Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/gamesec/gamesec2010.bht:"
@inproceedings{DBLP:conf/gamesec/AlpernFKL10, author = {Steve Alpern and Robbert Fokkink and Joram op den Kelder and Tom Lidbetter}, editor = {Tansu Alpcan and Levente Butty{\'{a}}n and John S. Baras}, title = {Disperse or Unite? {A} Mathematical Model of Coordinated Attack}, booktitle = {Decision and Game Theory for Security - First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6442}, pages = {220--233}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17197-0\_15}, doi = {10.1007/978-3-642-17197-0\_15}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/AlpernFKL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/AltmanABTS10, author = {Eitan Altman and Alireza Aram and Tamer Basar and Corinne Touati and Saswati Sarkar}, editor = {Tansu Alpcan and Levente Butty{\'{a}}n and John S. Baras}, title = {Robust Control in Sparse Mobile Ad-Hoc Networks}, booktitle = {Decision and Game Theory for Security - First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6442}, pages = {123--134}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17197-0\_8}, doi = {10.1007/978-3-642-17197-0\_8}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/AltmanABTS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/AltmanBK10, author = {Eitan Altman and Tamer Basar and Veeraruna Kavitha}, editor = {Tansu Alpcan and Levente Butty{\'{a}}n and John S. Baras}, title = {Adversarial Control in a Delay Tolerant Network}, booktitle = {Decision and Game Theory for Security - First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6442}, pages = {87--106}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17197-0\_6}, doi = {10.1007/978-3-642-17197-0\_6}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/AltmanBK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/AminSS10, author = {Saurabh Amin and Galina A. Schwartz and S. Shankar Sastry}, editor = {Tansu Alpcan and Levente Butty{\'{a}}n and John S. Baras}, title = {Security Interdependencies for Networked Control Systems with Identical Agents}, booktitle = {Decision and Game Theory for Security - First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6442}, pages = {107--122}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17197-0\_7}, doi = {10.1007/978-3-642-17197-0\_7}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/AminSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/BensoussanKH10, author = {Alain Bensoussan and Murat Kantarcioglu and SingRu Celine Hoe}, editor = {Tansu Alpcan and Levente Butty{\'{a}}n and John S. Baras}, title = {A Game-Theoretical Approach for Finding Optimal Strategies in a Botnet Defense Model}, booktitle = {Decision and Game Theory for Security - First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6442}, pages = {135--148}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17197-0\_9}, doi = {10.1007/978-3-642-17197-0\_9}, timestamp = {Tue, 05 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/BensoussanKH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/BohmeF10, author = {Rainer B{\"{o}}hme and M{\'{a}}rk F{\'{e}}legyh{\'{a}}zi}, editor = {Tansu Alpcan and Levente Butty{\'{a}}n and John S. Baras}, title = {Optimal Information Security Investment with Penetration Testing}, booktitle = {Decision and Game Theory for Security - First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6442}, pages = {21--37}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17197-0\_2}, doi = {10.1007/978-3-642-17197-0\_2}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/BohmeF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/GattiMS10, author = {Nicola Gatti and Mattia Monga and Sabrina Sicari}, editor = {Tansu Alpcan and Levente Butty{\'{a}}n and John S. Baras}, title = {A Localization Game in Wireless Sensor Networks}, booktitle = {Decision and Game Theory for Security - First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6442}, pages = {168--179}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17197-0\_11}, doi = {10.1007/978-3-642-17197-0\_11}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/GattiMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/GueyeWA10, author = {Assane Gueye and Jean C. Walrand and Venkat Anantharam}, editor = {Tansu Alpcan and Levente Butty{\'{a}}n and John S. Baras}, title = {Design of Network Topology in an Adversarial Environment}, booktitle = {Decision and Game Theory for Security - First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6442}, pages = {1--20}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17197-0\_1}, doi = {10.1007/978-3-642-17197-0\_1}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/GueyeWA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/HumbertMFH10, author = {Mathias Humbert and Mohammad Hossein Manshaei and Julien Freudiger and Jean{-}Pierre Hubaux}, editor = {Tansu Alpcan and Levente Butty{\'{a}}n and John S. Baras}, title = {Tracking Games in Mobile Networks}, booktitle = {Decision and Game Theory for Security - First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6442}, pages = {38--57}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17197-0\_3}, doi = {10.1007/978-3-642-17197-0\_3}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/HumbertMFH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/JohnsonGCC10, author = {Benjamin Johnson and Jens Grossklags and Nicolas Christin and John Chuang}, editor = {Tansu Alpcan and Levente Butty{\'{a}}n and John S. Baras}, title = {Uncertainty in Interdependent Security Games}, booktitle = {Decision and Game Theory for Security - First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6442}, pages = {234--244}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17197-0\_16}, doi = {10.1007/978-3-642-17197-0\_16}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/JohnsonGCC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/KantarciogluBH10, author = {Murat Kantarcioglu and Alain Bensoussan and SingRu Celine Hoe}, editor = {Tansu Alpcan and Levente Butty{\'{a}}n and John S. Baras}, title = {When Do Firms Invest in Privacy-Preserving Technologies?}, booktitle = {Decision and Game Theory for Security - First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6442}, pages = {72--86}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17197-0\_5}, doi = {10.1007/978-3-642-17197-0\_5}, timestamp = {Tue, 05 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/KantarciogluBH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/KiekintveldMT10, author = {Christopher Kiekintveld and Janusz Marecki and Milind Tambe}, editor = {Tansu Alpcan and Levente Butty{\'{a}}n and John S. Baras}, title = {Methods and Algorithms for Infinite Bayesian Stackelberg Security Games - (Extended Abstract)}, booktitle = {Decision and Game Theory for Security - First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6442}, pages = {257--265}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17197-0\_18}, doi = {10.1007/978-3-642-17197-0\_18}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/KiekintveldMT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/KordyMMS10, author = {Barbara Kordy and Sjouke Mauw and Matthijs Melissen and Patrick Schweitzer}, editor = {Tansu Alpcan and Levente Butty{\'{a}}n and John S. Baras}, title = {Attack-Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent}, booktitle = {Decision and Game Theory for Security - First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6442}, pages = {245--256}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17197-0\_17}, doi = {10.1007/978-3-642-17197-0\_17}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/KordyMMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/PreibuschB10, author = {S{\"{o}}ren Preibusch and Joseph Bonneau}, editor = {Tansu Alpcan and Levente Butty{\'{a}}n and John S. Baras}, title = {The Password Game: Negative Externalities from Weak Password Practices}, booktitle = {Decision and Game Theory for Security - First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6442}, pages = {192--207}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17197-0\_13}, doi = {10.1007/978-3-642-17197-0\_13}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/PreibuschB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/SalimRDD10, author = {Farzad Salim and Jason Reid and Uwe Dulleck and Ed Dawson}, editor = {Tansu Alpcan and Levente Butty{\'{a}}n and John S. Baras}, title = {Towards a Game Theoretic Authorisation Model}, booktitle = {Decision and Game Theory for Security - First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6442}, pages = {208--219}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17197-0\_14}, doi = {10.1007/978-3-642-17197-0\_14}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/SalimRDD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/VolpattoMZ10, author = {Alberto Volpatto and Federico Maggi and Stefano Zanero}, editor = {Tansu Alpcan and Levente Butty{\'{a}}n and John S. Baras}, title = {Effective Multimodel Anomaly Detection Using Cooperative Negotiation}, booktitle = {Decision and Game Theory for Security - First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6442}, pages = {180--191}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17197-0\_12}, doi = {10.1007/978-3-642-17197-0\_12}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/VolpattoMZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/VratonjicMRH10, author = {Nevena Vratonjic and Mohammad Hossein Manshaei and Maxim Raya and Jean{-}Pierre Hubaux}, editor = {Tansu Alpcan and Levente Butty{\'{a}}n and John S. Baras}, title = {ISPs and Ad Networks Against Botnet Ad Fraud}, booktitle = {Decision and Game Theory for Security - First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6442}, pages = {149--167}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17197-0\_10}, doi = {10.1007/978-3-642-17197-0\_10}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/VratonjicMRH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/ZhangYFD10, author = {Nan Zhang and Wei Yu and Xinwen Fu and Sajal K. Das}, editor = {Tansu Alpcan and Levente Butty{\'{a}}n and John S. Baras}, title = {gPath: {A} Game-Theoretic Path Selection Algorithm to Protect Tor's Anonymity}, booktitle = {Decision and Game Theory for Security - First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6442}, pages = {58--71}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17197-0\_4}, doi = {10.1007/978-3-642-17197-0\_4}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/ZhangYFD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/gamesec/2010, editor = {Tansu Alpcan and Levente Butty{\'{a}}n and John S. Baras}, title = {Decision and Game Theory for Security - First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6442}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17197-0}, doi = {10.1007/978-3-642-17197-0}, isbn = {978-3-642-17196-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.