Network Security: A Decision and Game-Theoretic ApproachCovering attack detection, malware response, algorithm and mechanism design, privacy, and risk management, this comprehensive work applies unique quantitative models derived from decision, control, and game theories to understanding diverse network security problems. It provides the reader with a system-level theoretical understanding of network security, and is essential reading for researchers interested in a quantitative approach to key incentive and resource allocation issues in the field. It also provides practitioners with an analytical foundation that is useful for formalising decision-making processes in network security. |
Contents
Part II Security games | 37 |
Part III Decision making for network security | 131 |
Part IV Security attack and intrusion detection | 217 |
Other editions - View all
Network Security: A Decision and Game-Theoretic Approach Tansu Alpcan,Tamer Başar No preview available - 2010 |
Network Security: A Decision and Game-Theoretic Approach Tansu Alpcan,Tamer Başar No preview available - 2010 |
Common terms and phrases
actions addition agents algorithm analysis application approach assumed attacker Bayesian centralized Chapter communication complex condition Consider constraints continuous convergence corresponding cost cost function decision defender defined definition denotes detection discussed distributed dynamic effect equation equilibrium errors example exists Figure filtering finite first formulation framework function fusion given Hence hypothesis identity individual initial intrusion detection investment known learning limited linear malicious malware matrix measures methods minimization multiple nature network security node Note objective observations obtained optimal organization packets parameters play players positive possible presented probability problem provides random reference represents respectively response result risk rule schemes security game selfish sensors solution solved space specific step stochastic strategies studied testing Theorem theory traffic trust unique units update users utility vector vulnerabilities