default search action
7th GameSec 2016: New York, NY, USA
- Quanyan Zhu, Tansu Alpcan, Emmanouil A. Panaousis, Milind Tambe, William Casey:
Decision and Game Theory for Security - 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings. Lecture Notes in Computer Science 9996, Springer 2016, ISBN 978-3-319-47412-0
Network Security
- Eitan Altman, Aniruddha Singhal, Corinne Touati, Jie Li:
Resilience of Routing in Parallel Link Networks. 3-17 - Hayreddin Çeker, Jun Zhuang, Shambhu J. Upadhyaya, Quang Duy La, Boon-Hee Soong:
Deception-Based Game Theoretical Approach to Mitigate DoS Attacks. 18-38 - Sara Marie McCarthy, Arunesh Sinha, Milind Tambe, Pratyusa Manadhata:
Data Exfiltration Detection and Prevention: Virtually Distributed POMDPs for Practically Safer Networks. 39-61 - Eirini-Eleni Tsiropoulou, John S. Baras, Symeon Papavassiliou, Gang Qu:
On the Mitigation of Interference Imposed by Intruders in Passive RFID Networks. 62-80
Security Risks and Investments
- Renaud Chicoisne, Fernando Ordóñez:
Risk Averse Stackelberg Security Games with Quantal Response. 83-100 - Ashish Ranjan Hota, Abraham A. Clements, Shreyas Sundaram, Saurabh Bagchi:
Optimal and Game-Theoretic Deployment of Security Investments in Interdependent Assets. 101-113 - Zhengyuan Zhou, Nicholas Bambos, Peter W. Glynn:
Dynamics on Linear Influence Network Games Under Stochastic Environments. 114-126
Special Track-Validating Models
- Steve Alpern, Thomas Lidbetter, Alec Morton, Katerina Papadaki:
Patrolling a Pipeline. 129-138 - Ayan Mukhopadhyay, Chao Zhang, Yevgeniy Vorobeychik, Milind Tambe, Kenneth Pence, Paul Speer:
Optimal Allocation of Police Patrol Resources Using a Continuous-Time Crime Model. 139-158 - Ziad Ismail, Jean Leneutre, David Bateman, Lin Chen:
A Methodology to Apply a Game Theoretic Model of Security Risks Interdependencies Between ICT and Electric Infrastructures. 159-171
Decision Making for Privacy
- Tristan Caulfield, Christos Ioannidis, David J. Pym:
On the Adoption of Privacy-enhancing Technologies. 175-194 - Sadegh Farhang, Jens Grossklags:
FlipLeakage: A Game-Theoretic Approach to Protect Against Stealthy Attackers in the Presence of Information Leakage. 195-214 - M. Kivanç Mihçak, Emrah Akyol, Tamer Basar, Cédric Langbort:
Scalar Quadratic-Gaussian Soft Watermarking Games. 215-234 - Chris Culnane, Vanessa Teague:
Strategies for Voter-Initiated Election Audits. 235-247
Security Games
- Anjon Basak, Fei Fang, Thanh Hong Nguyen, Christopher Kiekintveld:
Combining Graph Contraction and Strategy Generation for Green Security Games. 251-271 - Shahrzad Gholami, Bryan Wilder, Matthew Brown, Dana Thomas, Nicole D. Sintov, Milind Tambe:
Divide to Defend: Collusive Security Games. 272-293 - Mohammad A. Noureddine, Ahmed M. Fawaz, William H. Sanders, Tamer Basar:
A Game-Theoretic Approach to Respond to Attacker Lateral Movement. 294-313 - Stefan Rass, Quanyan Zhu:
GADAPT: A Sequential Game-Theoretic Framework for Designing Defense-in-Depth Strategies Against Advanced Persistent Threats. 314-326
Incentives and Cybersecurity Mechanisms
- Juntao Chen, Quanyan Zhu:
Optimal Contract Design Under Asymmetric Information for Cloud-Enabled Internet of Controlled Things. 329-348 - Aron Laszka, Galina Schwartz:
Becoming Cybercriminals: Incentives in Networks with Interdependent Security - Incentives in Networks with Interdependent Security. 349-369 - Gabrielle Anderson, Guy McCusker, David J. Pym:
A Logic for the Compliance Budget. 370-381 - Amin Mohammadi, Mohammad Hossein Manshaei, Monireh Mohebbi Moghaddam, Quanyan Zhu:
A Game-Theoretic Analysis of Deception over Social Networks Using Fake Avatars. 382-394
Intrusion Detection and Information Limitations in Security
- Marcin Dziubinski, Piotr Sankowski, Qiang Zhang:
Network Elicitation in Adversarial Environment. 397-414 - Amin Ghafouri, Waseem Abbas, Aron Laszka, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos:
Optimal Thresholds for Anomaly-Based Intrusion Detection in Dynamical Environments. 415-434 - Karel Horák, Branislav Bosanský:
A Point-Based Approximate Algorithm for One-Sided Partially Observable Pursuit-Evasion Games. 435-454 - Kassem Kallas, Benedetta Tondi, Riccardo Lazzeretti, Mauro Barni:
Consensus Algorithm with Censored Data for Distributed Detection with Corrupted Measurements: A Game-Theoretic Approach. 455-466
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.