Stefan Schauer - Böcker
Visar alla böcker från författaren Stefan Schauer. Handla med fri frakt och snabb leverans.
8 produkter
8 produkter
1 385 kr
Skickas inom 10-15 vardagar
The chapters in this volume explore how various methods from game theory can be utilized to optimize security and risk-management strategies. Emphasizing the importance of connecting theory and practice, they detail the steps involved in selecting, adapting, and analyzing game-theoretic models in security engineering and provide case studies of successful implementations in different application domains. Practitioners who are not experts in game theory and are uncertain about incorporating it into their work will benefit from this resource, as well as researchers in applied mathematics and computer science interested in current developments and future directions.The first part of the book presents the theoretical basics, covering various different game-theoretic models related to and suitable for security engineering. The second part then shows how these models are adopted, implemented, and analyzed. Surveillance systems, interconnected networks, and power grids are among the different application areas discussed. Finally, in the third part, case studies from business and industry of successful applications of game-theoretic models are presented, and the range of applications discussed is expanded to include such areas as cloud computing, Internet of Things, and water utility networks.
1 897 kr
Skickas inom 10-15 vardagar
Much traditional security research has a narrow focus on specific attack scenarios or applications, and strives to make an attack “practically impossible.” A more recent approach to security views it as a scenario in which the cost of an attack exceeds the potential reward.
1 897 kr
Skickas inom 10-15 vardagar
Much traditional security research has a narrow focus on specific attack scenarios or applications, and strives to make an attack “practically impossible.” A more recent approach to security views it as a scenario in which the cost of an attack exceeds the potential reward.
1 295 kr
Skickas inom 10-15 vardagar
Dieses Buch bietet einen Überblick über die neuesten Implementierungen von Quanten-Zufallszahlengeneratoren (QRNGs) und untersucht insbesondere deren Beziehung zu klassischen statistischen Zufallsmodellen und numerischen Techniken zur Berechnung von Zufallszahlen. Der Leser - der idealerweise einen Hintergrund in klassischer Statistik, Informatik oder Kryptographie hat - wird Schritt für Schritt in die Welt der Quantenbits eingeführt, und es werden explizite Beziehungen zwischen QRNGs und ihren klassischen Gegenstücken aufgezeigt. Die Erzeugung von Zufallszahlen ist eine wichtige Säule der Kryptographie. Die Nutzung des Zufalls, der Quantenphänomenen innewohnt, ist ein sich rasch entwickelnder Zweig der Quantenkryptografie mit unzähligen Anwendungen für die Zukunft. Der Wert der Quantenzufälligkeit für kryptografische Zwecke wird empirisch durch statistische Auswertungen der Leistung von QRNGs im Vergleich zu klassischen Techniken zur Erzeugung echter und pseudozufälliger Zahlen nachgewiesen. Das Buch bietet dann einen Überblick über die technischen Implementierungen von QRNGs, bevor eine abschließende Diskussion über die wichtigsten Errungenschaften und verbleibenden Hindernisse auf diesem Gebiet die Berichterstattung abrundet und gleichzeitig die Tür für zukünftige Forschungsrichtungen öffnet.
1 479 kr
Skickas inom 10-15 vardagar
Das Buch ist eine Mischung aus theoretischer Arbeit und praktischen Erfolgsgeschichten und richtet sich vor allem an Studenten und Praktiker, die eine Einführung in spiel- und entscheidungstheoretische Techniken für die Sicherheit suchen.
Del 10575 - Lecture Notes in Computer Science
Decision and Game Theory for Security
8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings
Häftad, Engelska, 2017
537 kr
Skickas inom 10-15 vardagar
This book constitutes the refereed proceedings of the 8th International Conference on Decision and Game Theory for Security, GameSec 2017, held in Vienna, Austria, in October 2017.The 24 revised full papers presented together with 4 short papers were carefully reviewed and selected from 71 submissions.The papers address topics such as Game theory and mechanism design for security and privacy; Pricing and economic incentives for building dependable and secure systems; Dynamic control, learning, and optimization and approximation techniques; Decision making and decision theory for cybersecurity and security requirements engineering; Socio-technological and behavioral approaches to security; Risk assessment and risk management; Security investment and cyber insurance; Security and privacy for the Internet-of-Things (IoT), cyber-physical systems, resilient control systems; New approaches for security and privacy in cloud computing and for critical infrastructure; Security and privacy of wireless and mobile communications, including user location privacy; Game theory for intrusion detection; and Empirical and experimental studies with game-theoretic or optimization analysis for security and privacy.
1 485 kr
Skickas inom 10-15 vardagar
This book provides an overview of state-of-the-art implementations of quantum random number generators (QRNGs), and especially examines their relation to classical statistical randomness models and numerical techniques for computing random numbers.
1 392 kr
Skickas inom 10-15 vardagar
The chapters in this volume explore how various methods from game theory can be utilized to optimize security and risk-management strategies. Emphasizing the importance of connecting theory and practice, they detail the steps involved in selecting, adapting, and analyzing game-theoretic models in security engineering and provide case studies of successful implementations in different application domains. Practitioners who are not experts in game theory and are uncertain about incorporating it into their work will benefit from this resource, as well as researchers in applied mathematics and computer science interested in current developments and future directions.The first part of the book presents the theoretical basics, covering various different game-theoretic models related to and suitable for security engineering. The second part then shows how these models are adopted, implemented, and analyzed. Surveillance systems, interconnected networks, and power grids are among the different application areas discussed. Finally, in the third part, case studies from business and industry of successful applications of game-theoretic models are presented, and the range of applications discussed is expanded to include such areas as cloud computing, Internet of Things, and water utility networks.