語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Dynamic games for network security
~
Dai, Huaiyu.
Dynamic games for network security
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Dynamic games for network securityby Xiaofan He, Huaiyu Dai.
作者:
He, Xiaofan.
其他作者:
Dai, Huaiyu.
出版者:
Cham :Springer International Publishing :2018.
面頁冊數:
x, 74 p. :ill., digital ;24 cm.
Contained By:
Springer eBooks
標題:
Computer networksSecurity measures.
電子資源:
https://doi.org/10.1007/978-3-319-75871-8
ISBN:
9783319758718$q(electronic bk.)
Dynamic games for network security
He, Xiaofan.
Dynamic games for network security
[electronic resource] /by Xiaofan He, Huaiyu Dai. - Cham :Springer International Publishing :2018. - x, 74 p. :ill., digital ;24 cm. - SpringerBriefs in electrical and computer engineering,2191-8112. - SpringerBriefs in electrical and computer engineering..
The goal of this SpringerBrief is to collect and systematically present the state-of-the-art in this research field and the underlying game-theoretic and learning tools to the broader audience with general network security and engineering backgrounds. Particularly, the exposition of this book begins with a brief introduction of relevant background knowledge in Chapter 1, followed by a review of existing applications of SG in addressing various dynamic network security problems in Chapter 2. A detailed treatment of dynamic security games with information asymmetry is given in Chapters 3-5. Specifically, dynamic security games with extra information that concerns security competitions, where the defender has an informational advantage over the adversary are discussed in Chapter 3. The complementary scenarios where the defender lacks information about the adversary is examined in Chapter 4 through the lens of incomplete information SG. Chapter 5 is devoted to the exploration of how to proactively create information asymmetry for the defender's benefit. The primary audience for this brief includes network engineers interested in security decision-making in dynamic network security problems. Researchers interested in the state-of-the-art research on stochastic game theory and its applications in network security will be interested in this SpringerBrief as well. Also graduate and undergraduate students interested in obtaining comprehensive information on stochastic game theory and applying it to address relevant research problems can use this SpringerBrief as a study guide. Lastly, concluding remarks and our perspective for future works are presented in Chapter 6.
ISBN: 9783319758718$q(electronic bk.)
Standard No.: 10.1007/978-3-319-75871-8doiSubjects--Topical Terms:
185597
Computer networks
--Security measures.
LC Class. No.: TK5105.59 / .H4 2018
Dewey Class. No.: 005.8
Dynamic games for network security
LDR
:02694nmm a2200325 a 4500
001
568690
003
DE-He213
005
20191220130536.0
006
m d
007
cr nn 008maaau
008
200707s2018 sz s 0 eng d
020
$a
9783319758718$q(electronic bk.)
020
$a
9783319758701$q(paper)
024
7
$a
10.1007/978-3-319-75871-8
$2
doi
035
$a
978-3-319-75871-8
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK5105.59
$b
.H4 2018
072
7
$a
TJK
$2
bicssc
072
7
$a
TEC041000
$2
bisacsh
072
7
$a
TJK
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
TK5105.59
$b
.H432 2018
100
1
$a
He, Xiaofan.
$3
809623
245
1 0
$a
Dynamic games for network security
$h
[electronic resource] /
$c
by Xiaofan He, Huaiyu Dai.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2018.
300
$a
x, 74 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
SpringerBriefs in electrical and computer engineering,
$x
2191-8112
520
$a
The goal of this SpringerBrief is to collect and systematically present the state-of-the-art in this research field and the underlying game-theoretic and learning tools to the broader audience with general network security and engineering backgrounds. Particularly, the exposition of this book begins with a brief introduction of relevant background knowledge in Chapter 1, followed by a review of existing applications of SG in addressing various dynamic network security problems in Chapter 2. A detailed treatment of dynamic security games with information asymmetry is given in Chapters 3-5. Specifically, dynamic security games with extra information that concerns security competitions, where the defender has an informational advantage over the adversary are discussed in Chapter 3. The complementary scenarios where the defender lacks information about the adversary is examined in Chapter 4 through the lens of incomplete information SG. Chapter 5 is devoted to the exploration of how to proactively create information asymmetry for the defender's benefit. The primary audience for this brief includes network engineers interested in security decision-making in dynamic network security problems. Researchers interested in the state-of-the-art research on stochastic game theory and its applications in network security will be interested in this SpringerBrief as well. Also graduate and undergraduate students interested in obtaining comprehensive information on stochastic game theory and applying it to address relevant research problems can use this SpringerBrief as a study guide. Lastly, concluding remarks and our perspective for future works are presented in Chapter 6.
650
0
$a
Computer networks
$x
Security measures.
$3
185597
650
0
$a
Game theory.
$3
182956
650
1 4
$a
Communications Engineering, Networks.
$3
273745
650
2 4
$a
Security.
$3
760527
700
1
$a
Dai, Huaiyu.
$3
809624
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
830
0
$a
SpringerBriefs in electrical and computer engineering.
$3
557682
856
4 0
$u
https://doi.org/10.1007/978-3-319-75871-8
950
$a
Engineering (Springer-11647)
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000177132
電子館藏
1圖書
電子書
EB TK5105.59 .H432 2018 2018
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
https://doi.org/10.1007/978-3-319-75871-8
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入