TY - BOOK
T1 - Network security
T2 - A decision and Game-Theoretic approach
AU - Alpcan, Tansu
AU - Başar, Tamer
N1 - Publisher Copyright:
© Cambridge University Press 2011.
PY - 2010/1/1
Y1 - 2010/1/1
N2 - Covering attack detection, malware response, algorithm and mechanism design, privacy, and risk management, this comprehensive work applies unique quantitative models derived from decision, control, and game theories to understanding diverse network security problems. It provides the reader with a system-level theoretical understanding of network security, and is essential reading for researchers interested in a quantitative approach to key incentive and resource allocation issues in the field. It also provides practitioners with an analytical foundation that is useful for formalising decision-making processes in network security. Reviews: "Network security is a topic of crucial relevance for the information society and has been addressed by many books. Yet, modeling the reasons specific security decisions are made is a research topic still in its infancy. By its unique and in-depth treatment of the subject, this book is a landmark towards this ambitious goal." - Jean-Pierre Hubaux, EPFL, Switzerland "A decision and game theoretic approach has recently emerged as an important tool for addressing key issues in network security and risk management. This book provides a comprehensive account of this approach by two experts that have pioneered its development and demonstrates its high potential. It should be studied by anyone who aims to develop a thorough and multi-faceted understanding of the subject." - Nick Bambos, Stanford Univ., USA "The great advantage of this book is that the authors covered exhaustively theoretical background related to decision and game theories with a lot of motivating examples. The work is written without unnecessary complexity, while the organization is clear and the contents is well readable. I can recommend this position to researchers and graduate students as well as to engineers, mainly system administrators and security officers." - Marcin Niemiec, IEEE Communications, February 2012.
AB - Covering attack detection, malware response, algorithm and mechanism design, privacy, and risk management, this comprehensive work applies unique quantitative models derived from decision, control, and game theories to understanding diverse network security problems. It provides the reader with a system-level theoretical understanding of network security, and is essential reading for researchers interested in a quantitative approach to key incentive and resource allocation issues in the field. It also provides practitioners with an analytical foundation that is useful for formalising decision-making processes in network security. Reviews: "Network security is a topic of crucial relevance for the information society and has been addressed by many books. Yet, modeling the reasons specific security decisions are made is a research topic still in its infancy. By its unique and in-depth treatment of the subject, this book is a landmark towards this ambitious goal." - Jean-Pierre Hubaux, EPFL, Switzerland "A decision and game theoretic approach has recently emerged as an important tool for addressing key issues in network security and risk management. This book provides a comprehensive account of this approach by two experts that have pioneered its development and demonstrates its high potential. It should be studied by anyone who aims to develop a thorough and multi-faceted understanding of the subject." - Nick Bambos, Stanford Univ., USA "The great advantage of this book is that the authors covered exhaustively theoretical background related to decision and game theories with a lot of motivating examples. The work is written without unnecessary complexity, while the organization is clear and the contents is well readable. I can recommend this position to researchers and graduate students as well as to engineers, mainly system administrators and security officers." - Marcin Niemiec, IEEE Communications, February 2012.
UR - http://www.scopus.com/inward/record.url?scp=84924666047&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84924666047&partnerID=8YFLogxK
U2 - 10.1017/CBO9780511760778
DO - 10.1017/CBO9780511760778
M3 - Book
AN - SCOPUS:84924666047
SN - 9780521119320
VL - 9780521119320
BT - Network security
PB - Cambridge University Press
ER -