Readings Newsletter
Become a Readings Member to make your shopping experience even easier.
Sign in or sign up for free!
You’re not far away from qualifying for FREE standard shipping within Australia
You’ve qualified for FREE standard shipping within Australia
The cart is loading…
This title is printed to order. This book may have been self-published. If so, we cannot guarantee the quality of the content. In the main most books will have gone through the editing process however some may not. We therefore suggest that you be aware of this before ordering this book. If in doubt check either the author or publisher’s details as we are unable to accept any returns unless they are faulty. Please contact us if you have any questions.
"Behavioral Game Theory Analysis of Cybersecurity With Deception and IDS" presents a comprehensive study of cybersecurity in the context of game theory, deception, and Intrusion Detection Systems (IDS). The book delves into the behavioral aspects of cybersecurity, particularly how human behaviors and decisions can influence the security of computer networks. The author discusses various techniques for detecting and mitigating cyber attacks using deception and IDS, including game-theoretic models and algorithms. The book is aimed at researchers and practitioners in the fields of cybersecurity, game theory, and computer science. It provides a valuable resource for those looking to gain insights into the complex nature of cybersecurity and the role of human behavior in defending against cyber threats. The author, Palvi Aggarwal, is an expert in the field of cybersecurity and has extensive experience in research and development of game-theoretic models for cybersecurity. Her work has been published in various international journals and conferences. Overall, "Behavioral Game Theory Analysis of Cybersecurity With Deception and IDS" is a must-read for anyone interested in understanding the interplay between human behavior, game theory, and cybersecurity. The book offers a unique perspective on the subject and provides practical insights into the design and implementation of effective cybersecurity strategies.
$9.00 standard shipping within Australia
FREE standard shipping within Australia for orders over $100.00
Express & International shipping calculated at checkout
This title is printed to order. This book may have been self-published. If so, we cannot guarantee the quality of the content. In the main most books will have gone through the editing process however some may not. We therefore suggest that you be aware of this before ordering this book. If in doubt check either the author or publisher’s details as we are unable to accept any returns unless they are faulty. Please contact us if you have any questions.
"Behavioral Game Theory Analysis of Cybersecurity With Deception and IDS" presents a comprehensive study of cybersecurity in the context of game theory, deception, and Intrusion Detection Systems (IDS). The book delves into the behavioral aspects of cybersecurity, particularly how human behaviors and decisions can influence the security of computer networks. The author discusses various techniques for detecting and mitigating cyber attacks using deception and IDS, including game-theoretic models and algorithms. The book is aimed at researchers and practitioners in the fields of cybersecurity, game theory, and computer science. It provides a valuable resource for those looking to gain insights into the complex nature of cybersecurity and the role of human behavior in defending against cyber threats. The author, Palvi Aggarwal, is an expert in the field of cybersecurity and has extensive experience in research and development of game-theoretic models for cybersecurity. Her work has been published in various international journals and conferences. Overall, "Behavioral Game Theory Analysis of Cybersecurity With Deception and IDS" is a must-read for anyone interested in understanding the interplay between human behavior, game theory, and cybersecurity. The book offers a unique perspective on the subject and provides practical insights into the design and implementation of effective cybersecurity strategies.