↓ Skip to main content

Decision and Game Theory for Security

Overview of attention for book
Cover of 'Decision and Game Theory for Security'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Where to Hide the Bits ?
  3. Altmetric Badge
    Chapter 2 Socio-Rational Secret Sharing as a New Direction in Rational Cryptography
  4. Altmetric Badge
    Chapter 3 Audit Mechanisms for Provable Risk Management and Accountable Data Governance
  5. Altmetric Badge
    Chapter 4 A Game Theoretical Analysis of Lemonizing Cybercriminal Black Markets
  6. Altmetric Badge
    Chapter 5 Computing the Nash Equilibria of Intruder Classification Games
  7. Altmetric Badge
    Chapter 6 Upper Bounds for Adversaries’ Utility in Attack Trees
  8. Altmetric Badge
    Chapter 7 Using Signaling Games to Model the Multi-step Attack-Defense Scenarios on Confidentiality
  9. Altmetric Badge
    Chapter 8 Simulation and Game-Theoretic Analysis of an Attacker-Defender Game
  10. Altmetric Badge
    Chapter 9 Linear Loss Function for the Network Blocking Game: An Efficient Model for Measuring Network Robustness and Link Criticality
  11. Altmetric Badge
    Chapter 10 Deceptive Routing in Relay Networks
  12. Altmetric Badge
    Chapter 11 A Game-Theoretic Framework for Network Security Vulnerability Assessment and Mitigation
  13. Altmetric Badge
    Chapter 12 Game Theoretic Model of Strategic Honeypot Selection in Computer Networks
  14. Altmetric Badge
    Chapter 13 A Cost-Based Mechanism for Evaluating the Effectiveness of Moving Target Defenses
  15. Altmetric Badge
    Chapter 14 Are We Compromised? Modelling Security Assessment Games
  16. Altmetric Badge
    Chapter 15 Defending against the Unknown Enemy: Applying FlipIt to System Security
  17. Altmetric Badge
    Chapter 16 Incentives and Security in Electricity Distribution Networks
  18. Altmetric Badge
    Chapter 17 Security Games and Risk Minimization for Automatic Generation Control in Smart Grid
  19. Altmetric Badge
    Chapter 18 Contractual Agreement Design for Enforcing Honesty in Cloud Outsourcing
Attention for Chapter 3: Audit Mechanisms for Provable Risk Management and Accountable Data Governance
Altmetric Badge

Citations

dimensions_citation
4 Dimensions

Readers on

mendeley
34 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Audit Mechanisms for Provable Risk Management and Accountable Data Governance
Chapter number 3
Book title
Decision and Game Theory for Security
Published by
Springer, Berlin, Heidelberg, November 2012
DOI 10.1007/978-3-642-34266-0_3
Book ISBNs
978-3-64-234265-3, 978-3-64-234266-0
Authors

Jeremiah Blocki, Nicolas Christin, Anupam Datta, Arunesh Sinha, Blocki, Jeremiah, Christin, Nicolas, Datta, Anupam, Sinha, Arunesh

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 34 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Croatia 1 3%
United States 1 3%
Unknown 32 94%

Demographic breakdown

Readers by professional status Count As %
Student > Master 6 18%
Student > Ph. D. Student 5 15%
Professor 4 12%
Student > Postgraduate 3 9%
Lecturer 2 6%
Other 5 15%
Unknown 9 26%
Readers by discipline Count As %
Computer Science 15 44%
Business, Management and Accounting 7 21%
Social Sciences 3 9%
Environmental Science 1 3%
Unknown 8 24%