Game Theoretic Risk Analysis of Security Threats:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Boston, MA
Springer US
2009
|
Schriftenreihe: | International Series in Operations Research & Management Science
128 |
Schlagworte: | |
Online-Zugang: | BTU01 FHN01 FHR01 Volltext |
Beschreibung: | Game Theoretic Risk Analysis of Security Threats introduces reliability and risk analysis in the face of threats by intelligent agents. More specifically, game-theoretic models will be developed for identifying optimal and/or equilibrium defense and attack strategies in systems of varying degrees of complexity. The book covers applications to networks, including problems in both telecommunications and transportation. However, the book’s primary focus is to integrate game theory and reliability methodologies into unified techniques to predict, detect, diminish, and stop intentional attacks at targets that vary in complexity. In this book, leading researchers combine reliability and risk analysis with game theory methods to create a set of functional tools that can be used by security personnel to offset intentional, intelligent threats (including the threats of terrorism and war). This means a comprehensive treatment of such problems must consider two aspects: (1) the structure of the system to be protected and (2) the adaptive nature of the threat (that is, beyond the static nature of the threat). The book provides a set of scientific tools for analyzing and applying game-theoretic reliability problems in the presence of intentional, intelligent threats. These scientific tools address problems of global safety and create more cost-effective defensive investments |
Beschreibung: | 1 Online-Ressource (VI, 242p. 46 illus) |
ISBN: | 9780387877679 |
DOI: | 10.1007/978-0-387-87767-9 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV041889544 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 140603s2009 |||| o||u| ||||||eng d | ||
020 | |a 9780387877679 |c Online |9 978-0-387-87767-9 | ||
024 | 7 | |a 10.1007/978-0-387-87767-9 |2 doi | |
035 | |a (OCoLC)612118470 | ||
035 | |a (DE-599)BVBBV041889544 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-634 |a DE-898 |a DE-92 |a DE-83 | ||
084 | |a QH 435 |0 (DE-625)141585: |2 rvk | ||
100 | 1 | |a Bier, Vicki M. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Game Theoretic Risk Analysis of Security Threats |c edited by Vicki M. Bier, M. Naceur Azaiez |
264 | 1 | |a Boston, MA |b Springer US |c 2009 | |
300 | |a 1 Online-Ressource (VI, 242p. 46 illus) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a International Series in Operations Research & Management Science |v 128 | |
500 | |a Game Theoretic Risk Analysis of Security Threats introduces reliability and risk analysis in the face of threats by intelligent agents. More specifically, game-theoretic models will be developed for identifying optimal and/or equilibrium defense and attack strategies in systems of varying degrees of complexity. The book covers applications to networks, including problems in both telecommunications and transportation. However, the book’s primary focus is to integrate game theory and reliability methodologies into unified techniques to predict, detect, diminish, and stop intentional attacks at targets that vary in complexity. In this book, leading researchers combine reliability and risk analysis with game theory methods to create a set of functional tools that can be used by security personnel to offset intentional, intelligent threats (including the threats of terrorism and war). This means a comprehensive treatment of such problems must consider two aspects: (1) the structure of the system to be protected and (2) the adaptive nature of the threat (that is, beyond the static nature of the threat). The book provides a set of scientific tools for analyzing and applying game-theoretic reliability problems in the presence of intentional, intelligent threats. These scientific tools address problems of global safety and create more cost-effective defensive investments | ||
505 | 0 | |a Why Both Game Theory and Reliability Theory Are Important in Defending Infrastructure against Intelligent Attacks -- Game Theory Models of Intelligent Actors in Reliability Analysis: An Overview of the State of the Art -- Optimizing Defense Strategies for Complex Multi-State Systems -- Defending Against Terrorism, Natural Disaster, and All Hazards -- A Bayesian Model for a Game of Information in Optimal Attack/Defense Strategies -- Search for a Malevolent Needle in a Benign Haystack -- Games and Risk Analysis: Three Examples of Single and Alternate Moves -- Making Telecommunications Networks Resilient against Terrorist Attacks -- Improving Reliability through Multi-Path Routing and Link Defence: An Application of Game Theory to Transport | |
650 | 4 | |a Engineering | |
650 | 4 | |a Mathematics | |
650 | 4 | |a Industrial engineering | |
650 | 4 | |a System safety | |
650 | 4 | |a Structural control (Engineering) | |
650 | 4 | |a Quality Control, Reliability, Safety and Risk | |
650 | 4 | |a Game Theory, Economics, Social and Behav. Sciences | |
650 | 4 | |a Applications of Mathematics | |
650 | 4 | |a Industrial and Production Engineering | |
650 | 4 | |a Operations Research/Decision Theory | |
650 | 4 | |a Operating Procedures, Materials Treatment | |
650 | 4 | |a Ingenieurwissenschaften | |
650 | 4 | |a Mathematik | |
650 | 0 | 7 | |a Sicherheitspolitik |0 (DE-588)4116489-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitsplanung |0 (DE-588)4217560-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Risikoanalyse |0 (DE-588)4137042-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Spieltheorie |0 (DE-588)4056243-8 |2 gnd |9 rswk-swf |
655 | 7 | |8 1\p |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Sicherheitsplanung |0 (DE-588)4217560-4 |D s |
689 | 0 | 1 | |a Spieltheorie |0 (DE-588)4056243-8 |D s |
689 | 0 | 2 | |a Risikoanalyse |0 (DE-588)4137042-9 |D s |
689 | 0 | |8 2\p |5 DE-604 | |
689 | 1 | 0 | |a Sicherheitspolitik |0 (DE-588)4116489-1 |D s |
689 | 1 | 1 | |a Spieltheorie |0 (DE-588)4056243-8 |D s |
689 | 1 | 2 | |a Risikoanalyse |0 (DE-588)4137042-9 |D s |
689 | 1 | |8 3\p |5 DE-604 | |
700 | 1 | |a Azaiez, M. Naceur |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-0-387-87766-2 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-0-387-87767-9 |x Verlag |3 Volltext |
912 | |a ZDB-2-ENG | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-027333497 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 3\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u https://doi.org/10.1007/978-0-387-87767-9 |l BTU01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-0-387-87767-9 |l FHN01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-0-387-87767-9 |l FHR01 |p ZDB-2-ENG |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804152238467186688 |
---|---|
any_adam_object | |
author | Bier, Vicki M. |
author_facet | Bier, Vicki M. |
author_role | aut |
author_sort | Bier, Vicki M. |
author_variant | v m b vm vmb |
building | Verbundindex |
bvnumber | BV041889544 |
classification_rvk | QH 435 |
collection | ZDB-2-ENG |
contents | Why Both Game Theory and Reliability Theory Are Important in Defending Infrastructure against Intelligent Attacks -- Game Theory Models of Intelligent Actors in Reliability Analysis: An Overview of the State of the Art -- Optimizing Defense Strategies for Complex Multi-State Systems -- Defending Against Terrorism, Natural Disaster, and All Hazards -- A Bayesian Model for a Game of Information in Optimal Attack/Defense Strategies -- Search for a Malevolent Needle in a Benign Haystack -- Games and Risk Analysis: Three Examples of Single and Alternate Moves -- Making Telecommunications Networks Resilient against Terrorist Attacks -- Improving Reliability through Multi-Path Routing and Link Defence: An Application of Game Theory to Transport |
ctrlnum | (OCoLC)612118470 (DE-599)BVBBV041889544 |
discipline | Wirtschaftswissenschaften |
doi_str_mv | 10.1007/978-0-387-87767-9 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05199nmm a2200745zcb4500</leader><controlfield tag="001">BV041889544</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">140603s2009 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780387877679</subfield><subfield code="c">Online</subfield><subfield code="9">978-0-387-87767-9</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-0-387-87767-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)612118470</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041889544</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-634</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">QH 435</subfield><subfield code="0">(DE-625)141585:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Bier, Vicki M.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Game Theoretic Risk Analysis of Security Threats</subfield><subfield code="c">edited by Vicki M. Bier, M. Naceur Azaiez</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston, MA</subfield><subfield code="b">Springer US</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (VI, 242p. 46 illus)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">International Series in Operations Research & Management Science</subfield><subfield code="v">128</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Game Theoretic Risk Analysis of Security Threats introduces reliability and risk analysis in the face of threats by intelligent agents. More specifically, game-theoretic models will be developed for identifying optimal and/or equilibrium defense and attack strategies in systems of varying degrees of complexity. The book covers applications to networks, including problems in both telecommunications and transportation. However, the book’s primary focus is to integrate game theory and reliability methodologies into unified techniques to predict, detect, diminish, and stop intentional attacks at targets that vary in complexity. In this book, leading researchers combine reliability and risk analysis with game theory methods to create a set of functional tools that can be used by security personnel to offset intentional, intelligent threats (including the threats of terrorism and war). This means a comprehensive treatment of such problems must consider two aspects: (1) the structure of the system to be protected and (2) the adaptive nature of the threat (that is, beyond the static nature of the threat). The book provides a set of scientific tools for analyzing and applying game-theoretic reliability problems in the presence of intentional, intelligent threats. These scientific tools address problems of global safety and create more cost-effective defensive investments</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Why Both Game Theory and Reliability Theory Are Important in Defending Infrastructure against Intelligent Attacks -- Game Theory Models of Intelligent Actors in Reliability Analysis: An Overview of the State of the Art -- Optimizing Defense Strategies for Complex Multi-State Systems -- Defending Against Terrorism, Natural Disaster, and All Hazards -- A Bayesian Model for a Game of Information in Optimal Attack/Defense Strategies -- Search for a Malevolent Needle in a Benign Haystack -- Games and Risk Analysis: Three Examples of Single and Alternate Moves -- Making Telecommunications Networks Resilient against Terrorist Attacks -- Improving Reliability through Multi-Path Routing and Link Defence: An Application of Game Theory to Transport</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mathematics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Industrial engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">System safety</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Structural control (Engineering)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Quality Control, Reliability, Safety and Risk</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Game Theory, Economics, Social and Behav. Sciences</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Applications of Mathematics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Industrial and Production Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Operations Research/Decision Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Operating Procedures, Materials Treatment</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ingenieurwissenschaften</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mathematik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitspolitik</subfield><subfield code="0">(DE-588)4116489-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsplanung</subfield><subfield code="0">(DE-588)4217560-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Risikoanalyse</subfield><subfield code="0">(DE-588)4137042-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Spieltheorie</subfield><subfield code="0">(DE-588)4056243-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="8">1\p</subfield><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Sicherheitsplanung</subfield><subfield code="0">(DE-588)4217560-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Spieltheorie</subfield><subfield code="0">(DE-588)4056243-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Risikoanalyse</subfield><subfield code="0">(DE-588)4137042-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Sicherheitspolitik</subfield><subfield code="0">(DE-588)4116489-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Spieltheorie</subfield><subfield code="0">(DE-588)4056243-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Risikoanalyse</subfield><subfield code="0">(DE-588)4137042-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">3\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Azaiez, M. Naceur</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-0-387-87766-2</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-0-387-87767-9</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-ENG</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027333497</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">3\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-0-387-87767-9</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-0-387-87767-9</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-0-387-87767-9</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | 1\p (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV041889544 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:07:32Z |
institution | BVB |
isbn | 9780387877679 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027333497 |
oclc_num | 612118470 |
open_access_boolean | |
owner | DE-634 DE-898 DE-BY-UBR DE-92 DE-83 |
owner_facet | DE-634 DE-898 DE-BY-UBR DE-92 DE-83 |
physical | 1 Online-Ressource (VI, 242p. 46 illus) |
psigel | ZDB-2-ENG |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Springer US |
record_format | marc |
series2 | International Series in Operations Research & Management Science |
spelling | Bier, Vicki M. Verfasser aut Game Theoretic Risk Analysis of Security Threats edited by Vicki M. Bier, M. Naceur Azaiez Boston, MA Springer US 2009 1 Online-Ressource (VI, 242p. 46 illus) txt rdacontent c rdamedia cr rdacarrier International Series in Operations Research & Management Science 128 Game Theoretic Risk Analysis of Security Threats introduces reliability and risk analysis in the face of threats by intelligent agents. More specifically, game-theoretic models will be developed for identifying optimal and/or equilibrium defense and attack strategies in systems of varying degrees of complexity. The book covers applications to networks, including problems in both telecommunications and transportation. However, the book’s primary focus is to integrate game theory and reliability methodologies into unified techniques to predict, detect, diminish, and stop intentional attacks at targets that vary in complexity. In this book, leading researchers combine reliability and risk analysis with game theory methods to create a set of functional tools that can be used by security personnel to offset intentional, intelligent threats (including the threats of terrorism and war). This means a comprehensive treatment of such problems must consider two aspects: (1) the structure of the system to be protected and (2) the adaptive nature of the threat (that is, beyond the static nature of the threat). The book provides a set of scientific tools for analyzing and applying game-theoretic reliability problems in the presence of intentional, intelligent threats. These scientific tools address problems of global safety and create more cost-effective defensive investments Why Both Game Theory and Reliability Theory Are Important in Defending Infrastructure against Intelligent Attacks -- Game Theory Models of Intelligent Actors in Reliability Analysis: An Overview of the State of the Art -- Optimizing Defense Strategies for Complex Multi-State Systems -- Defending Against Terrorism, Natural Disaster, and All Hazards -- A Bayesian Model for a Game of Information in Optimal Attack/Defense Strategies -- Search for a Malevolent Needle in a Benign Haystack -- Games and Risk Analysis: Three Examples of Single and Alternate Moves -- Making Telecommunications Networks Resilient against Terrorist Attacks -- Improving Reliability through Multi-Path Routing and Link Defence: An Application of Game Theory to Transport Engineering Mathematics Industrial engineering System safety Structural control (Engineering) Quality Control, Reliability, Safety and Risk Game Theory, Economics, Social and Behav. Sciences Applications of Mathematics Industrial and Production Engineering Operations Research/Decision Theory Operating Procedures, Materials Treatment Ingenieurwissenschaften Mathematik Sicherheitspolitik (DE-588)4116489-1 gnd rswk-swf Sicherheitsplanung (DE-588)4217560-4 gnd rswk-swf Risikoanalyse (DE-588)4137042-9 gnd rswk-swf Spieltheorie (DE-588)4056243-8 gnd rswk-swf 1\p (DE-588)4143413-4 Aufsatzsammlung gnd-content Sicherheitsplanung (DE-588)4217560-4 s Spieltheorie (DE-588)4056243-8 s Risikoanalyse (DE-588)4137042-9 s 2\p DE-604 Sicherheitspolitik (DE-588)4116489-1 s 3\p DE-604 Azaiez, M. Naceur Sonstige oth Erscheint auch als Druckausgabe 978-0-387-87766-2 https://doi.org/10.1007/978-0-387-87767-9 Verlag Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 3\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Bier, Vicki M. Game Theoretic Risk Analysis of Security Threats Why Both Game Theory and Reliability Theory Are Important in Defending Infrastructure against Intelligent Attacks -- Game Theory Models of Intelligent Actors in Reliability Analysis: An Overview of the State of the Art -- Optimizing Defense Strategies for Complex Multi-State Systems -- Defending Against Terrorism, Natural Disaster, and All Hazards -- A Bayesian Model for a Game of Information in Optimal Attack/Defense Strategies -- Search for a Malevolent Needle in a Benign Haystack -- Games and Risk Analysis: Three Examples of Single and Alternate Moves -- Making Telecommunications Networks Resilient against Terrorist Attacks -- Improving Reliability through Multi-Path Routing and Link Defence: An Application of Game Theory to Transport Engineering Mathematics Industrial engineering System safety Structural control (Engineering) Quality Control, Reliability, Safety and Risk Game Theory, Economics, Social and Behav. Sciences Applications of Mathematics Industrial and Production Engineering Operations Research/Decision Theory Operating Procedures, Materials Treatment Ingenieurwissenschaften Mathematik Sicherheitspolitik (DE-588)4116489-1 gnd Sicherheitsplanung (DE-588)4217560-4 gnd Risikoanalyse (DE-588)4137042-9 gnd Spieltheorie (DE-588)4056243-8 gnd |
subject_GND | (DE-588)4116489-1 (DE-588)4217560-4 (DE-588)4137042-9 (DE-588)4056243-8 (DE-588)4143413-4 |
title | Game Theoretic Risk Analysis of Security Threats |
title_auth | Game Theoretic Risk Analysis of Security Threats |
title_exact_search | Game Theoretic Risk Analysis of Security Threats |
title_full | Game Theoretic Risk Analysis of Security Threats edited by Vicki M. Bier, M. Naceur Azaiez |
title_fullStr | Game Theoretic Risk Analysis of Security Threats edited by Vicki M. Bier, M. Naceur Azaiez |
title_full_unstemmed | Game Theoretic Risk Analysis of Security Threats edited by Vicki M. Bier, M. Naceur Azaiez |
title_short | Game Theoretic Risk Analysis of Security Threats |
title_sort | game theoretic risk analysis of security threats |
topic | Engineering Mathematics Industrial engineering System safety Structural control (Engineering) Quality Control, Reliability, Safety and Risk Game Theory, Economics, Social and Behav. Sciences Applications of Mathematics Industrial and Production Engineering Operations Research/Decision Theory Operating Procedures, Materials Treatment Ingenieurwissenschaften Mathematik Sicherheitspolitik (DE-588)4116489-1 gnd Sicherheitsplanung (DE-588)4217560-4 gnd Risikoanalyse (DE-588)4137042-9 gnd Spieltheorie (DE-588)4056243-8 gnd |
topic_facet | Engineering Mathematics Industrial engineering System safety Structural control (Engineering) Quality Control, Reliability, Safety and Risk Game Theory, Economics, Social and Behav. Sciences Applications of Mathematics Industrial and Production Engineering Operations Research/Decision Theory Operating Procedures, Materials Treatment Ingenieurwissenschaften Mathematik Sicherheitspolitik Sicherheitsplanung Risikoanalyse Spieltheorie Aufsatzsammlung |
url | https://doi.org/10.1007/978-0-387-87767-9 |
work_keys_str_mv | AT biervickim gametheoreticriskanalysisofsecuritythreats AT azaiezmnaceur gametheoreticriskanalysisofsecuritythreats |