


default search action
15th GameSec 2024: Athens, Greece - Part II
- John S. Baras

, Symeon Papavassiliou
, Eirini-Eleni Tsiropoulou
, Muhammed O. Sayin
:
Game Theory and AI for Security - 16th International Conference, GameSec 2025, Athens, Greece, October 13-15, 2025, Proceedings, Part II. Lecture Notes in Computer Science 16224, Springer 2026, ISBN 978-3-032-08066-0
Strategic Defense and Robustness
- Richard L. Frost

, Betty H. C. Cheng
, Shaunak D. Bopardikar
:
Worst Case Assurance Guarantees for Black-Box Perimeter Defense Policies. 3-22 - Asif Rahman, Carlos Natividad, Md. Abu Sayed, Palvi Aggarwal, Christopher D. Kiekintveld:

Using Choice Overload to Degrade Cyber Attacks. 23-42 - Qintong Xie, Edward Koh, Xavier Cadet

, Sang (Peter) Chin
:
Nash Q-Network for Multi-agent Cybersecurity Simulation. 43-60 - Soyon Choi, Scott Alfeld:

Theoretical Bounds on the Adversarial Robustness of Reduced-Rank Regression. 61-80 - Ahmad Bilal Asghar

, Ahmed Hemida
, Charles A. Kamhoua
, Jon M. Kleinberg
:
Strategic Defense Allocation in Cyber-Physical Sensor Systems Under Dual-Domain Attacks. 81-100
Applications in Security and Networks
- Jakub Cerný, Garud Iyengar, Christian Kroer:

Contested Route Planning. 103-123 - Lina Alkarmi

, Ziyuan Huang
, Mingyan Liu
:
When In Doubt, Abstain: The Impact of Abstention on Strategic Classification. 124-144 - Dev Dipak Patel

, Suli Adeniye
, Arunabha Sen
:
Human Trafficking Interdiction Problem: A Game Theoretic Approach for Finding the Best Strategy for the Law Enforcement Agencies. 145-166 - John Carter

, Spiros Mancoridis
, Pavlos Protopapas
, Brian S. Mitchell
:
contrastBERT: Behavioral Anomaly Detection for Malware Using Contrastive Learning. 167-186 - Sofia Barkatsa

, Panagiotis Charatsaris
, Maria Diamanti
, Symeon Papavassiliou
:
Secure and Power-Efficient Multi-user Scheduling in Semi-Grant-Free NOMA Networks: A Coalition Game Approach. 187-206
Emerging Threats and Anomaly Detection
- Yongzhao Wang

, Tariq Elahi
, Vasilios Mavroudis
, Edward Plumb
, Rahul Savani
, Theodore L. Turocy
:
Empirical Mixnet Design. 209-227 - Muhammad Akram Al Bari, Quanyan Zhu

:
A Gestalt Game-Theoretic Framework for Designing Agentic AI Workflows in Cyber Deception. 228-248 - Asim Zoulkarni, Sai Sandeep Damera, John S. Baras:

Probabilistic and Predictive Strategies Against Zero-Day Advanced Persistent Threats in Robotic Systems. 249-272 - Andrzej Kaczmarczyk

, Davin Choo
, Niclas Boehmer
, Milind Tambe
, Haifeng Xu
:
On Sequential Fault-Intolerant Process Planning. 273-293 - Mahshid Noorani, Aniruddh Gopinath Puranic, Jack Mirenzi, John S. Baras:

Self-supervised Time-Series Anomaly Detection with Temporal Logic Explanations. 294-312 - Zixin Ye

, Shijie Liu
, Tansu Alpcan
, Christopher Leckie
:
(Poster) Adversarial Training Under Data Exclusion Attacks as a Zero-Sum Game. 313-316 - Takuma Adams

, Andrew C. Cullen
, Tansu Alpcan
:
(Poster) Physics-Informed Value Approximation for Pursuit-Evasion Games. 317-320 - Stefan Rass

, Beniamin Radomir Jablonski, Victor Mayoral Vilches:
(Poster) Zero-Day Risk Estimation Using Security Games. 321-325

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














