Game Theoretic Analysis of Congestion, Safety and Security

Game Theoretic Analysis of Congestion, Safety and Security

Author: Kjell Hausken

Publisher: Springer

Published: 2014-12-31

Total Pages: 316

ISBN-13: 3319130099

DOWNLOAD EBOOK

Maximizing reader insights into the roles of intelligent agents in networks, air traffic and emergency departments, this volume focuses on congestion in systems where safety and security are at stake, devoting special attention to applying game theoretic analysis of congestion to: protocols in wired and wireless networks; power generation, air transportation and emergency department overcrowding. Reviewing exhaustively the key recent research into the interactions between game theory, excessive crowding, and safety and security elements, this book establishes a new research angle by illustrating linkages between the different research approaches and serves to lay the foundations for subsequent analysis. Congestion (excessive crowding) is defined in this work as all kinds of flows; e.g., road/sea/air traffic, people, data, information, water, electricity, and organisms. Analysing systems where congestion occurs – which may be in parallel, series, interlinked, or interdependent, with flows one way or both ways – this book puts forward new congestion models, breaking new ground by introducing game theory and safety/security into proceedings. Addressing the multiple actors who may hold different concerns regarding system reliability; e.g. one or several terrorists, a government, various local or regional government agencies, or others with stakes for or against system reliability, this book describes how governments and authorities may have the tools to handle congestion, but that these tools need to be improved whilst additionally ensuring safety and security against various threats. This game-theoretic analysis sets this two volume book apart from the current congestion literature and ensures that the work will be of use to postgraduates, researchers, 3rd/4th-year undergraduates, policy makers, and practitioners.


Game Theoretic Analysis of Congestion, Safety and Security

Game Theoretic Analysis of Congestion, Safety and Security

Author: Kjell Hausken

Publisher: Springer

Published: 2015-01-09

Total Pages: 220

ISBN-13: 9783319116754

DOWNLOAD EBOOK

Maximizing reader insights into the interactions between game theory, excessive crowding and safety and security elements, this book establishes a new research angle by illustrating linkages between different research approaches and through laying the foundations for subsequent analysis. Congestion (excessive crowding) is defined in this work as all kinds of flows; e.g., road/sea/air traffic, people, data, information, water, electricity, and organisms. Analysing systems where congestion occurs – which may be in parallel, series, interlinked, or interdependent, with flows one way or both ways – this book puts forward new congestion models, breaking new ground by introducing game theory and safety/security into proceedings. Addressing the multiple actors who may hold different concerns regarding system reliability; e.g. one or several terrorists, a government, various local or regional government agencies, or others with stakes for or against system reliability, this book describes how governments and authorities may have the tools to handle congestion, but that these tools need to be improved whilst additionally ensuring safety and security against various threats. This game-theoretic analysis sets this book apart from the current congestion literature and ensures that the book will be of use to postgraduates, researchers, 3rd/4th-year undergraduates, policy makers, and practitioners.


Game Theoretic Risk Analysis of Security Threats

Game Theoretic Risk Analysis of Security Threats

Author: Vicki M. Bier

Publisher: Springer Science & Business Media

Published: 2008-10-20

Total Pages: 239

ISBN-13: 0387877673

DOWNLOAD EBOOK

Game Theoretic Risk Analysis of Security Threats introduces reliability and risk analysis in the face of threats by intelligent agents. More specifically, game-theoretic models are developed for identifying optimal and/or equilibrium defense and attack strategies in systems of varying degrees of complexity. The book covers applications to networks, including problems in both telecommunications and transportation. However, the book’s primary focus is to integrate game theory and reliability methodologies into a set of techniques to predict, detect, diminish, and stop intentional attacks at targets that vary in complexity. In this book, Bier and Azaiez highlight work by researchers who combine reliability and risk analysis with game theory methods to create a set of functional tools that can be used to offset intentional, intelligent threats (including threats of terrorism and war). These tools will help to address problems of global security and facilitate more cost-effective defensive investments.


Decision and Game Theory for Security

Decision and Game Theory for Security

Author: Linda Bushnell

Publisher: Springer

Published: 2018-10-22

Total Pages: 652

ISBN-13: 3030015548

DOWNLOAD EBOOK

The 28 revised full papers presented together with 8 short papers were carefully reviewed and selected from 44 submissions.Among the topical areas covered were: use of game theory; control theory; and mechanism design for security and privacy; decision making for cybersecurity and security requirements engineering; security and privacy for the Internet-of-Things; cyber-physical systems; cloud computing; resilient control systems, and critical infrastructure; pricing; economic incentives; security investments, and cyber insurance for dependable and secure systems; risk assessment and security risk management; security and privacy of wireless and mobile communications, including user location privacy; sociotechnological and behavioral approaches to security; deceptive technologies in cybersecurity and privacy; empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy; and adversarial machine learning and crowdsourcing, and the role of artificial intelligence in system security.


Game Theory for Security and Risk Management

Game Theory for Security and Risk Management

Author: Stefan Rass

Publisher: Springer

Published: 2018-07-06

Total Pages: 438

ISBN-13: 3319752685

DOWNLOAD EBOOK

The chapters in this volume explore how various methods from game theory can be utilized to optimize security and risk-management strategies. Emphasizing the importance of connecting theory and practice, they detail the steps involved in selecting, adapting, and analyzing game-theoretic models in security engineering and provide case studies of successful implementations in different application domains. Practitioners who are not experts in game theory and are uncertain about incorporating it into their work will benefit from this resource, as well as researchers in applied mathematics and computer science interested in current developments and future directions. The first part of the book presents the theoretical basics, covering various different game-theoretic models related to and suitable for security engineering. The second part then shows how these models are adopted, implemented, and analyzed. Surveillance systems, interconnected networks, and power grids are among the different application areas discussed. Finally, in the third part, case studies from business and industry of successful applications of game-theoretic models are presented, and the range of applications discussed is expanded to include such areas as cloud computing, Internet of Things, and water utility networks.


Game Theory for Managing Security in Chemical Industrial Areas

Game Theory for Managing Security in Chemical Industrial Areas

Author: Laobing Zhang

Publisher: Springer

Published: 2018-07-09

Total Pages: 167

ISBN-13: 3319926187

DOWNLOAD EBOOK

This book systematically studies how game theory can be used to improve security in chemical industrial areas, capturing the intelligent interactions between security managers and potential adversaries. The recent unfortunate terrorist attacks on critical infrastructures show that adversaries are intelligent and strategic. Game theoretic models have been extensively used in some domains to model these strategic adversaries. However, there is a lack of such advanced models to be employed by chemical security managers. In this book, game theoretic models for protecting chemical plants as well as clusters are proposed. Different equilibrium concepts are explored, with user-friendly explanation of how to reflect them to realistic cases. Based on efficient analysis of the properties of security issues in chemical plants/clusters, models in this book are capable to support resources allocations, cost-effectiveness analysis, cooperation incentives and alike.


Intelligent Transport Systems – From Research and Development to the Market Uptake

Intelligent Transport Systems – From Research and Development to the Market Uptake

Author: Tatiana Kováčiková

Publisher: Springer

Published: 2018-07-06

Total Pages: 305

ISBN-13: 3319937103

DOWNLOAD EBOOK

This book constitutes the proceedings of the First International Conference on Intelligent Transport Systems, INTSYS 2107, which was held in Helsinki, Finland, in November 2017. The 30 revised full papers were selected from 47 submissions and are organized in 6 thematic sessions on planning and sustainable transport and smart cities, intelligent rail transport systems, transport modelling and simulation & big data application, ITS safety and security, cooperative ITS and autonomous driving, and intelligent traffic management.


Decision Economics: Minds, Machines, and their Society

Decision Economics: Minds, Machines, and their Society

Author: Edgardo Bucciarelli

Publisher: Springer Nature

Published: 2021-08-16

Total Pages: 287

ISBN-13: 3030755835

DOWNLOAD EBOOK

This book is the result of a multi-year research project led and sponsored by the University of Chieti-Pescara, National Chengchi University, University of Salamanca, and Osaka University. It is the fifth volume to emerge from that international project, held under the aegis of the United Nations Academic Impact in 2020. All the essays in this volume were (virtually) discussed at the University of L’Aquila―as the venue of the 2nd International Conference on Decision Economics, a three-day global gathering of approximately one hundred scholars and practitioners—and were subjected to thorough peer review by leading experts in the field. The essays reflect the extent, diversity, and richness of several research areas, both normative and descriptive, and are an invaluable resource for graduate-level and PhD students, academics, researchers, policymakers and other professionals, especially in the social and cognitive sciences. Given its interdisciplinary scope, the book subsequently delivers new approaches on how to contribute to the future of economics, providing alternative explanations for various socio-economic issues such as computable humanities; cognitive, behavioural, and experimental perspectives in economics; data analysis and machine learning as well as research areas at the intersection of computer science, artificial intelligence, mathematics, and statistics; agent-based modelling and the related. The editors are grateful to the scientific committee for its continuous support throughout the research project as well as to the many participants for their insightful comments and always probing questions. In any case, the collaboration involved in the project extends far beyond the group of authors published in this volume and is reflected in the quality of the essays published over the years.


Decision and Game Theory for Security

Decision and Game Theory for Security

Author: Radha Poovendran

Publisher: Springer

Published: 2014-10-03

Total Pages: 388

ISBN-13: 3319126016

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the 5th International Conference on Decision and Game Theory for Security, GameSec 2014, held in Los Angeles, CA, USA, in November 2014. The 16 revised full papers presented together with 7 short papers were carefully reviewed and selected from numerous submissions. The covered topics cover multiple facets of cyber security that include: rationality of adversary, game-theoretic cryptographic techniques, vulnerability discovery and assessment, multi-goal security analysis, secure computation, economic-oriented security, and surveillance for security. Those aspects are covered in a multitude of domains that include networked systems, wireless communications, border patrol security, and control systems.


Optimization, Learning, and Control for Interdependent Complex Networks

Optimization, Learning, and Control for Interdependent Complex Networks

Author: M. Hadi Amini

Publisher: Springer Nature

Published: 2020-02-22

Total Pages: 306

ISBN-13: 3030340945

DOWNLOAD EBOOK

This book focuses on a wide range of optimization, learning, and control algorithms for interdependent complex networks and their role in smart cities operation, smart energy systems, and intelligent transportation networks. It paves the way for researchers working on optimization, learning, and control spread over the fields of computer science, operation research, electrical engineering, civil engineering, and system engineering. This book also covers optimization algorithms for large-scale problems from theoretical foundations to real-world applications, learning-based methods to enable intelligence in smart cities, and control techniques to deal with the optimal and robust operation of complex systems. It further introduces novel algorithms for data analytics in large-scale interdependent complex networks. • Specifies the importance of efficient theoretical optimization and learning methods in dealing with emerging problems in the context of interdependent networks • Provides a comprehensive investigation of advance data analytics and machine learning algorithms for large-scale complex networks • Presents basics and mathematical foundations needed to enable efficient decision making and intelligence in interdependent complex networks M. Hadi Amini is an Assistant Professor at the School of Computing and Information Sciences at Florida International University (FIU). He is also the founding director of Sustainability, Optimization, and Learning for InterDependent networks laboratory (solid lab). He received his Ph.D. and M.Sc. from Carnegie Mellon University in 2019 and 2015 respectively. He also holds a doctoral degree in Computer Science and Technology. Prior to that, he received M.Sc. from Tarbiat Modares University in 2013, and the B.Sc. from Sharif University of Technology in 2011.