
Game Theory for Security and Risk Management
From Theory to Practice
Series: Static & Dynamic Game Theory: Foundations & Applications;
- Publisher's listprice EUR 139.09
-
The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.
- Discount 8% (cc. 4 720 Ft off)
- Discounted price 54 281 Ft (51 697 Ft + 5% VAT)
59 001 Ft
Availability
Estimated delivery time: In stock at the publisher, but not at Prospero's office. Delivery time approx. 3-5 weeks.
Not in stock at Prospero.
Why don't you give exact delivery time?
Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.
Product details:
- Edition number Softcover reprint of the original 1st ed. 2018
- Publisher Birkhäuser
- Date of Publication 14 December 2018
- Number of Volumes 1 pieces, Previously published in hardcover
- ISBN 9783030091866
- Binding Paperback
- No. of pages418 pages
- Size 235x155 mm
- Weight 688 g
- Language English
- Illustrations 66 Illustrations, black & white; 42 Illustrations, color 0
Categories
Short description:
The chapters in this volume explore how various methods from game theory can be utilized to optimize security and risk-management strategies. Emphasizing the importance of connecting theory and practice, they detail the steps involved in selecting, adapting, and analyzing game-theoretic models in security engineering and provide case studies of successful implementations in different application domains. Practitioners who are not experts in game theory and are uncertain about incorporating it into their work will benefit from this resource, as well as researchers in applied mathematics and computer science interested in current developments and future directions.
The first part of the book presents the theoretical basics, covering various different game-theoretic models related to and suitable for security engineering. The second part then shows how these models are adopted, implemented, and analyzed. Surveillance systems, interconnected networks, and power grids are among the different application areas discussed. Finally, in the third part, case studies from business and industry of successful applications of game-theoretic models are presented, and the range of applications discussed is expanded to include such areas as cloud computing, Internet of Things, and water utility networks. MoreLong description:
The chapters in this volume explore how various methods from game theory can be utilized to optimize security and risk-management strategies. Emphasizing the importance of connecting theory and practice, they detail the steps involved in selecting, adapting, and analyzing game-theoretic models in security engineering and provide case studies of successful implementations in different application domains. Practitioners who are not experts in game theory and are uncertain about incorporating it into their work will benefit from this resource, as well as researchers in applied mathematics and computer science interested in current developments and future directions.
The first part of the book presents the theoretical basics, covering various different game-theoretic models related to and suitable for security engineering. The second part then shows how these models are adopted, implemented, and analyzed. Surveillance systems, interconnected networks, and power grids are among the different application areas discussed. Finally, in the third part, case studies from business and industry of successful applications of game-theoretic models are presented, and the range of applications discussed is expanded to include such areas as cloud computing, Internet of Things, and water utility networks.?The volume may be interested both for mathematicians and engineers looking for applications of their knowledge in economy and managers who have to solve practical risk and security problems arising in real life.? (Andrzej Świerniak, zbMATH 1422.91033, 2019) More
Table of Contents:
Part I: Theory.- Utilizing Game Theory for Security Risk Assessment.- Decision Making when Consequences are Random.- Security Strategies and Multi-Criteria Decision Making.- A Scalable Decomposition Method for the Dynamic Defense of Cyber Networks.- Factored Markov Game Theory for Secure Interdependent Infrastructure Networks.- Part II: Practice.- G-DPS: A Game-Theoretical Decision-Making Framework for Physical Surveillance Games.- A Game-Theoretic Framework for Securing Interdependent Assets in Networks.- Random Damage in interconnected Networks.- Optimal Dispatch of Electric Transmission Systems Considering Interdependencies with Natural Gas Systems.- Managing Security Risks Interdependencies between ICT and Electric Infrastructures: A Game-Theoretical Analysis.- Part III: Case Studies.- Security and Interdependency in a Public Cloud: A Game-Theoretic Approach.- A Risk Management Approach for Highly Interconnected Networks.- Protecting Water Utility Networks from Advanced PersistentThreats: A Case Study.- Assessing the Impact of Malware Attacks in Utility Networks.- Game-Theoretic Optimization for Physical Surveillance of Critical Infrastructures: A Case Study.- Smart SECPLAN: A Process Implementation Tool for Hybrid Risk Management.
More