISION, AND CONTROL THEORIES
THAT ARE APPLIED TO DIVERSE SECURITY TOPICS. AT THE SAME TIME, THE
CONNECTION BETWEEN THEORETICAL MODELS AND REAL WORLD SECURITY PROBLEMS
ARE EMPHASIZED TO ESTABLISH THE IMPORTANT FEEDBACK LOOP BETWEEN THEORY
AND PRACTICE. OBSERVING THE SCARCITY OF VENUES FOR RESEARCHERS WHO TRY
TO DEVELOP A DEEPER THEORETICAL UNDERSTANDING OF THE UNDERLYING
INCENTIVE AND RESOURCE ALLOCATION ISSUES IN SECURITY, WE BELIEVE THAT
GAMESEC WILL FILL AN IMPORTANT VOID AND SERVE AS A DISTINGUISHED FORUM
OF HIGHEST STANDARDS FOR YEARS TO COME
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT. |
any_adam_object | 1 |
author_GND | (DE-588)141294477 |
building | Verbundindex |
bvnumber | BV041583047 |
classification_rvk | SS 4800 |
classification_tum | MAT 920f DAT 461f DAT 000 |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (OCoLC)862045882 (DE-599)BVBBV041583047 |
dewey-full | 005.7 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.7 |
dewey-search | 005.7 |
dewey-sort | 15.7 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Mathematik |
doi_str_mv | 10.1007/978-3-319-02786-9 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV041583047</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20140225</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">140122s2013 gw o|||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3319027859</subfield><subfield code="9">3-319-02785-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319027869</subfield><subfield code="c">eISBN</subfield><subfield code="9">978-3-319-02786-9</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-02786-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783319027852</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Best.-Nr.: 86328086</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)862045882</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041583047</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.7</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">MAT 920f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Decision and game theory for security</subfield><subfield code="b">4th international conference, GameSec 2013, Fort Worth, TX, USA, November 11 - 12, 2013 ; proceedings</subfield><subfield code="c">Sajal K. Das ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">8252</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Netzwerktopologie</subfield><subfield code="0">(DE-588)4208537-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Spieltheorie</subfield><subfield code="0">(DE-588)4056243-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Netzwerkverwaltung</subfield><subfield code="0">(DE-588)4314339-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2013</subfield><subfield code="z">Fort Worth, Tex.</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Netzwerkverwaltung</subfield><subfield code="0">(DE-588)4314339-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Netzwerktopologie</subfield><subfield code="0">(DE-588)4208537-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Spieltheorie</subfield><subfield code="0">(DE-588)4056243-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="6"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Das, Sajal</subfield><subfield code="d">1960-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)141294477</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">GameSec</subfield><subfield code="n">4.</subfield><subfield code="d">2013</subfield><subfield code="c">Fort Worth, Tex.</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1043953345</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">978-3-319-02785-2</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">8252</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">8252</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-02786-9</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027028270&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027028270</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2013 Fort Worth, Tex. gnd-content |
genre_facet | Konferenzschrift 2013 Fort Worth, Tex. |
id | DE-604.BV041583047 |
illustrated | Not Illustrated |
indexdate | 2025-01-10T15:17:26Z |
institution | BVB |
institution_GND | (DE-588)1043953345 |
isbn | 3319027859 9783319027869 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027028270 |
oclc_num | 862045882 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-M347 DE-20 DE-703 DE-Aug4 DE-92 DE-29 DE-859 DE-91 DE-BY-TUM DE-706 DE-739 DE-384 DE-634 DE-355 DE-BY-UBR |
owner_facet | DE-473 DE-BY-UBG DE-M347 DE-20 DE-703 DE-Aug4 DE-92 DE-29 DE-859 DE-91 DE-BY-TUM DE-706 DE-739 DE-384 DE-634 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource |
psigel | ZDB-2-SCS ZDB-2-LNC |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Decision and game theory for security 4th international conference, GameSec 2013, Fort Worth, TX, USA, November 11 - 12, 2013 ; proceedings Sajal K. Das ... (eds.) Cham [u.a.] Springer 2013 1 Online-Ressource txt rdacontent c rdamedia cr rdacarrier Lecture notes in computer science 8252 Netzwerktopologie (DE-588)4208537-8 gnd rswk-swf Spieltheorie (DE-588)4056243-8 gnd rswk-swf Privatsphäre (DE-588)4123980-5 gnd rswk-swf Eindringerkennung (DE-588)4706627-1 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Trusted Computing (DE-588)7562931-8 gnd rswk-swf Netzwerkverwaltung (DE-588)4314339-8 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2013 Fort Worth, Tex. gnd-content Netzwerkverwaltung (DE-588)4314339-8 s Netzwerktopologie (DE-588)4208537-8 s Spieltheorie (DE-588)4056243-8 s Kryptoanalyse (DE-588)4830502-9 s Privatsphäre (DE-588)4123980-5 s Trusted Computing (DE-588)7562931-8 s Eindringerkennung (DE-588)4706627-1 s DE-604 Das, Sajal 1960- Sonstige (DE-588)141294477 oth GameSec 4. 2013 Fort Worth, Tex. Sonstige (DE-588)1043953345 oth Erscheint auch als Druck-Ausgabe, Paperback 978-3-319-02785-2 Lecture notes in computer science 8252 (DE-604)BV014880109 8252 https://doi.org/10.1007/978-3-319-02786-9 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027028270&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Decision and game theory for security 4th international conference, GameSec 2013, Fort Worth, TX, USA, November 11 - 12, 2013 ; proceedings Lecture notes in computer science Netzwerktopologie (DE-588)4208537-8 gnd Spieltheorie (DE-588)4056243-8 gnd Privatsphäre (DE-588)4123980-5 gnd Eindringerkennung (DE-588)4706627-1 gnd Kryptoanalyse (DE-588)4830502-9 gnd Trusted Computing (DE-588)7562931-8 gnd Netzwerkverwaltung (DE-588)4314339-8 gnd |
subject_GND | (DE-588)4208537-8 (DE-588)4056243-8 (DE-588)4123980-5 (DE-588)4706627-1 (DE-588)4830502-9 (DE-588)7562931-8 (DE-588)4314339-8 (DE-588)1071861417 |
title | Decision and game theory for security 4th international conference, GameSec 2013, Fort Worth, TX, USA, November 11 - 12, 2013 ; proceedings |
title_auth | Decision and game theory for security 4th international conference, GameSec 2013, Fort Worth, TX, USA, November 11 - 12, 2013 ; proceedings |
title_exact_search | Decision and game theory for security 4th international conference, GameSec 2013, Fort Worth, TX, USA, November 11 - 12, 2013 ; proceedings |
title_full | Decision and game theory for security 4th international conference, GameSec 2013, Fort Worth, TX, USA, November 11 - 12, 2013 ; proceedings Sajal K. Das ... (eds.) |
title_fullStr | Decision and game theory for security 4th international conference, GameSec 2013, Fort Worth, TX, USA, November 11 - 12, 2013 ; proceedings Sajal K. Das ... (eds.) |
title_full_unstemmed | Decision and game theory for security 4th international conference, GameSec 2013, Fort Worth, TX, USA, November 11 - 12, 2013 ; proceedings Sajal K. Das ... (eds.) |
title_short | Decision and game theory for security |
title_sort | decision and game theory for security 4th international conference gamesec 2013 fort worth tx usa november 11 12 2013 proceedings |
title_sub | 4th international conference, GameSec 2013, Fort Worth, TX, USA, November 11 - 12, 2013 ; proceedings |
topic | Netzwerktopologie (DE-588)4208537-8 gnd Spieltheorie (DE-588)4056243-8 gnd Privatsphäre (DE-588)4123980-5 gnd Eindringerkennung (DE-588)4706627-1 gnd Kryptoanalyse (DE-588)4830502-9 gnd Trusted Computing (DE-588)7562931-8 gnd Netzwerkverwaltung (DE-588)4314339-8 gnd |
topic_facet | Netzwerktopologie Spieltheorie Privatsphäre Eindringerkennung Kryptoanalyse Trusted Computing Netzwerkverwaltung Konferenzschrift 2013 Fort Worth, Tex. |
url | https://doi.org/10.1007/978-3-319-02786-9 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027028270&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT dassajal decisionandgametheoryforsecurity4thinternationalconferencegamesec2013fortworthtxusanovember11122013proceedings AT gamesecfortworthtex decisionandgametheoryforsecurity4thinternationalconferencegamesec2013fortworthtxusanovember11122013proceedings |