![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
13th GameSec 2022: Pittsburgh, PA, USA
- Fei Fang
, Haifeng Xu, Yezekael Hayel:
Decision and Game Theory for Security - 13th International Conference, GameSec 2022, Pittsburgh, PA, USA, October 26-28, 2022, Proceedings. Lecture Notes in Computer Science 13727, Springer 2023, ISBN 978-3-031-26368-2
Deception in Security
- Thanh Hong Nguyen, Amulya Yadav:
The Risk of Attacker Behavioral Learning: Can Attacker Fool Defender Under Uncertainty? 3-22 - Ryan Gabrys
, Mark Bilinski
, Justin Mauger
, Daniel Silva
, Sunny Fugate
:
Casino Rationale: Countering Attacker Deception in Zero-Sum Stackelberg Security Games of Bounded Rationality. 23-43 - Md. Abu Sayed
, Ahmed H. Anwar
, Christopher Kiekintveld
, Branislav Bosanský
, Charles A. Kamhoua
:
Cyber Deception Against Zero-Day Attacks: A Game Theoretic Approach. 44-63
Planning and Learning in Dynamic Environments
- Jie Fu
:
On Almost-Sure Intention Deception Planning that Exploits Imperfect Observers. 67-86 - Siddhant Bhambri, Purv Chauhan, Frederico Araujo, Adam Doupé, Subbarao Kambhampati:
Using Deception in Markov Game to Understand Adversarial Behaviors Through a Capture-The-Flag Environment. 87-106 - Henger Li, Zizhan Zheng:
Robust Moving Target Defense Against Unknown Attacks: A Meta-reinforcement Learning Approach. 107-126
Security Games
- Stefan Rass
, Sandra König
:
Synchronization in Security Games. 129-148 - Tomás Kroupa
, Tomás Votroubek
:
Multiple Oracle Algorithm to Solve Continuous Games. 149-167 - Shivam Bajaj
, Shaunak D. Bopardikar
:
Optimal Pursuit of Surveilling Agents Near a High Value Target. 168-187
Adversarial Learning and Optimization
- Yunian Pan
, Quanyan Zhu
:
On Poisoned Wardrop Equilibrium in Congestion Games. 191-211 - Anindya Sarkar, Jiarui Feng, Yevgeniy Vorobeychik, Christopher D. Gill, Ning Zhang:
Reward Delay Attacks on Deep Reinforcement Learning. 212-230 - Sarah Eve Kinsey, Wong Wai Tuck, Arunesh Sinha, Thanh Hong Nguyen:
An Exploration of Poisoning Attacks on Data-Based Decision Making. 231-252
Novel Applications and New Game Models
- Olivier Tsemogne
, Willie Kouam
, Ahmed H. Anwar
, Yezekael Hayel
, Charles A. Kamhoua
, Gabriel Deugoue
:
A Network Centrality Game for Epidemic Control. 255-273 - Olivier Tsemogne
, Yezekael Hayel
, Charles A. Kamhoua
, Gabriel Deugoue
:
Optimizing Intrusion Detection Systems Placement Against Network Virus Spreading Using a Partially Observable Stochastic Minimum-Threat Path Game. 274-296 - Sanjay Bhattacherjee
, Palash Sarkar
:
Voting Games to Model Protocol Stability and Security of Proof-of-Work Cryptocurrencies. 297-318
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.