Game Theory for Security and Risk Management

From Theory to Practice

  • Stefan Rass
  • Stefan Schauer

Table of contents

  1. Front Matter
    Pages i-xxxii
  2. Theory

    1. Front Matter
      Pages 1-1
    2. Lisa Rajbhandari, Einar Snekkenes
      Pages 3-19
    3. Mohammad Rasouli, Erik Miehling, Demosthenis Teneketzis
      Pages 75-98
    4. Linan Huang, Juntao Chen, Quanyan Zhu
      Pages 99-126
  3. Practice

    1. Front Matter
      Pages 127-127
    2. Ali Alshawish, Mohamed Amine Abid, Hermann de Meer, Stefan Schauer, Sandra König, Antonios Gouglidis et al.
      Pages 129-156
    3. Ashish R. Hota, Abraham A. Clements, Saurabh Bagchi, Shreyas Sundaram
      Pages 157-184
    4. Sandra König, Antonios Gouglidis
      Pages 185-201
  4. Case Studies

    1. Front Matter
      Pages 251-251
    2. Charles A. Kamhoua, Luke Kwiat, Kevin A. Kwiat, Joon S. Park, Ming Zhao, Manuel Rodriguez
      Pages 253-284
    3. Antonios Gouglidis, Sandra König, Benjamin Green, Karl Rossegger, David Hutchison
      Pages 313-333
    4. Sandra König, Antonios Gouglidis, Benjamin Green, Alma Solar
      Pages 335-351
    5. Ali Alshawish, Mohamed Amine Abid, Hermann de Meer
      Pages 353-389
    6. Alberto Zambrano, Santiago Caceres, Ana Isabel Martinez
      Pages 391-418

About this book


The chapters in this volume explore how various methods from game theory can be utilized to optimize security and risk-management strategies.  Emphasizing the importance of connecting theory and practice, they detail the steps involved in selecting, adapting, and analyzing game-theoretic models in security engineering and provide case studies of successful implementations in different application domains.  Practitioners who are not experts in game theory and are uncertain about incorporating it into their work will benefit from this resource, as well as researchers in applied mathematics and computer science interested in current developments and future directions.

The first part of the book presents the theoretical basics, covering various different game-theoretic models related to and suitable for security engineering.  The second part then shows how these models are adopted, implemented, and analyzed.  Surveillance systems, interconnected networks, and power grids are among the different application areas discussed.  Finally, in the third part, case studies from business and industry of successful applications of game-theoretic models are presented, and the range of applications discussed is expanded to include such areas as cloud computing, Internet of Things, and water utility networks.


Game Theory Decision Support Risk Management Reasoning under Uncertainty Optimal Security Strategies

Editors and affiliations

  1. 1.Institute of Applied InformaticsUniversity of KlagenfurtKlagenfurtAustria
  2. 2.Center for Digital Safety & SecurityAustrian Institute of Techno GmbHKlagenfurtAustria

Bibliographic information

  • DOI
  • Copyright Information Springer International Publishing AG, part of Springer Nature 2018
  • Publisher Name Birkhäuser, Cham
  • eBook Packages Mathematics and Statistics
  • Print ISBN 978-3-319-75267-9
  • Online ISBN 978-3-319-75268-6
  • Series Print ISSN 2363-8516
  • Series Online ISSN 2363-8524
  • Buy this book on publisher's site
Industry Sectors
Finance, Business & Banking