Decision and game theory for security: 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014 ; proceedings
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch Tagungsbericht E-Book |
Sprache: | English |
Veröffentlicht: |
Cham
Springer
2014
|
Schriftenreihe: | Lecture notes in computer science
8840 |
Schlagworte: | |
Online-Zugang: | DE-634 DE-M347 DE-92 DE-859 DE-861 DE-91 DE-384 DE-473 DE-703 DE-20 DE-706 DE-29 DE-739 Volltext Abstract |
Beschreibung: | 1 Online-Ressource (XI, 379 S.) 235 mm x 155 mm |
ISBN: | 9783319126012 |
DOI: | 10.1007/978-3-319-12601-2 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV042174135 | ||
003 | DE-604 | ||
005 | 20170519 | ||
007 | cr|uuu---uuuuu | ||
008 | 141107s2014 sz o|||| 10||| eng d | ||
020 | |a 9783319126012 |c eISBN |9 978-3-319-12601-2 | ||
024 | 7 | |a 10.1007/978-3-319-12601-2 |2 doi | |
024 | 3 | |a 9783319126005 | |
028 | 5 | 2 | |a Best.-Nr.: 86384771 |
035 | |a (OCoLC)894697412 | ||
035 | |a (DE-599)BVBBV042174135 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a sz |c XA-CH | ||
049 | |a DE-473 |a DE-20 |a DE-91 |a DE-706 |a DE-739 |a DE-384 |a DE-M347 |a DE-703 |a DE-29 |a DE-92 |a DE-859 |a DE-861 |a DE-634 | ||
082 | 0 | |a 005.8 |2 22//ger | |
084 | |a MAT 920f |2 stub | ||
084 | |a 004 |2 sdnb | ||
084 | |a DAT 461f |2 stub | ||
245 | 1 | 0 | |a Decision and game theory for security |b 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014 ; proceedings |c Radha Poovendran ... (eds.) |
264 | 1 | |a Cham |b Springer |c 2014 | |
300 | |a 1 Online-Ressource (XI, 379 S.) |c 235 mm x 155 mm | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 8840 | |
650 | 0 | 7 | |a Netzwerktopologie |0 (DE-588)4208537-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Spieltheorie |0 (DE-588)4056243-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Eindringerkennung |0 (DE-588)4706627-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Trusted Computing |0 (DE-588)7562931-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Netzwerkverwaltung |0 (DE-588)4314339-8 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |2 gnd-content | |
689 | 0 | 0 | |a Netzwerkverwaltung |0 (DE-588)4314339-8 |D s |
689 | 0 | 1 | |a Netzwerktopologie |0 (DE-588)4208537-8 |D s |
689 | 0 | 2 | |a Spieltheorie |0 (DE-588)4056243-8 |D s |
689 | 0 | 3 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | 4 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 0 | 5 | |a Trusted Computing |0 (DE-588)7562931-8 |D s |
689 | 0 | 6 | |a Eindringerkennung |0 (DE-588)4706627-1 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Poovendran, Radha |4 edt | |
711 | 2 | |a GameSec |n 5. |d 2014 |c Los Angeles, Calif. |j Sonstige |0 (DE-588)1060566567 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 978-3-319-12600-5 |
830 | 0 | |a Lecture notes in computer science |v 8840 |w (DE-604)BV014880109 |9 8840 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-12601-2 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027613520&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
912 | |a ZDB-2-LNC | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-027613520 | |
966 | e | |u https://doi.org/10.1007/978-3-319-12601-2 |l DE-634 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-12601-2 |l DE-M347 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-12601-2 |l DE-92 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-12601-2 |l DE-859 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-12601-2 |l DE-861 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-12601-2 |l DE-91 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-12601-2 |l DE-384 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-12601-2 |l DE-473 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-12601-2 |l DE-703 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-12601-2 |l DE-20 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-12601-2 |l DE-706 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-12601-2 |l DE-29 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-12601-2 |l DE-739 |p ZDB-2-LNC |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1820875634316935168 |
---|---|
adam_text |
DECISION AND GAME THEORY FOR SECURITY
/
: 2014
ABSTRACT / INHALTSTEXT
THIS BOOK CONSTITUTES THE REFEREED PROCEEDINGS OF THE 5TH INTERNATIONAL
CONFERENCE ON DECISION AND GAME THEORY FOR SECURITY, GAMESEC 2014, HELD
IN LOS ANGELES, CA, USA, IN NOVEMBER 2014. THE 16 REVISED FULL PAPERS
PRESENTED TOGETHER WITH 7 SHORT PAPERS WERE CAREFULLY REVIEWED AND
SELECTED FROM NUMEROUS SUBMISSIONS. THE COVERED TOPICS COVER MULTIPLE
FACETS OF CYBER SECURITY THAT INCLUDE: RATIONALITY OF ADVERSARY,
GAME-THEORETIC CRYPTOGRAPHIC TECHNIQUES, VULNERABILITY DISCOVERY AND
ASSESSMENT, MULTI-GOAL SECURITY ANALYSIS, SECURE COMPUTATION,
ECONOMIC-ORIENTED SECURITY, AND SURVEILLANCE FOR SECURITY. THOSE ASPECTS
ARE COVERED IN A MULTITUDE OF DOMAINS THAT INCLUDE NETWORKED SYSTEMS,
WIRELESS COMMUNICATIONS, BORDER PATROL SECURITY, AND CONTROL SYSTEMS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT. |
any_adam_object | 1 |
author2 | Poovendran, Radha |
author2_role | edt |
author2_variant | r p rp |
author_facet | Poovendran, Radha |
building | Verbundindex |
bvnumber | BV042174135 |
classification_rvk | SS 4800 |
classification_tum | MAT 920f DAT 461f |
collection | ZDB-2-LNC |
ctrlnum | (OCoLC)894697412 (DE-599)BVBBV042174135 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Mathematik |
doi_str_mv | 10.1007/978-3-319-12601-2 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV042174135</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20170519</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">141107s2014 sz o|||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319126012</subfield><subfield code="c">eISBN</subfield><subfield code="9">978-3-319-12601-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-12601-2</subfield><subfield code="2">doi</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783319126005</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Best.-Nr.: 86384771</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)894697412</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042174135</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">sz</subfield><subfield code="c">XA-CH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22//ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">MAT 920f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Decision and game theory for security</subfield><subfield code="b">5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014 ; proceedings</subfield><subfield code="c">Radha Poovendran ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XI, 379 S.)</subfield><subfield code="c">235 mm x 155 mm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">8840</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Netzwerktopologie</subfield><subfield code="0">(DE-588)4208537-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Spieltheorie</subfield><subfield code="0">(DE-588)4056243-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Netzwerkverwaltung</subfield><subfield code="0">(DE-588)4314339-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Netzwerkverwaltung</subfield><subfield code="0">(DE-588)4314339-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Netzwerktopologie</subfield><subfield code="0">(DE-588)4208537-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Spieltheorie</subfield><subfield code="0">(DE-588)4056243-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="6"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Poovendran, Radha</subfield><subfield code="4">edt</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">GameSec</subfield><subfield code="n">5.</subfield><subfield code="d">2014</subfield><subfield code="c">Los Angeles, Calif.</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1060566567</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">978-3-319-12600-5</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">8840</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">8840</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-12601-2</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027613520&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027613520</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-12601-2</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-12601-2</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-12601-2</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-12601-2</subfield><subfield code="l">DE-859</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-12601-2</subfield><subfield code="l">DE-861</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-12601-2</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-12601-2</subfield><subfield code="l">DE-384</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-12601-2</subfield><subfield code="l">DE-473</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-12601-2</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-12601-2</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-12601-2</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-12601-2</subfield><subfield code="l">DE-29</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-12601-2</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift gnd-content |
genre_facet | Konferenzschrift |
id | DE-604.BV042174135 |
illustrated | Not Illustrated |
indexdate | 2025-01-10T15:18:45Z |
institution | BVB |
institution_GND | (DE-588)1060566567 |
isbn | 9783319126012 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027613520 |
oclc_num | 894697412 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-20 DE-91 DE-BY-TUM DE-706 DE-739 DE-384 DE-M347 DE-703 DE-29 DE-92 DE-859 DE-861 DE-634 |
owner_facet | DE-473 DE-BY-UBG DE-20 DE-91 DE-BY-TUM DE-706 DE-739 DE-384 DE-M347 DE-703 DE-29 DE-92 DE-859 DE-861 DE-634 |
physical | 1 Online-Ressource (XI, 379 S.) 235 mm x 155 mm |
psigel | ZDB-2-LNC |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Decision and game theory for security 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014 ; proceedings Radha Poovendran ... (eds.) Cham Springer 2014 1 Online-Ressource (XI, 379 S.) 235 mm x 155 mm txt rdacontent c rdamedia cr rdacarrier Lecture notes in computer science 8840 Netzwerktopologie (DE-588)4208537-8 gnd rswk-swf Spieltheorie (DE-588)4056243-8 gnd rswk-swf Privatsphäre (DE-588)4123980-5 gnd rswk-swf Eindringerkennung (DE-588)4706627-1 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Trusted Computing (DE-588)7562931-8 gnd rswk-swf Netzwerkverwaltung (DE-588)4314339-8 gnd rswk-swf (DE-588)1071861417 Konferenzschrift gnd-content Netzwerkverwaltung (DE-588)4314339-8 s Netzwerktopologie (DE-588)4208537-8 s Spieltheorie (DE-588)4056243-8 s Kryptoanalyse (DE-588)4830502-9 s Privatsphäre (DE-588)4123980-5 s Trusted Computing (DE-588)7562931-8 s Eindringerkennung (DE-588)4706627-1 s 1\p DE-604 Poovendran, Radha edt GameSec 5. 2014 Los Angeles, Calif. Sonstige (DE-588)1060566567 oth Erscheint auch als Druck-Ausgabe, Paperback 978-3-319-12600-5 Lecture notes in computer science 8840 (DE-604)BV014880109 8840 https://doi.org/10.1007/978-3-319-12601-2 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027613520&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Abstract 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Decision and game theory for security 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014 ; proceedings Lecture notes in computer science Netzwerktopologie (DE-588)4208537-8 gnd Spieltheorie (DE-588)4056243-8 gnd Privatsphäre (DE-588)4123980-5 gnd Eindringerkennung (DE-588)4706627-1 gnd Kryptoanalyse (DE-588)4830502-9 gnd Trusted Computing (DE-588)7562931-8 gnd Netzwerkverwaltung (DE-588)4314339-8 gnd |
subject_GND | (DE-588)4208537-8 (DE-588)4056243-8 (DE-588)4123980-5 (DE-588)4706627-1 (DE-588)4830502-9 (DE-588)7562931-8 (DE-588)4314339-8 (DE-588)1071861417 |
title | Decision and game theory for security 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014 ; proceedings |
title_auth | Decision and game theory for security 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014 ; proceedings |
title_exact_search | Decision and game theory for security 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014 ; proceedings |
title_full | Decision and game theory for security 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014 ; proceedings Radha Poovendran ... (eds.) |
title_fullStr | Decision and game theory for security 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014 ; proceedings Radha Poovendran ... (eds.) |
title_full_unstemmed | Decision and game theory for security 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014 ; proceedings Radha Poovendran ... (eds.) |
title_short | Decision and game theory for security |
title_sort | decision and game theory for security 5th international conference gamesec 2014 los angeles ca usa november 6 7 2014 proceedings |
title_sub | 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014 ; proceedings |
topic | Netzwerktopologie (DE-588)4208537-8 gnd Spieltheorie (DE-588)4056243-8 gnd Privatsphäre (DE-588)4123980-5 gnd Eindringerkennung (DE-588)4706627-1 gnd Kryptoanalyse (DE-588)4830502-9 gnd Trusted Computing (DE-588)7562931-8 gnd Netzwerkverwaltung (DE-588)4314339-8 gnd |
topic_facet | Netzwerktopologie Spieltheorie Privatsphäre Eindringerkennung Kryptoanalyse Trusted Computing Netzwerkverwaltung Konferenzschrift |
url | https://doi.org/10.1007/978-3-319-12601-2 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027613520&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT poovendranradha decisionandgametheoryforsecurity5thinternationalconferencegamesec2014losangelescausanovember672014proceedings AT gameseclosangelescalif decisionandgametheoryforsecurity5thinternationalconferencegamesec2014losangelescausanovember672014proceedings |