| |
|
| Artikel-Nr.: 858A-9783319752679 Herst.-Nr.: 9783319752679 EAN/GTIN: 9783319752679 |
| |
|
| | |
| The first part of the book presents the theoretical basics, covering various different game-theoretic models related to and suitable for security engineering. The second part then shows how these models are adopted, implemented, and analyzed. Surveillance systems, interconnected networks, and power grids are among the different application areas discussed. Finally, in the third part, case studies from business and industry of successful applications of game-theoretic models are presented, and the range of applications discussed is expanded to include such areas as cloud computing, Internet of Things, and water utility networks. Weitere Informationen: | | Author: | Stefan Rass; Stefan Schauer | Verlag: | Springer International Publishing | Sprache: | eng |
|
| | |
| | | |
| Weitere Suchbegriffe: Datensicherheit, Datensicherung, Sicherheit / Datensicherheit, Datensicherheit / Netz, EDV / Theorie / Sicherheit, Entscheidungstheorie, Netzwerk (elektronisch), Operations Research, Unternehmensforschung, Spieltheorie, Spieltheorie (mathematisch) |
| | |
| |