Book contents
- Frontmatter
- Contents
- Preface
- Acknowledgments
- Artwork
- Notation
- Part I Introduction
- Part II Security games
- 3 Deterministic security games
- 4 Stochastic security games
- 5 Security games with information limitations
- Part III Decision making for network security
- Part IV Security attack and intrusion detection
- A Optimization, game theory, and optimal and robust control
- References
- Index
4 - Stochastic security games
from Part II - Security games
Published online by Cambridge University Press: 02 December 2010
- Frontmatter
- Contents
- Preface
- Acknowledgments
- Artwork
- Notation
- Part I Introduction
- Part II Security games
- 3 Deterministic security games
- 4 Stochastic security games
- 5 Security games with information limitations
- Part III Decision making for network security
- Part IV Security attack and intrusion detection
- A Optimization, game theory, and optimal and robust control
- References
- Index
Summary
- Type
- Chapter
- Information
- Network SecurityA Decision and Game-Theoretic Approach, pp. 74 - 97Publisher: Cambridge University PressPrint publication year: 2010