default search action
1st GameSec 2010: Berlin, Germany
- Tansu Alpcan, Levente Buttyán, John S. Baras:
Decision and Game Theory for Security - First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings. Lecture Notes in Computer Science 6442, Springer 2010, ISBN 978-3-642-17196-3
Security Investments and Planning
- Assane Gueye, Jean C. Walrand, Venkat Anantharam:
Design of Network Topology in an Adversarial Environment. 1-20 - Rainer Böhme, Márk Félegyházi:
Optimal Information Security Investment with Penetration Testing. 21-37
Privacy and Anonymity
- Mathias Humbert, Mohammad Hossein Manshaei, Julien Freudiger, Jean-Pierre Hubaux:
Tracking Games in Mobile Networks. 38-57 - Nan Zhang, Wei Yu, Xinwen Fu, Sajal K. Das:
gPath: A Game-Theoretic Path Selection Algorithm to Protect Tor's Anonymity. 58-71 - Murat Kantarcioglu, Alain Bensoussan, SingRu Celine Hoe:
When Do Firms Invest in Privacy-Preserving Technologies? 72-86
Adversarial and Robust Control
- Eitan Altman, Tamer Basar, Veeraruna Kavitha:
Adversarial Control in a Delay Tolerant Network. 87-106 - Saurabh Amin, Galina A. Schwartz, S. Shankar Sastry:
Security Interdependencies for Networked Control Systems with Identical Agents. 107-122 - Eitan Altman, Alireza Aram, Tamer Basar, Corinne Touati, Saswati Sarkar:
Robust Control in Sparse Mobile Ad-Hoc Networks. 123-134
Network Security and Botnets
- Alain Bensoussan, Murat Kantarcioglu, SingRu Celine Hoe:
A Game-Theoretical Approach for Finding Optimal Strategies in a Botnet Defense Model. 135-148 - Nevena Vratonjic, Mohammad Hossein Manshaei, Maxim Raya, Jean-Pierre Hubaux:
ISPs and Ad Networks Against Botnet Ad Fraud. 149-167 - Nicola Gatti, Mattia Monga, Sabrina Sicari:
A Localization Game in Wireless Sensor Networks. 168-179 - Alberto Volpatto, Federico Maggi, Stefano Zanero:
Effective Multimodel Anomaly Detection Using Cooperative Negotiation. 180-191
Authorization and Authentication
- Sören Preibusch, Joseph Bonneau:
The Password Game: Negative Externalities from Weak Password Practices. 192-207 - Farzad Salim, Jason Reid, Uwe Dulleck, Ed Dawson:
Towards a Game Theoretic Authorisation Model. 208-219
Theory and Algorithms for Security
- Steve Alpern, Robbert Fokkink, Joram op den Kelder, Tom Lidbetter:
Disperse or Unite? A Mathematical Model of Coordinated Attack. 220-233 - Benjamin Johnson, Jens Grossklags, Nicolas Christin, John Chuang:
Uncertainty in Interdependent Security Games. 234-244 - Barbara Kordy, Sjouke Mauw, Matthijs Melissen, Patrick Schweitzer:
Attack-Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent. 245-256 - Christopher Kiekintveld, Janusz Marecki, Milind Tambe:
Methods and Algorithms for Infinite Bayesian Stackelberg Security Games - (Extended Abstract). 257-265
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.