default search action
5th GameSec 2014: Los Angeles, CA, USA
- Radha Poovendran, Walid Saad:
Decision and Game Theory for Security - 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings. Lecture Notes in Computer Science 8840, Springer 2014, ISBN 978-3-319-12600-5
Full Papers
- Chao Zhang, Albert Xin Jiang, Martin B. Short, P. Jeffrey Brantingham, Milind Tambe:
Defending Against Opportunistic Criminals: New Game-Theoretic Frameworks and Algorithms. 3-22 - Matthew Brown, William B. Haskell, Milind Tambe:
Addressing Scalability and Robustness in Security Games with Multiple Boundedly Rational Adversaries. 23-42 - Michael P. Wellman, Achintya Prakash:
Empirical Game-Theoretic Analysis of an Adaptive Cyber-Defense Scenario (Preliminary Report). 43-58 - M. H. R. Khouzani, Viet Pham, Carlos Cid:
Strategic Discovery and Sharing of Vulnerabilities in Competitive Environments. 59-78 - Viet Pham, M. H. R. Khouzani, Carlos Cid:
Optimal Contracts for Outsourced Computation. 79-98 - Mohammad Rasouli, Erik Miehling, Demosthenis Teneketzis:
A Supervisory Control Approach to Dynamic Cyber-Security. 99-117 - Stefan Rass, Benjamin Rainer:
Numerical Computation of Multi-goal Security Strategies. 118-133 - John Ross Wallrabenstein, Chris Clifton:
Realizable Rational Multiparty Cryptographic Protocols. 134-154 - Aleksandr Lenin, Ahto Buldas:
Limiting Adversarial Budget in Quantitative Security Assessment. 155-174 - Aron Laszka, Gábor Horváth, Márk Félegyházi, Levente Buttyán:
FlipThem: Modeling Targeted Attacks with FlipIt for Multiple Resources. 175-194 - Emmanouil A. Panaousis, Tansu Alpcan, Hossein Fereidooni, Mauro Conti:
Secure Message Delivery Games for Device-to-Device Communications. 195-215 - Abhishek Gupta, Tamer Basar, Galina A. Schwartz:
A Three-Stage Colonel Blotto Game: When to Provide More Information to an Adversary. 216-233 - Ji Liu, Tamer Basar:
Toward Optimal Network Topology Design for Fast and Secure Distributed Computation. 234-245 - Yu Pu, Jens Grossklags:
An Economic Model and Simulation Results of App Adoption Decisions on Networks with Interdependent Privacy Consequences. 246-265 - Emmanouil A. Panaousis, Andrew Fielder, Pasquale Malacaria, Chris Hankin, Fabrizio Smeraldi:
Cybersecurity Games and Investments: A Decision Support Approach. 266-286 - Brahim Djebaili, Christophe Kiennert, Jean Leneutre, Lin Chen:
Data Integrity and Availability Verification Game in Untrusted Cloud Storage. 287-306
Short Papers
- Jinshu Cui, Richard S. John:
Empirical Comparisons of Descriptive Multi-objective Adversary Models in Stackelberg Security Games. 309-318 - Sadegh Farhang, Mohammad Hossein Manshaei, Milad Nasr Esfahani, Quanyan Zhu:
A Dynamic Bayesian Security Game Framework for Strategic Defense Mechanism Design. 319-328 - Armin Sarabi, Parinaz Naghizadeh, Mingyan Liu:
Can Less Be More? A Game-Theoretic Analysis of Filtering vs. Investment. 329-339 - Richard Klíma, Christopher Kiekintveld, Viliam Lisý:
Online Learning Methods for Border Patrol Resource Allocation. 340-349 - Jianhua Zhang, Prateek Jaipuria, Aranya Chakrabortty, Alefiya Hussain:
A Distributed Optimization Algorithm for Attack-Resilient Wide-Area Monitoring of Power Systems: Theoretical and Experimental Methods. 350-359 - Charles A. Kamhoua, Manuel Rodríguez, Kevin A. Kwiat:
Testing for Hardware Trojans: A Game-Theoretic Approach. 360-369 - Sourabh Bhattacharya, Tamer Basar, Maurizio Falcone:
Surveillance for Security as a Pursuit-Evasion Game. 370-379
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.