Coverart for item
The Resource Dynamic games for network security, Xiaofan He, Huaiyu Dai

Dynamic games for network security, Xiaofan He, Huaiyu Dai

Label
Dynamic games for network security
Title
Dynamic games for network security
Statement of responsibility
Xiaofan He, Huaiyu Dai
Creator
Contributor
Author
Subject
Language
eng
Summary
The goal of this SpringerBrief is to collect and systematically present the state-of-the-art in this research field and the underlying game-theoretic and learning tools to the broader audience with general network security and engineering backgrounds. Particularly, the exposition of this book begins with a brief introduction of relevant background knowledge in Chapter 1, followed by a review of existing applications of SG in addressing various dynamic network security problems in Chapter 2. A detailed treatment of dynamic security games with information asymmetry is given in Chapters 3–5. Specifically, dynamic security games with extra information that concerns security competitions, where the defender has an informational advantage over the adversary are discussed in Chapter 3. The complementary scenarios where the defender lacks information about the adversary is examined in Chapter 4 through the lens of incomplete information SG. Chapter 5 is devoted to the exploration of how to proactively create information asymmetry for the defender’s benefit. The primary audience for this brief includes network engineers interested in security decision-making in dynamic network security problems. Researchers interested in the state-of-the-art research on stochastic game theory and its applications in network security will be interested in this SpringerBrief as well. Also graduate and undergraduate students interested in obtaining comprehensive information on stochastic game theory and applying it to address relevant research problems can use this SpringerBrief as a study guide. Lastly, concluding remarks and our perspective for future works are presented in Chapter 6
Member of
Cataloging source
GW5XE
http://library.link/vocab/creatorName
He, Xiaofan
Dewey number
005.8
Index
no index present
LC call number
TK5105.59
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorDate
1973-
http://library.link/vocab/relatedWorkOrContributorName
Dai, Huaiyu
Series statement
SpringerBriefs in electrical and computer engineering,
http://library.link/vocab/subjectName
  • Computer networks
  • Game theory
Label
Dynamic games for network security, Xiaofan He, Huaiyu Dai
Instantiates
Publication
Antecedent source
unknown
Bibliography note
Includes bibliographical references
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • Intro; Preface; Contents; 1 Preliminaries; 1.1 Introduction; 1.2 Elementary of Game Theory; 1.3 The Markov Decision Process; 1.3.1 The MDP Model; 1.3.2 Solving the MDP; 1.4 The Stochastic Games; 1.4.1 The Model of SG; 1.4.2 Solving the SG; 1.5 Summary; References; 2 Overview of Dynamic Network Security Games; 2.1 Introduction; 2.2 Applications in Cyber Networks; 2.3 Applications in Wireless Networks; 2.4 Applications in Cyber-Physical Networks; 2.5 Summary; References; 3 Dynamic Security Games with Extra Information; 3.1 Introduction; 3.2 Post-decision State; 3.3 Multi-Agent PDS Learning
  • 3.3.1 The Minimax-PDS Algorithm3.3.2 WoLF-PDS; 3.4 Security Applications; 3.4.1 Anti-jamming in Energy Harvesting CommunicationSystems; 3.4.2 Cloud-Based Security Game; 3.5 Summary; References; 4 Dynamic Security Games with Incomplete Information; 4.1 Introduction; 4.2 Background on Repeated Bayesian Game; 4.3 Bayesian SGs; 4.3.1 Bayesian SG Model; 4.3.2 Bayesian Nash Q-Learning; 4.4 Security Applications; 4.4.1 Dynamic Intrusion Detection System Configuration; 4.4.2 Spectrum Access in Adversarial Environment; 4.5 Summary; References; 5 Dynamic Security Games with Deception; 5.1 Introduction
  • 5.2 Stochastic Deception Games5.2.1 The SDG Model; 5.2.2 Solving the SDG; 5.3 A Security Application; 5.4 Summary; References; 6 Conclusion and Future Work; 6.1 Summary; 6.2 Future Works
Control code
SPR1027479102
Dimensions
unknown
Extent
1 online resource (x, 74 pages).
File format
unknown
Form of item
online
Isbn
9783319758718
Level of compression
unknown
Media category
computer
Media MARC source
rdamedia
Media type code
c
Other control number
10.1007/978-3-319-75871-8
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
System control number
  • on1027479102
  • (OCoLC)1027479102
Label
Dynamic games for network security, Xiaofan He, Huaiyu Dai
Publication
Antecedent source
unknown
Bibliography note
Includes bibliographical references
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • Intro; Preface; Contents; 1 Preliminaries; 1.1 Introduction; 1.2 Elementary of Game Theory; 1.3 The Markov Decision Process; 1.3.1 The MDP Model; 1.3.2 Solving the MDP; 1.4 The Stochastic Games; 1.4.1 The Model of SG; 1.4.2 Solving the SG; 1.5 Summary; References; 2 Overview of Dynamic Network Security Games; 2.1 Introduction; 2.2 Applications in Cyber Networks; 2.3 Applications in Wireless Networks; 2.4 Applications in Cyber-Physical Networks; 2.5 Summary; References; 3 Dynamic Security Games with Extra Information; 3.1 Introduction; 3.2 Post-decision State; 3.3 Multi-Agent PDS Learning
  • 3.3.1 The Minimax-PDS Algorithm3.3.2 WoLF-PDS; 3.4 Security Applications; 3.4.1 Anti-jamming in Energy Harvesting CommunicationSystems; 3.4.2 Cloud-Based Security Game; 3.5 Summary; References; 4 Dynamic Security Games with Incomplete Information; 4.1 Introduction; 4.2 Background on Repeated Bayesian Game; 4.3 Bayesian SGs; 4.3.1 Bayesian SG Model; 4.3.2 Bayesian Nash Q-Learning; 4.4 Security Applications; 4.4.1 Dynamic Intrusion Detection System Configuration; 4.4.2 Spectrum Access in Adversarial Environment; 4.5 Summary; References; 5 Dynamic Security Games with Deception; 5.1 Introduction
  • 5.2 Stochastic Deception Games5.2.1 The SDG Model; 5.2.2 Solving the SDG; 5.3 A Security Application; 5.4 Summary; References; 6 Conclusion and Future Work; 6.1 Summary; 6.2 Future Works
Control code
SPR1027479102
Dimensions
unknown
Extent
1 online resource (x, 74 pages).
File format
unknown
Form of item
online
Isbn
9783319758718
Level of compression
unknown
Media category
computer
Media MARC source
rdamedia
Media type code
c
Other control number
10.1007/978-3-319-75871-8
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
System control number
  • on1027479102
  • (OCoLC)1027479102

Library Locations

Processing Feedback ...