Editors:
- Includes supplementary material: sn.pub/extras
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 9406)
Part of the book sub series: Security and Cryptology (LNSC)
Conference series link(s): GameSec: International Conference on Decision and Game Theory for Security
Conference proceedings info: GameSec 2015.
Buy it now
Buying options
Tax calculation will be finalised at checkout
Other ways to access
This is a preview of subscription content, log in via an institution to check for access.
Table of contents (21 papers)
-
Front Matter
-
Full Papers
-
Front Matter
-
-
Short Papers
-
Front Matter
-
About this book
This book constitutes the refereed proceedings of the 6th International Conference on Decision and Game Theory for Security, GameSec 2015, held in London, UK, in November 2015.
The 16 revised full papers presented together with 5 short papers were carefully reviewed and selected from 37 submissions. Game and decision theory has emerged as a valuable systematic framework with powerful analytical tools in dealing with the intricacies involved in making sound and sensible security decisions. For instance, game theory provides methodical approaches to account for interdependencies of security decisions, the role of hidden and asymmetric information, the perception of risks and costs in human behaviour, the incentives/limitations of the attackers, and much more. Combined with our classical approach to computer and network security, and drawing from various fields such as economic, social and behavioural sciences, game and decision theory is playing a fundamental role in the development of the pillars of the "science of security".
Keywords
- Application security
- Decision analysis
- Network security
- Risk management
- Software security
- Algorithmic game theory
- Attacker-defender games
- Cloud computing
- Cyber defense
- Cyber security
- Cyberwarfare
- Human and societal aspects of security and privacy
- Incentive schemes
- Intrusion/anomaly detection and malware mitigation
- Mathematical optimization
- Mechanism design
- Optimization
- Simulation
- Social network sites
- Trust and incentive schemes
Editors and Affiliations
-
Queen Mary University of London, London, United Kingdom
MHR Khouzani
-
University of Brighton, Brighton, United Kingdom
Emmanouil Panaousis
-
Cardiff University, Cardiff, United Kingdom
George Theodorakopoulos
Bibliographic Information
Book Title: Decision and Game Theory for Security
Book Subtitle: 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedings
Editors: MHR Khouzani, Emmanouil Panaousis, George Theodorakopoulos
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-319-25594-1
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer International Publishing Switzerland 2015
Softcover ISBN: 978-3-319-25593-4Published: 12 November 2015
eBook ISBN: 978-3-319-25594-1Published: 11 November 2015
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: X, 371
Number of Illustrations: 90 illustrations in colour
Topics: Information Systems Applications (incl. Internet), Computer Communication Networks, Systems and Data Security, Algorithm Analysis and Problem Complexity, Management of Computing and Information Systems, Game Theory, Economics, Social and Behav. Sciences