National Science Library of Georgia

Image from Google Jackets

Network security : a decision and game-theoretic approach / Tansu Alpcan, Tamer Başar.

By: Contributor(s): Material type: TextTextPublisher: Cambridge : Cambridge University Press, 2010Description: 1 online resource (xiv, 314 pages) : digital, PDF file(s)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9780511760778 (ebook)
Subject(s): Additional physical formats: Print version: : No titleDDC classification:
  • 005.8 22
LOC classification:
  • TK5105.59 .A45 2010
Online resources:
Contents:
Machine generated contents note: Preface; Notation; Part I. Introduction: 1. Introduction; 2. Network security concepts; Part II. Security Games: 3. Deterministic security games; 4. Stochastic security games; 5. Security games with information limitations; Part III. Decision Making for Network Security: 6. Security risk management; 7. Resource allocation for security; 8. Usability, trust, and privacy; Part IV. Security Attack and Intrusion Detection: 9. Machine learning for intrusion and anomaly detection; 10. Hypothesis testing for attack detection; A. Optimization, game theory, and optimal & robust control; References; Index.
Summary: Covering attack detection, malware response, algorithm and mechanism design, privacy, and risk management, this comprehensive work applies unique quantitative models derived from decision, control, and game theories to understanding diverse network security problems. It provides the reader with a system-level theoretical understanding of network security, and is essential reading for researchers interested in a quantitative approach to key incentive and resource allocation issues in the field. It also provides practitioners with an analytical foundation that is useful for formalising decision-making processes in network security.
Tags from this library: No tags from this library for this title. Log in to add tags.
No physical items for this record

Title from publisher's bibliographic system (viewed on 05 Oct 2015).

Machine generated contents note: Preface; Notation; Part I. Introduction: 1. Introduction; 2. Network security concepts; Part II. Security Games: 3. Deterministic security games; 4. Stochastic security games; 5. Security games with information limitations; Part III. Decision Making for Network Security: 6. Security risk management; 7. Resource allocation for security; 8. Usability, trust, and privacy; Part IV. Security Attack and Intrusion Detection: 9. Machine learning for intrusion and anomaly detection; 10. Hypothesis testing for attack detection; A. Optimization, game theory, and optimal & robust control; References; Index.

Covering attack detection, malware response, algorithm and mechanism design, privacy, and risk management, this comprehensive work applies unique quantitative models derived from decision, control, and game theories to understanding diverse network security problems. It provides the reader with a system-level theoretical understanding of network security, and is essential reading for researchers interested in a quantitative approach to key incentive and resource allocation issues in the field. It also provides practitioners with an analytical foundation that is useful for formalising decision-making processes in network security.

There are no comments on this title.

to post a comment.
Copyright © 2023 Sciencelib.ge All rights reserved.