Adversarial and uncertain reasoning for adaptive cyber defense: control- and game-theoretic approaches to cyber security
Gespeichert in:
Weitere Verfasser: | , , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cham
Springer
[2019]
|
Schriftenreihe: | Lecture notes in computer science
11830 |
Schlagworte: | |
Online-Zugang: | BTU01 FHA01 FHI01 FHM01 FHN01 FHR01 FKE01 FLA01 FRO01 FWS01 FWS02 HTW01 TUM01 UBG01 UBM01 UBR01 UBT01 UBW01 UBY01 UER01 UPA01 Volltext Buchcover |
Beschreibung: | 1 Online-Ressource (vii, 263 Seiten) 120 Illustrationen, 45 in Farbe |
ISBN: | 9783030307196 |
DOI: | 10.1007/978-3-030-30719-6 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV046137503 | ||
003 | DE-604 | ||
005 | 20201130 | ||
007 | cr|uuu---uuuuu | ||
008 | 190903s2019 |||| o||u| ||||||eng d | ||
020 | |a 9783030307196 |c Online |9 978-3-030-30719-6 | ||
024 | 7 | |a 10.1007/978-3-030-30719-6 |2 doi | |
035 | |a (ZDB-2-SCS)9783030307196 | ||
035 | |a (ZDB-2-LNC)9783030307196 | ||
035 | |a (OCoLC)1119019549 | ||
035 | |a (DE-599)BVBBV046137503 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-355 |a DE-860 |a DE-91 |a DE-19 |a DE-Aug4 |a DE-898 |a DE-861 |a DE-523 |a DE-859 |a DE-473 |a DE-29 |a DE-863 |a DE-20 |a DE-862 |a DE-92 |a DE-573 |a DE-M347 |a DE-703 |a DE-706 |a DE-739 |a DE-634 | ||
082 | 0 | |a 364.168 |2 23 | |
082 | 0 | |a 005.8 |2 23 | |
084 | |a SS 4800 |0 (DE-625)143528: |2 rvk | ||
084 | |a DAT 000 |2 stub | ||
245 | 1 | 0 | |a Adversarial and uncertain reasoning for adaptive cyber defense |b control- and game-theoretic approaches to cyber security |c Sushil Jajodia, George Cybenko, Peng Liu, Cliff Wang, Michael Wellman (Eds.) |
264 | 1 | |a Cham |b Springer |c [2019] | |
300 | |a 1 Online-Ressource (vii, 263 Seiten) |b 120 Illustrationen, 45 in Farbe | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 11830 |a Security and cryptology | |
650 | 4 | |a Computer Crime | |
650 | 4 | |a Computer Systems Organization and Communication Networks | |
650 | 4 | |a Computing Milieux | |
650 | 4 | |a Information Systems and Communication Service | |
650 | 4 | |a Probability and Statistics in Computer Science | |
650 | 4 | |a Computer crimes | |
650 | 4 | |a Computer network architectures | |
650 | 4 | |a Computer science | |
650 | 4 | |a Information systems | |
700 | 1 | |a Jajodia, Sushil |d 1947- |0 (DE-588)120551683 |4 edt | |
700 | 1 | |a Cybenko, George |4 edt | |
700 | 1 | |a Liu, Peng |d 1970- |0 (DE-588)1072570947 |4 edt | |
700 | 1 | |a Wang, Cliff |4 edt | |
700 | 1 | |a Wellman, Michael |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-030-30718-9 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-030-30720-2 |
830 | 0 | |a Lecture notes in computer science |v 11830 |w (DE-604)BV014880109 |9 11830 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-030-30719-6 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
856 | 4 | 2 | |m SWB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=031517803&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Buchcover |
912 | |a ZDB-2-SCS |a ZDB-2-LNC | ||
940 | 1 | |q ZDB-2-SCS_2019 | |
940 | 1 | |q ZDB-2-LNC_2019 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-031517803 | ||
966 | e | |u https://doi.org/10.1007/978-3-030-30719-6 |l BTU01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-30719-6 |l FHA01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-30719-6 |l FHI01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-30719-6 |l FHM01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-30719-6 |l FHN01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-30719-6 |l FHR01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-30719-6 |l FKE01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-30719-6 |l FLA01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-30719-6 |l FRO01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-30719-6 |l FWS01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-30719-6 |l FWS02 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-30719-6 |l HTW01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-30719-6 |l TUM01 |p ZDB-2-LNC |q ZDB-2-LNC_2019 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-30719-6 |l UBG01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-30719-6 |l UBM01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-30719-6 |l UBR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-30719-6 |l UBT01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-30719-6 |l UBW01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-30719-6 |l UBY01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-30719-6 |l UER01 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-30719-6 |l UPA01 |p ZDB-2-LNC |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 735362 |
---|---|
_version_ | 1806189373903863808 |
any_adam_object | 1 |
author2 | Jajodia, Sushil 1947- Cybenko, George Liu, Peng 1970- Wang, Cliff Wellman, Michael |
author2_role | edt edt edt edt edt |
author2_variant | s j sj g c gc p l pl c w cw m w mw |
author_GND | (DE-588)120551683 (DE-588)1072570947 |
author_facet | Jajodia, Sushil 1947- Cybenko, George Liu, Peng 1970- Wang, Cliff Wellman, Michael |
building | Verbundindex |
bvnumber | BV046137503 |
classification_rvk | SS 4800 |
classification_tum | DAT 000 |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (ZDB-2-SCS)9783030307196 (ZDB-2-LNC)9783030307196 (OCoLC)1119019549 (DE-599)BVBBV046137503 |
dewey-full | 364.168 005.8 |
dewey-hundreds | 300 - Social sciences 000 - Computer science, information, general works |
dewey-ones | 364 - Criminology 005 - Computer programming, programs, data, security |
dewey-raw | 364.168 005.8 |
dewey-search | 364.168 005.8 |
dewey-sort | 3364.168 |
dewey-tens | 360 - Social problems and services; associations 000 - Computer science, information, general works |
discipline | Rechtswissenschaft Informatik |
doi_str_mv | 10.1007/978-3-030-30719-6 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04661nmm a2200853zcb4500</leader><controlfield tag="001">BV046137503</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20201130 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190903s2019 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783030307196</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-030-30719-6</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-030-30719-6</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)9783030307196</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-LNC)9783030307196</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1119019549</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046137503</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">364.168</subfield><subfield code="2">23</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SS 4800</subfield><subfield code="0">(DE-625)143528:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Adversarial and uncertain reasoning for adaptive cyber defense</subfield><subfield code="b">control- and game-theoretic approaches to cyber security</subfield><subfield code="c">Sushil Jajodia, George Cybenko, Peng Liu, Cliff Wang, Michael Wellman (Eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">[2019]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (vii, 263 Seiten)</subfield><subfield code="b">120 Illustrationen, 45 in Farbe</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">11830</subfield><subfield code="a">Security and cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Crime</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Systems Organization and Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computing Milieux</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Systems and Communication Service</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Probability and Statistics in Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer network architectures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information systems</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jajodia, Sushil</subfield><subfield code="d">1947-</subfield><subfield code="0">(DE-588)120551683</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cybenko, George</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Liu, Peng</subfield><subfield code="d">1970-</subfield><subfield code="0">(DE-588)1072570947</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wang, Cliff</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wellman, Michael</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-030-30718-9</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-030-30720-2</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">11830</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">11830</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-030-30719-6</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">SWB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=031517803&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Buchcover</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2019</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-LNC_2019</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031517803</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-30719-6</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-30719-6</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-30719-6</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-30719-6</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-30719-6</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-30719-6</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-30719-6</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-30719-6</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-30719-6</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-30719-6</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-30719-6</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-30719-6</subfield><subfield code="l">HTW01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-30719-6</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="q">ZDB-2-LNC_2019</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-30719-6</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-30719-6</subfield><subfield code="l">UBM01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-30719-6</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-30719-6</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-30719-6</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-30719-6</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-30719-6</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-30719-6</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046137503 |
illustrated | Not Illustrated |
indexdate | 2024-08-01T14:46:56Z |
institution | BVB |
isbn | 9783030307196 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031517803 |
oclc_num | 1119019549 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-860 DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-523 DE-859 DE-473 DE-BY-UBG DE-29 DE-863 DE-BY-FWS DE-20 DE-862 DE-BY-FWS DE-92 DE-573 DE-M347 DE-703 DE-706 DE-739 DE-634 |
owner_facet | DE-355 DE-BY-UBR DE-860 DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-523 DE-859 DE-473 DE-BY-UBG DE-29 DE-863 DE-BY-FWS DE-20 DE-862 DE-BY-FWS DE-92 DE-573 DE-M347 DE-703 DE-706 DE-739 DE-634 |
physical | 1 Online-Ressource (vii, 263 Seiten) 120 Illustrationen, 45 in Farbe |
psigel | ZDB-2-SCS ZDB-2-LNC ZDB-2-SCS_2019 ZDB-2-LNC_2019 ZDB-2-LNC ZDB-2-LNC_2019 |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science Security and cryptology |
spellingShingle | Adversarial and uncertain reasoning for adaptive cyber defense control- and game-theoretic approaches to cyber security Lecture notes in computer science Computer Crime Computer Systems Organization and Communication Networks Computing Milieux Information Systems and Communication Service Probability and Statistics in Computer Science Computer crimes Computer network architectures Computer science Information systems |
title | Adversarial and uncertain reasoning for adaptive cyber defense control- and game-theoretic approaches to cyber security |
title_auth | Adversarial and uncertain reasoning for adaptive cyber defense control- and game-theoretic approaches to cyber security |
title_exact_search | Adversarial and uncertain reasoning for adaptive cyber defense control- and game-theoretic approaches to cyber security |
title_full | Adversarial and uncertain reasoning for adaptive cyber defense control- and game-theoretic approaches to cyber security Sushil Jajodia, George Cybenko, Peng Liu, Cliff Wang, Michael Wellman (Eds.) |
title_fullStr | Adversarial and uncertain reasoning for adaptive cyber defense control- and game-theoretic approaches to cyber security Sushil Jajodia, George Cybenko, Peng Liu, Cliff Wang, Michael Wellman (Eds.) |
title_full_unstemmed | Adversarial and uncertain reasoning for adaptive cyber defense control- and game-theoretic approaches to cyber security Sushil Jajodia, George Cybenko, Peng Liu, Cliff Wang, Michael Wellman (Eds.) |
title_short | Adversarial and uncertain reasoning for adaptive cyber defense |
title_sort | adversarial and uncertain reasoning for adaptive cyber defense control and game theoretic approaches to cyber security |
title_sub | control- and game-theoretic approaches to cyber security |
topic | Computer Crime Computer Systems Organization and Communication Networks Computing Milieux Information Systems and Communication Service Probability and Statistics in Computer Science Computer crimes Computer network architectures Computer science Information systems |
topic_facet | Computer Crime Computer Systems Organization and Communication Networks Computing Milieux Information Systems and Communication Service Probability and Statistics in Computer Science Computer crimes Computer network architectures Computer science Information systems |
url | https://doi.org/10.1007/978-3-030-30719-6 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=031517803&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT jajodiasushil adversarialanduncertainreasoningforadaptivecyberdefensecontrolandgametheoreticapproachestocybersecurity AT cybenkogeorge adversarialanduncertainreasoningforadaptivecyberdefensecontrolandgametheoreticapproachestocybersecurity AT liupeng adversarialanduncertainreasoningforadaptivecyberdefensecontrolandgametheoreticapproachestocybersecurity AT wangcliff adversarialanduncertainreasoningforadaptivecyberdefensecontrolandgametheoreticapproachestocybersecurity AT wellmanmichael adversarialanduncertainreasoningforadaptivecyberdefensecontrolandgametheoreticapproachestocybersecurity |