Skip to content
Open global navigation

Cambridge University Press

AcademicLocation selectorSearch toggleMain navigation toggle
Cart
Register Sign in Wishlist
Network Security

Network Security
A Decision and Game-Theoretic Approach

$125.00

  • Date Published: November 2010
  • availability: In stock
  • format: Hardback
  • isbn: 9780521119320

$125.00
Hardback

Add to cart Add to wishlist

Other available formats:
eBook


Looking for an examination copy?

If you are interested in the title for your course we can consider offering an examination copy. To register your interest please contact collegesales@cambridge.org providing details of the course you are teaching.

Description
Product filter button
Description
Contents
Resources
Courses
About the Authors
  • Covering attack detection, malware response, algorithm and mechanism design, privacy, and risk management, this comprehensive work applies unique quantitative models derived from decision, control, and game theories to understanding diverse network security problems. It provides the reader with a system-level theoretical understanding of network security, and is essential reading for researchers interested in a quantitative approach to key incentive and resource allocation issues in the field. It also provides practitioners with an analytical foundation that is useful for formalising decision-making processes in network security.

    • Provides a system-level theoretical understanding of network security problems for researchers and practitioners alike
    • Includes the information needed to build and use quantitative models for practical applications including intrusion detection, malware epidemics, and risk management
    • Contains introductory appendices on optimization, control, and game theory
    Read more

    Reviews & endorsements

    "Network security is a topic of crucial relevance for the information society and has been addressed by many books. Yet, modeling the reasons specific security decisions are made is a research topic still in its infancy. By its unique and in-depth treatment of the subject, this book is a landmark towards this ambitious goal." - Jean-Pierre Hubaux, EPFL, Switzerland

    "A decision and game theoretic approach has recently emerged as an important tool for addressing key issues in network security and risk management. This book provides a comprehensive account of this approach by two experts that have pioneered its development and demonstrates its high potential. It should be studied by anyone who aims to develop a thorough and multi-faceted understanding of the subject." - Nick Bambos, Stanford Univ., USA

    "The great advantage of this book is that the authors covered exhaustively theoretical background related to decision and game theories with a lot of motivating examples. The work is written without unnecessary complexity, while the organization is clear and the contents is well readable. I can recommend this position to researchers and graduate students as well as to engineers, mainly system administrators and security officers." - Marcin Niemiec, IEEE Communications, February 2012

    See more reviews

    Customer reviews

    Not yet reviewed

    Be the first to review

    Review was not posted due to profanity

    ×

    , create a review

    (If you're not , sign out)

    Please enter the right captcha value
    Please enter a star rating.
    Your review must be a minimum of 12 words.

    How do you rate this item?

    ×

    Product details

    • Date Published: November 2010
    • format: Hardback
    • isbn: 9780521119320
    • length: 332 pages
    • dimensions: 253 x 180 x 20 mm
    • weight: 0.8kg
    • contains: 74 b/w illus. 11 tables
    • availability: In stock
  • Table of Contents

    Preface
    Notation
    Part I. Introduction:
    1. Introduction
    2. Network security concepts
    Part II. Security Games:
    3. Deterministic security games
    4. Stochastic security games
    5. Security games with information limitations
    Part III. Decision Making for Network Security:
    6. Security risk management
    7. Resource allocation for security
    8. Usability, trust, and privacy
    Part IV. Security Attack and Intrusion Detection:
    9. Machine learning for intrusion and anomaly detection
    10. Hypothesis testing for attack detection
    A. Optimization, game theory, and optimal & robust control
    References
    Index.

  • Authors

    Tansu Alpcan, University of Melbourne
    Tansu Alpcan is an Assistant Professor at the Technical University of Berlin, and is concurrently affiliated with Deutsche Telekom Laboratories. His research involves applications of distributed decision making, game theory, and control to various security and resource allocation problems in complex and networked systems. Dr Alpcan is the recipient of multiple research awards from the University of Illinois, where he obtained his PhD degree, and has numerous publications in security, networking, control, and game theory.

    Tamer Başar, University of Illinois, Urbana-Champaign
    Tamer Başar holds several academic positions at the University of Illinois at Urbana-Champaign, and is currently the Editor-in-Chief of Automatica, Series Editor for Systems and Control: Foundations and Applications, and Managing Editor of the Annals of the International Society of Dynamic Games (ISDG). He is a member of the US National Academy of Engineering, Fellow of the IEEE and IFAC, founding president of the ISDG and current president of the AACC, and has published extensively in systems, control, communications, and dynamic games. Dr Başar has won a number of awards, including the Bellman Control Heritage Award of the AACC, the Bode Lecture Prize of the IEEE CSS and the Quazza Medal and Outstanding Service Award of IFAC.

Sign In

Please sign in to access your account

Cancel

Not already registered? Create an account now. ×

You are now leaving the Cambridge University Press website, your eBook purchase and download will be completed by our partner www.ebooks.com. Please see the permission section of the www.ebooks.com catalogue page for details of the print & copy limits on our eBooks.

Continue ×

Continue ×

Find content that relates to you

© Cambridge University Press 2014

Back to top

Are you sure you want to delete your account?

This cannot be undone.

Cancel Delete

Thank you for your feedback which will help us improve our service.

If you requested a response, we will make sure to get back to you shortly.

×
Please fill in the required fields in your feedback submission.
×