Search dblp for Publications

export results for "toc:db/conf/gamesec/gamesec2010.bht:"

 download as .bib file

@inproceedings{DBLP:conf/gamesec/AlpernFKL10,
  author       = {Steve Alpern and
                  Robbert Fokkink and
                  Joram op den Kelder and
                  Tom Lidbetter},
  editor       = {Tansu Alpcan and
                  Levente Butty{\'{a}}n and
                  John S. Baras},
  title        = {Disperse or Unite? {A} Mathematical Model of Coordinated Attack},
  booktitle    = {Decision and Game Theory for Security - First International Conference,
                  GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6442},
  pages        = {220--233},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17197-0\_15},
  doi          = {10.1007/978-3-642-17197-0\_15},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/AlpernFKL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/AltmanABTS10,
  author       = {Eitan Altman and
                  Alireza Aram and
                  Tamer Basar and
                  Corinne Touati and
                  Saswati Sarkar},
  editor       = {Tansu Alpcan and
                  Levente Butty{\'{a}}n and
                  John S. Baras},
  title        = {Robust Control in Sparse Mobile Ad-Hoc Networks},
  booktitle    = {Decision and Game Theory for Security - First International Conference,
                  GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6442},
  pages        = {123--134},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17197-0\_8},
  doi          = {10.1007/978-3-642-17197-0\_8},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/AltmanABTS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/AltmanBK10,
  author       = {Eitan Altman and
                  Tamer Basar and
                  Veeraruna Kavitha},
  editor       = {Tansu Alpcan and
                  Levente Butty{\'{a}}n and
                  John S. Baras},
  title        = {Adversarial Control in a Delay Tolerant Network},
  booktitle    = {Decision and Game Theory for Security - First International Conference,
                  GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6442},
  pages        = {87--106},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17197-0\_6},
  doi          = {10.1007/978-3-642-17197-0\_6},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/AltmanBK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/AminSS10,
  author       = {Saurabh Amin and
                  Galina A. Schwartz and
                  S. Shankar Sastry},
  editor       = {Tansu Alpcan and
                  Levente Butty{\'{a}}n and
                  John S. Baras},
  title        = {Security Interdependencies for Networked Control Systems with Identical
                  Agents},
  booktitle    = {Decision and Game Theory for Security - First International Conference,
                  GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6442},
  pages        = {107--122},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17197-0\_7},
  doi          = {10.1007/978-3-642-17197-0\_7},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/AminSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/BensoussanKH10,
  author       = {Alain Bensoussan and
                  Murat Kantarcioglu and
                  SingRu Celine Hoe},
  editor       = {Tansu Alpcan and
                  Levente Butty{\'{a}}n and
                  John S. Baras},
  title        = {A Game-Theoretical Approach for Finding Optimal Strategies in a Botnet
                  Defense Model},
  booktitle    = {Decision and Game Theory for Security - First International Conference,
                  GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6442},
  pages        = {135--148},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17197-0\_9},
  doi          = {10.1007/978-3-642-17197-0\_9},
  timestamp    = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/BensoussanKH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/BohmeF10,
  author       = {Rainer B{\"{o}}hme and
                  M{\'{a}}rk F{\'{e}}legyh{\'{a}}zi},
  editor       = {Tansu Alpcan and
                  Levente Butty{\'{a}}n and
                  John S. Baras},
  title        = {Optimal Information Security Investment with Penetration Testing},
  booktitle    = {Decision and Game Theory for Security - First International Conference,
                  GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6442},
  pages        = {21--37},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17197-0\_2},
  doi          = {10.1007/978-3-642-17197-0\_2},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/BohmeF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/GattiMS10,
  author       = {Nicola Gatti and
                  Mattia Monga and
                  Sabrina Sicari},
  editor       = {Tansu Alpcan and
                  Levente Butty{\'{a}}n and
                  John S. Baras},
  title        = {A Localization Game in Wireless Sensor Networks},
  booktitle    = {Decision and Game Theory for Security - First International Conference,
                  GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6442},
  pages        = {168--179},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17197-0\_11},
  doi          = {10.1007/978-3-642-17197-0\_11},
  timestamp    = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/GattiMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/GueyeWA10,
  author       = {Assane Gueye and
                  Jean C. Walrand and
                  Venkat Anantharam},
  editor       = {Tansu Alpcan and
                  Levente Butty{\'{a}}n and
                  John S. Baras},
  title        = {Design of Network Topology in an Adversarial Environment},
  booktitle    = {Decision and Game Theory for Security - First International Conference,
                  GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6442},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17197-0\_1},
  doi          = {10.1007/978-3-642-17197-0\_1},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/GueyeWA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/HumbertMFH10,
  author       = {Mathias Humbert and
                  Mohammad Hossein Manshaei and
                  Julien Freudiger and
                  Jean{-}Pierre Hubaux},
  editor       = {Tansu Alpcan and
                  Levente Butty{\'{a}}n and
                  John S. Baras},
  title        = {Tracking Games in Mobile Networks},
  booktitle    = {Decision and Game Theory for Security - First International Conference,
                  GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6442},
  pages        = {38--57},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17197-0\_3},
  doi          = {10.1007/978-3-642-17197-0\_3},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/HumbertMFH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/JohnsonGCC10,
  author       = {Benjamin Johnson and
                  Jens Grossklags and
                  Nicolas Christin and
                  John Chuang},
  editor       = {Tansu Alpcan and
                  Levente Butty{\'{a}}n and
                  John S. Baras},
  title        = {Uncertainty in Interdependent Security Games},
  booktitle    = {Decision and Game Theory for Security - First International Conference,
                  GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6442},
  pages        = {234--244},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17197-0\_16},
  doi          = {10.1007/978-3-642-17197-0\_16},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/JohnsonGCC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/KantarciogluBH10,
  author       = {Murat Kantarcioglu and
                  Alain Bensoussan and
                  SingRu Celine Hoe},
  editor       = {Tansu Alpcan and
                  Levente Butty{\'{a}}n and
                  John S. Baras},
  title        = {When Do Firms Invest in Privacy-Preserving Technologies?},
  booktitle    = {Decision and Game Theory for Security - First International Conference,
                  GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6442},
  pages        = {72--86},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17197-0\_5},
  doi          = {10.1007/978-3-642-17197-0\_5},
  timestamp    = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/KantarciogluBH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/KiekintveldMT10,
  author       = {Christopher Kiekintveld and
                  Janusz Marecki and
                  Milind Tambe},
  editor       = {Tansu Alpcan and
                  Levente Butty{\'{a}}n and
                  John S. Baras},
  title        = {Methods and Algorithms for Infinite Bayesian Stackelberg Security
                  Games - (Extended Abstract)},
  booktitle    = {Decision and Game Theory for Security - First International Conference,
                  GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6442},
  pages        = {257--265},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17197-0\_18},
  doi          = {10.1007/978-3-642-17197-0\_18},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/KiekintveldMT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/KordyMMS10,
  author       = {Barbara Kordy and
                  Sjouke Mauw and
                  Matthijs Melissen and
                  Patrick Schweitzer},
  editor       = {Tansu Alpcan and
                  Levente Butty{\'{a}}n and
                  John S. Baras},
  title        = {Attack-Defense Trees and Two-Player Binary Zero-Sum Extensive Form
                  Games Are Equivalent},
  booktitle    = {Decision and Game Theory for Security - First International Conference,
                  GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6442},
  pages        = {245--256},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17197-0\_17},
  doi          = {10.1007/978-3-642-17197-0\_17},
  timestamp    = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/KordyMMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/PreibuschB10,
  author       = {S{\"{o}}ren Preibusch and
                  Joseph Bonneau},
  editor       = {Tansu Alpcan and
                  Levente Butty{\'{a}}n and
                  John S. Baras},
  title        = {The Password Game: Negative Externalities from Weak Password Practices},
  booktitle    = {Decision and Game Theory for Security - First International Conference,
                  GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6442},
  pages        = {192--207},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17197-0\_13},
  doi          = {10.1007/978-3-642-17197-0\_13},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/PreibuschB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/SalimRDD10,
  author       = {Farzad Salim and
                  Jason Reid and
                  Uwe Dulleck and
                  Ed Dawson},
  editor       = {Tansu Alpcan and
                  Levente Butty{\'{a}}n and
                  John S. Baras},
  title        = {Towards a Game Theoretic Authorisation Model},
  booktitle    = {Decision and Game Theory for Security - First International Conference,
                  GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6442},
  pages        = {208--219},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17197-0\_14},
  doi          = {10.1007/978-3-642-17197-0\_14},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/SalimRDD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/VolpattoMZ10,
  author       = {Alberto Volpatto and
                  Federico Maggi and
                  Stefano Zanero},
  editor       = {Tansu Alpcan and
                  Levente Butty{\'{a}}n and
                  John S. Baras},
  title        = {Effective Multimodel Anomaly Detection Using Cooperative Negotiation},
  booktitle    = {Decision and Game Theory for Security - First International Conference,
                  GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6442},
  pages        = {180--191},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17197-0\_12},
  doi          = {10.1007/978-3-642-17197-0\_12},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/VolpattoMZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/VratonjicMRH10,
  author       = {Nevena Vratonjic and
                  Mohammad Hossein Manshaei and
                  Maxim Raya and
                  Jean{-}Pierre Hubaux},
  editor       = {Tansu Alpcan and
                  Levente Butty{\'{a}}n and
                  John S. Baras},
  title        = {ISPs and Ad Networks Against Botnet Ad Fraud},
  booktitle    = {Decision and Game Theory for Security - First International Conference,
                  GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6442},
  pages        = {149--167},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17197-0\_10},
  doi          = {10.1007/978-3-642-17197-0\_10},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/VratonjicMRH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/ZhangYFD10,
  author       = {Nan Zhang and
                  Wei Yu and
                  Xinwen Fu and
                  Sajal K. Das},
  editor       = {Tansu Alpcan and
                  Levente Butty{\'{a}}n and
                  John S. Baras},
  title        = {gPath: {A} Game-Theoretic Path Selection Algorithm to Protect Tor's
                  Anonymity},
  booktitle    = {Decision and Game Theory for Security - First International Conference,
                  GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6442},
  pages        = {58--71},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17197-0\_4},
  doi          = {10.1007/978-3-642-17197-0\_4},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/ZhangYFD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/gamesec/2010,
  editor       = {Tansu Alpcan and
                  Levente Butty{\'{a}}n and
                  John S. Baras},
  title        = {Decision and Game Theory for Security - First International Conference,
                  GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6442},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17197-0},
  doi          = {10.1007/978-3-642-17197-0},
  isbn         = {978-3-642-17196-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics