HOME > Detail View

Detail View

Network security : a decision and game-theoretic approach

Network security : a decision and game-theoretic approach (Loan 3 times)

Material type
단행본
Personal Author
Alpcan, Tansu, 1975-. Basar, Tamer.
Title Statement
Network security : a decision and game-theoretic approach / Tansu Alpcan, Tamer Basar.
Publication, Distribution, etc
Cambridge ;   New York :   Cambridge University Press,   2011.  
Physical Medium
xiv, 314 p. : ill. ; 26 cm.
ISBN
9780521119320 (hardback)
요약
"Covering attack detection, malware response, algorithm and mechanism design, privacy, and risk management, this comprehensive work applies unique quantitative models derived from decision, control, and game theories to understanding diverse network security problems. It provides the reader with a system-level theoretical understanding of network security, and is essential reading for researchers interested in a quantitative approach to key incentive and resource allocation issues in the field. It also provides practitioners with an analytical foundation that is useful for formalising decision-making processes in network security"--
Bibliography, Etc. Note
Includes bibliographical references (p. [302]-311) and index.
Subject Added Entry-Topical Term
Computer networks -- Security measures. Game theory.
000 02229camuu2200301 a 4500
001 000045815973
005 20141118095108
008 141117s2011 enka b 001 0 eng
010 ▼a 2010027364
020 ▼a 9780521119320 (hardback)
035 ▼a (KERIS)REF000015933359
040 ▼a DLC ▼c DLC ▼d DLC ▼d 211009
050 0 0 ▼a TK5105.59 ▼b .A45 2010
082 0 0 ▼a 005.8 ▼2 23
084 ▼a 005.8 ▼2 DDCK
090 ▼a 005.8 ▼b A456n
100 1 ▼a Alpcan, Tansu, ▼d 1975-.
245 1 0 ▼a Network security : ▼b a decision and game-theoretic approach / ▼c Tansu Alpcan, Tamer Basar.
260 ▼a Cambridge ; ▼a New York : ▼b Cambridge University Press, ▼c 2011.
300 ▼a xiv, 314 p. : ▼b ill. ; ▼c 26 cm.
504 ▼a Includes bibliographical references (p. [302]-311) and index.
520 ▼a "Covering attack detection, malware response, algorithm and mechanism design, privacy, and risk management, this comprehensive work applies unique quantitative models derived from decision, control, and game theories to understanding diverse network security problems. It provides the reader with a system-level theoretical understanding of network security, and is essential reading for researchers interested in a quantitative approach to key incentive and resource allocation issues in the field. It also provides practitioners with an analytical foundation that is useful for formalising decision-making processes in network security"-- ▼c Provided by publisher.
520 ▼a "Network security is an important, challenging, and multi-dimensional research field.In its study, theory and practice should function together as parts of a feedback loop.Game, optimization, and control theories, among others, provide a mathematical foundation to formalize the multitude of decision-making processes in network security. The analytical approaches and quantitative frameworks presented lead to better allocation of limited resources and result in more informed responses to security problems in complex networked systems and organizations"-- ▼c Provided by publisher.
650 0 ▼a Computer networks ▼x Security measures.
650 0 ▼a Game theory.
700 1 ▼a Basar, Tamer.
945 ▼a KLPA

Holdings Information

No. Location Call Number Accession No. Availability Due Date Make a Reservation Service
No. 1 Location Science & Engineering Library/Sci-Info(Stacks2)/ Call Number 005.8 A456n Accession No. 121231334 Availability Available Due Date Make a Reservation Service B M

Contents information

Table of Contents

Preface; Notation; Part I. Introduction: 1. Introduction; 2. Network security concepts; Part II. Security Games: 3. Deterministic security games; 4. Stochastic security games; 5. Security games with information limitations; Part III. Decision Making for Network Security: 6. Security risk management; 7. Resource allocation for security; 8. Usability, trust, and privacy; Part IV. Security Attack and Intrusion Detection: 9. Machine learning for intrusion and anomaly detection; 10. Hypothesis testing for attack detection; A. Optimization, game theory, and optimal & robust control; References; Index.


Information Provided By: : Aladin

New Arrivals Books in Related Fields

Ramamurthy, Bina (2021)
윤관식 (2020)