Cyber-Security in Critical Infrastructures A Game-Theoretic Approach
This book presents a compendium of selected game- and decision-theoretic models to achieve and assess the security of critical infrastructures. Given contemporary reports on security incidents of various kinds, we can see a paradigm shift to attacks of an
- PDF / 5,535,524 Bytes
- 299 Pages / 439.42 x 683.15 pts Page_size
- 79 Downloads / 302 Views
Stefan Rass Stefan Schauer Sandra König Quanyan Zhu
Cyber-Security in Critical Infrastructures A Game-Theoretic Approach
Advanced Sciences and Technologies for Security Applications Series Editor Anthony J. Masys, Associate Professor, Director of Global Disaster Management, Humanitarian Assistance and Homeland Security, University of South Florida, Tampa, USA Advisory Editors Gisela Bichler, California State University, San Bernardino, CA, USA Thirimachos Bourlai, Statler College of Engineering and Mineral Resources, West Virginia University, Morgantown, WV, USA Chris Johnson, University of Glasgow, Glasgow, UK Panagiotis Karampelas, Hellenic Air Force Academy, Attica, Greece Christian Leuprecht, Royal Military College of Canada, Kingston, ON, Canada Edward C. Morse, University of California, Berkeley, CA, USA David Skillicorn, Queen’s University, Kingston, ON, Canada Yoshiki Yamagata, National Institute for Environmental Studies, Tsukuba, Ibaraki, Japan
Indexed by SCOPUS The series Advanced Sciences and Technologies for Security Applications comprises interdisciplinary research covering the theory, foundations and domainspecific topics pertaining to security. Publications within the series are peerreviewed monographs and edited works in the areas of: – biological and chemical threat recognition and detection (e.g., biosensors, aerosols, forensics) – crisis and disaster management – terrorism – cyber security and secure information systems (e.g., encryption, optical and photonic systems) – traditional and non-traditional security – energy, food and resource security – economic security and securitization (including associated infrastructures) – transnational crime – human security and health security – social, political and psychological aspects of security – recognition and identification (e.g., optical imaging, biometrics, authentication and verification) – smart surveillance systems – applications of theoretical frameworks and methodologies (e.g., grounded theory, complexity, network sciences, modelling and simulation) Together, the high-quality contributions to this series provide a cross-disciplinary overview of forefront research endeavours aiming to make the world a safer place. The editors encourage prospective authors to correspond with them in advance of submitting a manuscript. Submission of manuscripts should be made to the Editorin-Chief or one of the Editors.
More information about this series at http://www.springer.com/series/5540
Stefan Rass • Stefan Schauer • Sandra König Quanyan Zhu
Cyber-Security in Critical Infrastructures A Game-Theoretic Approach
Stefan Rass Universitaet Klagenfurt Klagenfurt, Austria
Stefan Schauer Austrian Institute of Technology GmbH Wien, Austria
Sandra König Austrian Institute of Technology GmbH Wien, Austria
Quanyan Zhu Tandon School of Engineering New York University Brooklyn, NY, USA
ISSN 1613-5113 ISSN 2363-9466 (electronic) Advanced Sciences and Technologies for Security Applications ISBN 978-3-030-46907-8 ISBN 978-3-030-46908-5 (eBook) https://doi.org
Data Loading...