9783642252792-3642252796-Decision and Game Theory for Security: Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011, Proceedings (Lecture Notes in Computer Science, 7037)

Decision and Game Theory for Security: Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011, Proceedings (Lecture Notes in Computer Science, 7037)

ISBN-13: 9783642252792
ISBN-10: 3642252796
Edition: 2011
Author: John S. Baras, Jonathan Katz, Eitan Altman
Publication date: 2011
Publisher: Springer
Format: Paperback 269 pages
FREE US shipping
Buy

From $21.00

Book details

ISBN-13: 9783642252792
ISBN-10: 3642252796
Edition: 2011
Author: John S. Baras, Jonathan Katz, Eitan Altman
Publication date: 2011
Publisher: Springer
Format: Paperback 269 pages

Summary

Decision and Game Theory for Security: Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011, Proceedings (Lecture Notes in Computer Science, 7037) (ISBN-13: 9783642252792 and ISBN-10: 3642252796), written by authors John S. Baras, Jonathan Katz, Eitan Altman, was published by Springer in 2011. With an overall rating of 3.8 stars, it's a notable title among other books. You can easily purchase or rent Decision and Game Theory for Security: Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011, Proceedings (Lecture Notes in Computer Science, 7037) (Paperback) from BooksRun, along with many other new and used books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.3.

Description

This book constitutes the refereed proceedings of the Second International Conference on Decision and Game Theory for Security, GameSec 2011, held in College Park, Maryland, USA, in November 2011. The 16 revised full papers and 2 plenary keynotes presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on attacks, adversaries, and game theory, wireless adhoc and sensor networks, network games, security insurance, security and trust in social networks and security investments.

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book