Game theory for security and risk management. From theory to practice (Q1708220)
From MaRDI portal
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | Game theory for security and risk management. From theory to practice |
scientific article |
Statements
Game theory for security and risk management. From theory to practice (English)
0 references
4 April 2018
0 references
This volume includes contributions to various fields of game theory utilized to optimize security and risk management strategies. Chapters of the volume authored by scientists representing different institutions from many countries are organized in three parts. The first part is devoted to mathematical frameworks and theories of games and decision making which can be used to model security risk assessment. The chapters included in this part discuss both deterministic and stochastic approaches to conflict situations and both static and dynamic types of games arising from these situations. Combinations of these approaches and types of games are also considered. The second part of the volume deals with practical problems related to the models discussed in the first part. The authors in their chapters consider problems related to choice of parameters of the selected models which may be implemented to solve practical security and risk management tasks. The examples include surveillance systems, cyber-attacks in interconnected networks, power grids, independencies between layers of an infrastructure of different kinds. The last part presents selected examples of successful applications of game theory methods and models in real life problems. The chapters included in this part discuss security in cloud computing, risk management in interconnected networks, protecting of water utility networks, physical surveillance of critical infrastructures and others. The volume may be interested both for mathematicians and engineers looking for applications of their knowledge in economy and managers who have to solve practical risk and security problems arising in real life. An obvious difficulty resulting from diversity of the authors and the problems is the heterogeneity of the volume. On the other hand a potential reader may select one or more chapters and study only material included in these chapters.
0 references
game theory
0 references
security and risk management
0 references
applications
0 references