Home
Decision and Game Theory for Security: Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012, Proceedings
Barnes and Noble
Loading Inventory...
Decision and Game Theory for Security: Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012, Proceedings
Current price: $54.99

Barnes and Noble
Decision and Game Theory for Security: Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012, Proceedings
Current price: $54.99
Loading Inventory...
Size: OS
*Product information may vary - to confirm product availability, pricing, shipping and return information please contact Barnes and Noble
This book constitutes the refereed proceedings of the Third International Conference on Decision and Game Theory for Security, GameSec 2012, held in Budapest, Hungary, in November 2012.
The 18 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on secret communications, identification of attackers, multi-step attacks, network security, system defense, and applications security.
The 18 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on secret communications, identification of attackers, multi-step attacks, network security, system defense, and applications security.
This book constitutes the refereed proceedings of the Third International Conference on Decision and Game Theory for Security, GameSec 2012, held in Budapest, Hungary, in November 2012.
The 18 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on secret communications, identification of attackers, multi-step attacks, network security, system defense, and applications security.
The 18 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on secret communications, identification of attackers, multi-step attacks, network security, system defense, and applications security.

















