Skip to main content
  • Book
  • © 2018

Game Theory for Security and Risk Management

From Theory to Practice

Birkhäuser
  • Provides a link from theory to practice in security engineering and risk management for practitioners

  • Demonstrates how game-theoretical methods can be implemented for those who are not experts in game theory

  • Covers a diverse range of application domains

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • ISBN: 978-3-319-75268-6
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 109.99
Price excludes VAT (USA)
Hardcover Book USD 149.99
Price excludes VAT (USA)

This is a preview of subscription content, access via your institution.

Table of contents (16 chapters)

  1. Front Matter

    Pages i-xxxii
  2. Theory

    1. Front Matter

      Pages 1-1
    2. Utilizing Game Theory for Security Risk Assessment

      • Lisa Rajbhandari, Einar Snekkenes
      Pages 3-19
    3. A Scalable Decomposition Method for the Dynamic Defense of Cyber Networks

      • Mohammad Rasouli, Erik Miehling, Demosthenis Teneketzis
      Pages 75-98
    4. Factored Markov Game Theory for Secure Interdependent Infrastructure Networks

      • Linan Huang, Juntao Chen, Quanyan Zhu
      Pages 99-126
  3. Practice

    1. Front Matter

      Pages 127-127
    2. G-DPS: A Game-Theoretical Decision-Making Framework for Physical Surveillance Games

      • Ali Alshawish, Mohamed Amine Abid, Hermann de Meer, Stefan Schauer, Sandra König, Antonios Gouglidis et al.
      Pages 129-156
    3. A Game-Theoretic Framework for Securing Interdependent Assets in Networks

      • Ashish R. Hota, Abraham A. Clements, Saurabh Bagchi, Shreyas Sundaram
      Pages 157-184
    4. Random Damage in Interconnected Networks

      • Sandra König, Antonios Gouglidis
      Pages 185-201
  4. Case Studies

    1. Front Matter

      Pages 251-251
    2. Security and Interdependency in a Public Cloud: A Game-Theoretic Approach

      • Charles A. Kamhoua, Luke Kwiat, Kevin A. Kwiat, Joon S. Park, Ming Zhao, Manuel Rodriguez
      Pages 253-284
    3. Protecting Water Utility Networks from Advanced Persistent Threats: A Case Study

      • Antonios Gouglidis, Sandra König, Benjamin Green, Karl Rossegger, David Hutchison
      Pages 313-333
    4. Assessing the Impact of Malware Attacks in Utility Networks

      • Sandra König, Antonios Gouglidis, Benjamin Green, Alma Solar
      Pages 335-351
    5. Game-Theoretic Optimization for Physical Surveillance of Critical Infrastructures: A Case Study

      • Ali Alshawish, Mohamed Amine Abid, Hermann de Meer
      Pages 353-389
    6. Smart SECPLAN: A Process Implementation Tool for Hybrid Risk Management

      • Alberto Zambrano, Santiago Caceres, Ana Isabel Martinez
      Pages 391-418

About this book

The chapters in this volume explore how various methods from game theory can be utilized to optimize security and risk-management strategies.  Emphasizing the importance of connecting theory and practice, they detail the steps involved in selecting, adapting, and analyzing game-theoretic models in security engineering and provide case studies of successful implementations in different application domains.  Practitioners who are not experts in game theory and are uncertain about incorporating it into their work will benefit from this resource, as well as researchers in applied mathematics and computer science interested in current developments and future directions.

The first part of the book presents the theoretical basics, covering various different game-theoretic models related to and suitable for security engineering.  The second part then shows how these models are adopted, implemented, and analyzed.  Surveillance systems, interconnected networks, and power grids are among the different application areas discussed.  Finally, in the third part, case studies from business and industry of successful applications of game-theoretic models are presented, and the range of applications discussed is expanded to include such areas as cloud computing, Internet of Things, and water utility networks.

Keywords

  • Game Theory
  • Decision Support
  • Risk Management
  • Reasoning under Uncertainty
  • Optimal Security Strategies

Reviews

“The volume may be interested both for mathematicians and engineers looking for applications of their knowledge in economy and managers who have to solve practical risk and security problems arising in real life.” (Andrzej Świerniak, zbMATH 1422.91033, 2019)

Editors and Affiliations

  • Institute of Applied Informatics, University of Klagenfurt, Klagenfurt, Austria

    Stefan Rass

  • Center for Digital Safety & Security, Austrian Institute of Techno GmbH, Klagenfurt, Austria

    Stefan Schauer

Bibliographic Information

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • ISBN: 978-3-319-75268-6
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 109.99
Price excludes VAT (USA)
Hardcover Book USD 149.99
Price excludes VAT (USA)