↓ Skip to main content

Decision and Game Theory for Security

Overview of attention for book
Cover of 'Decision and Game Theory for Security'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Decision and Game Theory for Security
  3. Altmetric Badge
    Chapter 2 Deception-Based Game Theoretical Approach to Mitigate DoS Attacks
  4. Altmetric Badge
    Chapter 3 Data Exfiltration Detection and Prevention: Virtually Distributed POMDPs for Practically Safer Networks
  5. Altmetric Badge
    Chapter 4 On the Mitigation of Interference Imposed by Intruders in Passive RFID Networks
  6. Altmetric Badge
    Chapter 5 Risk Averse Stackelberg Security Games with Quantal Response
  7. Altmetric Badge
    Chapter 6 Optimal and Game-Theoretic Deployment of Security Investments in Interdependent Assets
  8. Altmetric Badge
    Chapter 7 Dynamics on Linear Influence Network Games Under Stochastic Environments
  9. Altmetric Badge
    Chapter 8 Patrolling a Pipeline
  10. Altmetric Badge
    Chapter 9 Optimal Allocation of Police Patrol Resources Using a Continuous-Time Crime Model
  11. Altmetric Badge
    Chapter 10 A Methodology to Apply a Game Theoretic Model of Security Risks Interdependencies Between ICT and Electric Infrastructures
  12. Altmetric Badge
    Chapter 11 On the Adoption of Privacy-enhancing Technologies
  13. Altmetric Badge
    Chapter 12 FlipLeakage: A Game-Theoretic Approach to Protect Against Stealthy Attackers in the Presence of Information Leakage
  14. Altmetric Badge
    Chapter 13 Scalar Quadratic-Gaussian Soft Watermarking Games
  15. Altmetric Badge
    Chapter 14 Strategies for Voter-Initiated Election Audits
  16. Altmetric Badge
    Chapter 15 Combining Graph Contraction and Strategy Generation for Green Security Games
  17. Altmetric Badge
    Chapter 16 Divide to Defend: Collusive Security Games
  18. Altmetric Badge
    Chapter 17 A Game-Theoretic Approach to Respond to Attacker Lateral Movement
  19. Altmetric Badge
    Chapter 18 GADAPT: A Sequential Game-Theoretic Framework for Designing Defense-in-Depth Strategies Against Advanced Persistent Threats
  20. Altmetric Badge
    Chapter 19 Optimal Contract Design Under Asymmetric Information for Cloud-Enabled Internet of Controlled Things
  21. Altmetric Badge
    Chapter 20 Becoming Cybercriminals: Incentives in Networks with Interdependent Security
  22. Altmetric Badge
    Chapter 21 A Logic for the Compliance Budget
  23. Altmetric Badge
    Chapter 22 A Game-Theoretic Analysis of Deception over Social Networks Using Fake Avatars
  24. Altmetric Badge
    Chapter 23 Network Elicitation in Adversarial Environment
  25. Altmetric Badge
    Chapter 24 Optimal Thresholds for Anomaly-Based Intrusion Detection in Dynamical Environments
  26. Altmetric Badge
    Chapter 25 A Point-Based Approximate Algorithm for One-Sided Partially Observable Pursuit-Evasion Games
  27. Altmetric Badge
    Chapter 26 Consensus Algorithm with Censored Data for Distributed Detection with Corrupted Measurements: A Game-Theoretic Approach
Attention for Chapter 1: Decision and Game Theory for Security
Altmetric Badge

About this Attention Score

  • In the top 25% of all research outputs scored by Altmetric
  • High Attention Score compared to outputs of the same age (80th percentile)
  • Good Attention Score compared to outputs of the same age and source (68th percentile)

Mentioned by

news
1 news outlet

Readers on

mendeley
3 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Decision and Game Theory for Security
Chapter number 1
Book title
Decision and Game Theory for Security
Published in
Lecture notes in computer science, January 2016
DOI 10.1007/978-3-319-47413-7_1
Book ISBNs
978-3-31-947412-0, 978-3-31-947413-7
Authors

Quanyan Zhu, Tansu Alpcan, Emmanouil Panaousis, Milind Tambe, William Casey, Eitan Altman, Aniruddha Singhal, Corinne Touati, Jie Li

Editors

Quanyan Zhu, Tansu Alpcan, Emmanouil Panaousis, Milind Tambe, William Casey

Timeline

Login to access the full chart related to this output.

If you don’t have an account, click here to discover Explorer

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 3 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 3 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 1 33%
Researcher 1 33%
Other 1 33%
Readers by discipline Count As %
Computer Science 3 100%
Attention Score in Context

Attention Score in Context

This research output has an Altmetric Attention Score of 7. This is our high-level measure of the quality and quantity of online attention that it has received. This Attention Score, as well as the ranking and number of research outputs shown below, was calculated when the research output was last mentioned on 20 October 2016.
All research outputs
#4,194,102
of 22,893,031 outputs
Outputs from Lecture notes in computer science
#989
of 8,129 outputs
Outputs of similar age
#71,868
of 393,753 outputs
Outputs of similar age from Lecture notes in computer science
#147
of 582 outputs
Altmetric has tracked 22,893,031 research outputs across all sources so far. Compared to these this one has done well and is in the 80th percentile: it's in the top 25% of all research outputs ever tracked by Altmetric.
So far Altmetric has tracked 8,129 research outputs from this source. They receive a mean Attention Score of 5.0. This one has done well, scoring higher than 82% of its peers.
Older research outputs will score higher simply because they've had more time to accumulate mentions. To account for age we can compare this Altmetric Attention Score to the 393,753 tracked outputs that were published within six weeks on either side of this one in any source. This one has done well, scoring higher than 80% of its contemporaries.
We're also able to compare this research output to 582 others from the same source and published within six weeks on either side of this one. This one has gotten more attention than average, scoring higher than 68% of its contemporaries.