Skip to main content
Birkhäuser

Game Theory for Security and Risk Management

From Theory to Practice

  • Book
  • © 2018

Overview

  • Provides a link from theory to practice in security engineering and risk management for practitioners
  • Demonstrates how game-theoretical methods can be implemented for those who are not experts in game theory
  • Covers a diverse range of application domains

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 139.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (16 chapters)

  1. Theory

  2. Practice

  3. Case Studies

Keywords

About this book

The chapters in this volume explore how various methods from game theory can be utilized to optimize security and risk-management strategies.  Emphasizing the importance of connecting theory and practice, they detail the steps involved in selecting, adapting, and analyzing game-theoretic models in security engineering and provide case studies of successful implementations in different application domains.  Practitioners who are not experts in game theory and are uncertain about incorporating it into their work will benefit from this resource, as well as researchers in applied mathematics and computer science interested in current developments and future directions.

The first part of the book presents the theoretical basics, covering various different game-theoretic models related to and suitable for security engineering.  The second part then shows how these models are adopted, implemented, and analyzed.  Surveillance systems, interconnected networks, and power grids are among the different application areas discussed.  Finally, in the third part, case studies from business and industry of successful applications of game-theoretic models are presented, and the range of applications discussed is expanded to include such areas as cloud computing, Internet of Things, and water utility networks.

Reviews

“The volume may be interested both for mathematicians and engineers looking for applications of their knowledge in economy and managers who have to solve practical risk and security problems arising in real life.” (Andrzej Świerniak, zbMATH 1422.91033, 2019)

Editors and Affiliations

  • Institute of Applied Informatics, University of Klagenfurt, Klagenfurt, Austria

    Stefan Rass

  • Center for Digital Safety & Security, Austrian Institute of Techno GmbH, Klagenfurt, Austria

    Stefan Schauer

Bibliographic Information

Publish with us