Advertisement

Decision and Game Theory for Security

Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings

  • Jens Grossklags
  • Jean Walrand
Conference proceedings GameSec 2012

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7638)

Table of contents

  1. Front Matter
  2. Secret Communications

    1. Benjamin Johnson, Pascal Schöttle, Rainer Böhme
      Pages 1-17
    2. Mehrdad Nojoumian, Douglas R. Stinson
      Pages 18-37
  3. Identification of Attackers

    1. Jeremiah Blocki, Nicolas Christin, Anupam Datta, Arunesh Sinha
      Pages 38-59
    2. SingRu (Celine) Hoe, Murat Kantarcioglu, Alain Bensoussan
      Pages 60-77
    3. Lemonia Dritsoula, Patrick Loiseau, John Musacchio
      Pages 78-97
  4. Multi-step Attacks

    1. Ahto Buldas, Roman Stepanenko
      Pages 98-117
    2. Alan Nochenson, C. F. Larry Heimann
      Pages 138-151
  5. Network Security

    1. Andrew Clark, Quanyan Zhu, Radha Poovendran, Tamer Başar
      Pages 171-185
  6. System Defense

    1. Radek Píbil, Viliam Lisý, Christopher Kiekintveld, Branislav Bošanský, Michal Pěchouček
      Pages 201-220
    2. Viet Pham, Carlos Cid
      Pages 234-247
    3. Kevin D. Bowers, Marten van Dijk, Robert Griffin, Ari Juels, Alina Oprea, Ronald L. Rivest et al.
      Pages 248-263
  7. Applications Security

    1. Saurabh Amin, Galina A. Schwartz, Hamidou Tembine
      Pages 264-280
    2. Yee Wei Law, Tansu Alpcan, Marimuthu Palaniswami, Subhrakanti Dey
      Pages 281-295
  8. Back Matter

About these proceedings

Introduction

This book constitutes the refereed proceedings of the Third International Conference on Decision and Game Theory for Security, GameSec 2012, held in Budapest, Hungary, in November 2012.
The 18 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on secret communications, identification of attackers, multi-step attacks, network security, system defense, and applications security.

Keywords

agent-based modeling computational complexity information hiding routing algorithms steganography

Editors and affiliations

  • Jens Grossklags
    • 1
  • Jean Walrand
    • 2
  1. 1.College of Information Sciences and TechnologyThe Pennsylvania State UniversityUniversity Park,USA
  2. 2.Department of Electrical Engineering and Computer SciencesUniversity of CaliforniaBerkeleyUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-34266-0
  • Copyright Information Springer-Verlag Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-34265-3
  • Online ISBN 978-3-642-34266-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Pharma
Biotechnology
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Energy, Utilities & Environment
Engineering