


default search action
8th GameSec 2017: Vienna, Austria
- Stefan Rass, Bo An, Christopher Kiekintveld, Fei Fang, Stefan Schauer:

Decision and Game Theory for Security - 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings. Lecture Notes in Computer Science 10575, Springer 2017, ISBN 978-3-319-68710-0
Full Papers
- Ariel Rosenfeld

, Oleg Maksimov, Sarit Kraus
:
Optimizing Traffic Enforcement: From the Lab to the Roads. 3-20 - Yevhen Zolotavkin, Julián García, Carsten Rudolph

:
Incentive Compatibility of Pay Per Last N Shares in Bitcoin Mining Pools. 21-39 - Bastián Bahamondes, José Correa, Jannik Matuschke, Gianpaolo Oriolo:

Adaptivity in Network Interdiction. 40-52 - Matteo Campanelli

, Rosario Gennaro:
Efficient Rational Proofs for Space Bounded Computations. 53-73 - Yun Ai, Manav R. Bhatnagar, Michael Cheffena

, Aashish Mathur
, Artem A. Sedakov
:
Game-Theoretical Analysis of PLC System Performance in the Presence of Jamming Attacks. 74-90 - Muhammed O. Sayin

, Tamer Basar:
Secure Sensor Design for Cyber-Physical Systems Against Advanced Persistent Threats. 91-111 - Sarah Michele Rajtmajer, Anna Cinzia Squicciarini

, Jose M. Such
, Justin Semonsen, Andrew Belmonte:
An Ultimatum Game Model for the Evolution of Privacy in Jointly Managed Content. 112-130 - Tristan Caulfield

, Christos Ioannidis, David J. Pym:
The U.S. Vulnerabilities Equities Process: An Economic Perspective. 131-150 - Thanh Hong Nguyen, Michael P. Wellman

, Satinder Singh:
A Stackelberg Game Model for Botnet Data Exfiltration. 151-170 - Karel Durkota, Viliam Lisý, Christopher Kiekintveld, Karel Horák, Branislav Bosanský, Tomás Pevný

:
Optimal Strategies for Detecting Data Exfiltration by Internal and External Attackers. 171-192 - Victor Bucarey

, Carlos Casorrán
, Óscar Figueroa, Karla Rosas, Hugo F. Navarrete, Fernando Ordóñez
:
Building Real Stackelberg Security Games for Border Patrols. 193-212 - Tao Zhang, Quanyan Zhu:

Strategic Defense Against Deceptive Civilian GPS Spoofing of Unmanned Aerial Vehicles. 213-233 - Ziad Ismail, Christophe Kiennert, Jean Leneutre, Lin Chen:

A Game Theoretical Model for Optimal Distribution of Network Security Resources. 234-255 - Samuel Ang, Hau Chan, Albert Xin Jiang, William Yeoh

:
Game-Theoretic Goal Recognition Models with Applications to Security Domains. 256-272 - Karel Horák, Quanyan Zhu, Branislav Bosanský:

Manipulating Adversary's Belief: A Dynamic Game Approach to Deception by Design for Proactive Network Security. 273-294 - Xiaobing He, Hermann de Meer:

A Stochastic Game-Theoretic Model for Smart Grid Communication Networks. 295-314 - Xiaotao Feng, Zizhan Zheng, Prasant Mohapatra, Derya Cansever:

A Stackelberg Game and Markov Modeling of Moving Target Defense. 315-335 - Jeffrey Pawlick, Quanyan Zhu:

Proactive Defense Against Physical Denial of Service Attacks Using Poisson Signaling Games. 336-356 - Linan Huang

, Juntao Chen, Quanyan Zhu:
A Large-Scale Markov Game Approach to Dynamic Protection of Interdependent Infrastructure Networks. 357-376 - Elizabeth Bondi, Fei Fang

, Debarun Kar, Venil Loyd Noronha, Donnabell Dmello, Milind Tambe, Arvind Iyer, Robert Hannaford:
VIOLA: Video Labeling Application for Security Domains. 377-396 - Aron Laszka

, Sadegh Farhang, Jens Grossklags:
On the Economics of Ransomware. 397-417 - Jinshu Cui, Heather Rosoff, Richard S. John:

Deterrence of Cyber Attackers in a Three-Player Behavioral Game. 418-436 - Mário S. Alvim

, Konstantinos Chatzikokolakis, Yusuke Kawamoto
, Catuscia Palamidessi
:
Information Leakage Games. 437-457 - Haifeng Xu, Benjamin J. Ford, Fei Fang

, Bistra Dilkina
, Andrew J. Plumptre, Milind Tambe, Margaret Driciru, Fred Wanyama, Aggrey Rwetsiba, Mustapha Nsubaga, Joshua Mabonga:
Optimal Patrol Planning for Green Security Games with Black-Box Attackers. 458-477
Short Papers
- Corine M. Laan, Ana Isabel Barros

, Richard J. Boucherie
, Herman Monsuur
:
Security Games with Probabilistic Constraints on the Agent's Strategy. 481-493 - Stefan Rass

, Sandra König
, Stefan Schauer:
On the Cost of Game Playing: How to Control the Expenses in Mixed Strategies. 494-505 - Yezekael Hayel, Quanyan Zhu:

Dynamics of Strategic Protection Against Virus Propagation in Heterogeneous Complex Networks. 506-518 - Deepak K. Tosh

, Iman Vakilinia
, Sachin Shetty
, Shamik Sengupta, Charles A. Kamhoua, Laurent Njilla, Kevin A. Kwiat:
Three Layer Game Theoretic Decision Framework for Cyber-Investment and Cyber-Insurance. 519-532

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














