000 02814cam a22003014a 4500
001 16302617
005 20201128021151.0
008 100625s2011 xxka frb f001 0 eng d
010 _a2010027364
020 _a9780521119320 (hardback)
040 _aDLC
_cDLC
_dDLC
_dEG-ScBUE
082 0 0 _a005.8
_222
_bALP
100 1 _aAlpcan, Tansu,
_d1975-
_936990
245 1 0 _aNetwork security :
_ba decision and game-theoretic approach /
_cTansu Alpcan, Tamer Basar.
260 _aCambridge, United Kingdom ;
_aNew York, United States :
_bCambridge University Press,
_c2011.
300 _axiv, 314 p. :
_bill. ;
_c25 cm.
500 _aIndex : p. 312-314.
504 _aBibliography : p. [302]-311.
505 8 _aMachine generated contents note : Preface ; Notation ; Part I. Introduction : 1. Introduction ; 2. Network security concepts ; Part II. Security Games : 3. Deterministic security games ; 4. Stochastic security games ; 5. Security games with information limitations ; Part III. Decision Making for Network Security : 6. Security risk management ; 7. Resource allocation for security ; 8. Usability, trust, and privacy ; Part IV. Security Attack and Intrusion Detection : 9. Machine learning for intrusion and anomaly detection ; 10. Hypothesis testing for attack detection ; A. Optimization, game theory, and optimal & robust control ; References ; Index.
520 _a"Covering attack detection, malware response, algorithm and mechanism design, privacy, and risk management, this comprehensive work applies unique quantitative models derived from decision, control, and game theories to understanding diverse network security problems. It provides the reader with a system-level theoretical understanding of network security, and is essential reading for researchers interested in a quantitative approach to key incentive and resource allocation issues in the field. It also provides practitioners with an analytical foundation that is useful for formalising decision-making processes in network security"-
520 _a"Network security is an important, challenging, and multi-dimensional research field.In its study, theory and practice should function together as parts of a feedback loop.Game, optimization, and control theories, among others, provide a mathematical foundation to formalize the multitude of decision-making processes in network security. The analytical approaches and quantitative frameworks presented lead to better allocation of limited resources and result in more informed responses to security problems in complex networked systems and organizations"-
650 0 _aComputer networks
_xSecurity measures
_92634
650 0 _aGame theory
_93340
653 _bENGELC
_cDecember2014
655 _vreading book
_934232
700 _aBasak, T. K.
_97821
942 _2ddc
_k005.8 ALP
999 _c18801
_d18773