Item type | Current location | Collection | Call number | Copy number | Status | Date due | Barcode |
---|---|---|---|---|---|---|---|
E-Books | Biblioteca da FCTUNL Online | Não Ficção | QA269.SPR FCT 98442 (Browse shelf) | 1 | Available |
Browsing Biblioteca da FCTUNL Shelves , Shelving location: Online , Collection code: Não Ficção Close shelf browser
No cover image available | ||||||||
QA269.SPR FCT 97479 Generalized Nash equilibrium problems, bilevel programming and MPEC | QA269.SPR FCT 98091 Advances in mathematical economics | QA269.SPR FCT 98104 Frontiers of dynamic games | QA269.SPR FCT 98442 Game theory for security and risk management | QA270.SPR FCT 81584 Statistical inference on residual life | QA272.SPR FCT 80995 Advances in dynamic games and their applications | QA272.SPR FCT 81034 Advances in dynamic games |
Colocação: Online
The chapters in this volume explore how various methods from game theory can be utilized to optimize security and risk-management strategies. Emphasizing the importance of connecting theory and practice, they detail the steps involved in selecting, adapting, and analyzing game-theoretic models in security engineering and provide case studies of successful implementations in different application domains. Practitioners who are not experts in game theory and are uncertain about incorporating it into their work will benefit from this resource, as well as researchers in applied mathematics and computer science interested in current developments and future directions. The first part of the book presents the theoretical basics, covering various different game-theoretic models related to and suitable for security engineering. The second part then shows how these models are adopted, implemented, and analyzed. Surveillance systems, interconnected networks, and power grids are among the different application areas discussed. Finally, in the third part, case studies from business and industry of successful applications of game-theoretic models are presented, and the range of applications discussed is expanded to include such areas as cloud computing, Internet of Things, and water utility networks.
There are no comments for this item.