Cargando…

Game theory for security and risk management: from theory to practice

The chapters in this volume explore how various methods from game theory can be utilized to optimize security and risk-management strategies.  Emphasizing the importance of connecting theory and practice, they detail the steps involved in selecting, adapting, and analyzing game-theoretic models in s...

Descripción completa

Detalles Bibliográficos
Autores principales: Rass, Stefan, Schauer, Stefan
Lenguaje:eng
Publicado: Springer 2018
Materias:
Acceso en línea:https://dx.doi.org/10.1007/978-3-319-75268-6
http://cds.cern.ch/record/2633948
_version_ 1780959667989512192
author Rass, Stefan
Schauer, Stefan
author_facet Rass, Stefan
Schauer, Stefan
author_sort Rass, Stefan
collection CERN
description The chapters in this volume explore how various methods from game theory can be utilized to optimize security and risk-management strategies.  Emphasizing the importance of connecting theory and practice, they detail the steps involved in selecting, adapting, and analyzing game-theoretic models in security engineering and provide case studies of successful implementations in different application domains.  Practitioners who are not experts in game theory and are uncertain about incorporating it into their work will benefit from this resource, as well as researchers in applied mathematics and computer science interested in current developments and future directions. The first part of the book presents the theoretical basics, covering various different game-theoretic models related to and suitable for security engineering.  The second part then shows how these models are adopted, implemented, and analyzed.  Surveillance systems, interconnected networks, and power grids are among the different application areas discussed.  Finally, in the third part, case studies from business and industry of successful applications of game-theoretic models are presented, and the range of applications discussed is expanded to include such areas as cloud computing, Internet of Things, and water utility networks.
id cern-2633948
institution Organización Europea para la Investigación Nuclear
language eng
publishDate 2018
publisher Springer
record_format invenio
spelling cern-26339482021-04-21T18:44:52Zdoi:10.1007/978-3-319-75268-6http://cds.cern.ch/record/2633948engRass, StefanSchauer, StefanGame theory for security and risk management: from theory to practiceMathematical Physics and MathematicsThe chapters in this volume explore how various methods from game theory can be utilized to optimize security and risk-management strategies.  Emphasizing the importance of connecting theory and practice, they detail the steps involved in selecting, adapting, and analyzing game-theoretic models in security engineering and provide case studies of successful implementations in different application domains.  Practitioners who are not experts in game theory and are uncertain about incorporating it into their work will benefit from this resource, as well as researchers in applied mathematics and computer science interested in current developments and future directions. The first part of the book presents the theoretical basics, covering various different game-theoretic models related to and suitable for security engineering.  The second part then shows how these models are adopted, implemented, and analyzed.  Surveillance systems, interconnected networks, and power grids are among the different application areas discussed.  Finally, in the third part, case studies from business and industry of successful applications of game-theoretic models are presented, and the range of applications discussed is expanded to include such areas as cloud computing, Internet of Things, and water utility networks.Springeroai:cds.cern.ch:26339482018
spellingShingle Mathematical Physics and Mathematics
Rass, Stefan
Schauer, Stefan
Game theory for security and risk management: from theory to practice
title Game theory for security and risk management: from theory to practice
title_full Game theory for security and risk management: from theory to practice
title_fullStr Game theory for security and risk management: from theory to practice
title_full_unstemmed Game theory for security and risk management: from theory to practice
title_short Game theory for security and risk management: from theory to practice
title_sort game theory for security and risk management: from theory to practice
topic Mathematical Physics and Mathematics
url https://dx.doi.org/10.1007/978-3-319-75268-6
http://cds.cern.ch/record/2633948
work_keys_str_mv AT rassstefan gametheoryforsecurityandriskmanagementfromtheorytopractice
AT schauerstefan gametheoryforsecurityandriskmanagementfromtheorytopractice