Fr. 179.00

Game Theoretic Risk Analysis of Security Threats

English · Paperback / Softback

Shipping usually within 6 to 7 weeks

Description

Read more

Game Theoretic Risk Analysis of Security Threats introduces reliability and risk analysis in the face of threats by intelligent agents. More specifically, game-theoretic models are developed for identifying optimal and/or equilibrium defense and attack strategies in systems of varying degrees of complexity. The book covers applications to networks, including problems in both telecommunications and transportation. However, the book's primary focus is to integrate game theory and reliability methodologies into a set of techniques to predict, detect, diminish, and stop intentional attacks at targets that vary in complexity. In this book, Bier and Azaiez highlight work by researchers who combine reliability and risk analysis with game theory methods to create a set of functional tools that can be used to offset intentional, intelligent threats (including threats of terrorism and war). These tools will help to address problems of global security and facilitate more cost-effective defensive investments.

List of contents

Why Both Game Theory and Reliability Theory Are Important in Defending Infrastructure against Intelligent Attacks.- Game Theory Models of Intelligent Actors in Reliability Analysis: An Overview of the State of the Art.- Optimizing Defense Strategies for Complex Multi-State Systems.- Defending Against Terrorism, Natural Disaster, and All Hazards.- A Bayesian Model for a Game of Information in Optimal Attack/Defense Strategies.- Search for a Malevolent Needle in a Benign Haystack.- Games and Risk Analysis: Three Examples of Single and Alternate Moves.- Making Telecommunications Networks Resilient against Terrorist Attacks.- Improving Reliability through Multi-Path Routing and Link Defence: An Application of Game Theory to Transport.

Summary

Game Theoretic Risk Analysis of Security Threats introduces reliability and risk analysis in the face of threats by intelligent agents. More specifically, game-theoretic models are developed for identifying optimal and/or equilibrium defense and attack strategies in systems of varying degrees of complexity. The book covers applications to networks, including problems in both telecommunications and transportation. However, the book’s primary focus is to integrate game theory and reliability methodologies into a set of techniques to predict, detect, diminish, and stop intentional attacks at targets that vary in complexity. In this book, Bier and Azaiez highlight work by researchers who combine reliability and risk analysis with game theory methods to create a set of functional tools that can be used to offset intentional, intelligent threats (including threats of terrorism and war). These tools will help to address problems of global security and facilitate more cost-effective defensive investments.

Additional text

From the reviews:
“This book is a collection of several articles on the analysis of defending infrastructure against terrorism attacks by means of game theory and reliability theory. … well written and it can be useful for researchers in this field. It not only provides the state-of-the-art review of attack–defend models but also describes the algorithms in detail.” (J. Li, Journal of the Operational Research Society, Vol. 61 (12), 2010)

Report

From the reviews:
"This book is a collection of several articles on the analysis of defending infrastructure against terrorism attacks by means of game theory and reliability theory. ... well written and it can be useful for researchers in this field. It not only provides the state-of-the-art review of attack-defend models but also describes the algorithms in detail." (J. Li, Journal of the Operational Research Society, Vol. 61 (12), 2010)

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.