Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/gamesec/gamesec2014.bht:"
@inproceedings{DBLP:conf/gamesec/BhattacharyaBF14, author = {Sourabh Bhattacharya and Tamer Basar and Maurizio Falcone}, editor = {Radha Poovendran and Walid Saad}, title = {Surveillance for Security as a Pursuit-Evasion Game}, booktitle = {Decision and Game Theory for Security - 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8840}, pages = {370--379}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12601-2\_23}, doi = {10.1007/978-3-319-12601-2\_23}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/BhattacharyaBF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/BrownHT14, author = {Matthew Brown and William B. Haskell and Milind Tambe}, editor = {Radha Poovendran and Walid Saad}, title = {Addressing Scalability and Robustness in Security Games with Multiple Boundedly Rational Adversaries}, booktitle = {Decision and Game Theory for Security - 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8840}, pages = {23--42}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12601-2\_2}, doi = {10.1007/978-3-319-12601-2\_2}, timestamp = {Mon, 30 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/BrownHT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/CuiJ14, author = {Jinshu Cui and Richard S. John}, editor = {Radha Poovendran and Walid Saad}, title = {Empirical Comparisons of Descriptive Multi-objective Adversary Models in Stackelberg Security Games}, booktitle = {Decision and Game Theory for Security - 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8840}, pages = {309--318}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12601-2\_17}, doi = {10.1007/978-3-319-12601-2\_17}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/CuiJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/DjebailiKLC14, author = {Brahim Djebaili and Christophe Kiennert and Jean Leneutre and Lin Chen}, editor = {Radha Poovendran and Walid Saad}, title = {Data Integrity and Availability Verification Game in Untrusted Cloud Storage}, booktitle = {Decision and Game Theory for Security - 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8840}, pages = {287--306}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12601-2\_16}, doi = {10.1007/978-3-319-12601-2\_16}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/DjebailiKLC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/FarhangMEZ14, author = {Sadegh Farhang and Mohammad Hossein Manshaei and Milad Nasr Esfahani and Quanyan Zhu}, editor = {Radha Poovendran and Walid Saad}, title = {A Dynamic Bayesian Security Game Framework for Strategic Defense Mechanism Design}, booktitle = {Decision and Game Theory for Security - 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8840}, pages = {319--328}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12601-2\_18}, doi = {10.1007/978-3-319-12601-2\_18}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/FarhangMEZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/GuptaBS14, author = {Abhishek Gupta and Tamer Basar and Galina A. Schwartz}, editor = {Radha Poovendran and Walid Saad}, title = {A Three-Stage Colonel Blotto Game: When to Provide More Information to an Adversary}, booktitle = {Decision and Game Theory for Security - 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8840}, pages = {216--233}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12601-2\_12}, doi = {10.1007/978-3-319-12601-2\_12}, timestamp = {Wed, 25 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/GuptaBS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/KamhouaRK14, author = {Charles A. Kamhoua and Manuel Rodr{\'{\i}}guez and Kevin A. Kwiat}, editor = {Radha Poovendran and Walid Saad}, title = {Testing for Hardware Trojans: {A} Game-Theoretic Approach}, booktitle = {Decision and Game Theory for Security - 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8840}, pages = {360--369}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12601-2\_22}, doi = {10.1007/978-3-319-12601-2\_22}, timestamp = {Thu, 29 Mar 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/KamhouaRK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/KhouzaniPC14, author = {M. H. R. Khouzani and Viet Pham and Carlos Cid}, editor = {Radha Poovendran and Walid Saad}, title = {Strategic Discovery and Sharing of Vulnerabilities in Competitive Environments}, booktitle = {Decision and Game Theory for Security - 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8840}, pages = {59--78}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12601-2\_4}, doi = {10.1007/978-3-319-12601-2\_4}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/KhouzaniPC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/KlimaKL14, author = {Richard Kl{\'{\i}}ma and Christopher Kiekintveld and Viliam Lis{\'{y}}}, editor = {Radha Poovendran and Walid Saad}, title = {Online Learning Methods for Border Patrol Resource Allocation}, booktitle = {Decision and Game Theory for Security - 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8840}, pages = {340--349}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12601-2\_20}, doi = {10.1007/978-3-319-12601-2\_20}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/KlimaKL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/LaszkaHFB14, author = {Aron Laszka and G{\'{a}}bor Horv{\'{a}}th and M{\'{a}}rk F{\'{e}}legyh{\'{a}}zi and Levente Butty{\'{a}}n}, editor = {Radha Poovendran and Walid Saad}, title = {FlipThem: Modeling Targeted Attacks with FlipIt for Multiple Resources}, booktitle = {Decision and Game Theory for Security - 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8840}, pages = {175--194}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12601-2\_10}, doi = {10.1007/978-3-319-12601-2\_10}, timestamp = {Wed, 25 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/LaszkaHFB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/LeninB14, author = {Aleksandr Lenin and Ahto Buldas}, editor = {Radha Poovendran and Walid Saad}, title = {Limiting Adversarial Budget in Quantitative Security Assessment}, booktitle = {Decision and Game Theory for Security - 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8840}, pages = {155--174}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12601-2\_9}, doi = {10.1007/978-3-319-12601-2\_9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/LeninB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/LiuB14, author = {Ji Liu and Tamer Basar}, editor = {Radha Poovendran and Walid Saad}, title = {Toward Optimal Network Topology Design for Fast and Secure Distributed Computation}, booktitle = {Decision and Game Theory for Security - 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8840}, pages = {234--245}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12601-2\_13}, doi = {10.1007/978-3-319-12601-2\_13}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/LiuB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/PanaousisAFC14, author = {Emmanouil A. Panaousis and Tansu Alpcan and Hossein Fereidooni and Mauro Conti}, editor = {Radha Poovendran and Walid Saad}, title = {Secure Message Delivery Games for Device-to-Device Communications}, booktitle = {Decision and Game Theory for Security - 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8840}, pages = {195--215}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12601-2\_11}, doi = {10.1007/978-3-319-12601-2\_11}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/PanaousisAFC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/PanaousisFMHS14, author = {Emmanouil A. Panaousis and Andrew Fielder and Pasquale Malacaria and Chris Hankin and Fabrizio Smeraldi}, editor = {Radha Poovendran and Walid Saad}, title = {Cybersecurity Games and Investments: {A} Decision Support Approach}, booktitle = {Decision and Game Theory for Security - 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8840}, pages = {266--286}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12601-2\_15}, doi = {10.1007/978-3-319-12601-2\_15}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/PanaousisFMHS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/PhamKC14, author = {Viet Pham and M. H. R. Khouzani and Carlos Cid}, editor = {Radha Poovendran and Walid Saad}, title = {Optimal Contracts for Outsourced Computation}, booktitle = {Decision and Game Theory for Security - 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8840}, pages = {79--98}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12601-2\_5}, doi = {10.1007/978-3-319-12601-2\_5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/PhamKC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/PuG14, author = {Yu Pu and Jens Grossklags}, editor = {Radha Poovendran and Walid Saad}, title = {An Economic Model and Simulation Results of App Adoption Decisions on Networks with Interdependent Privacy Consequences}, booktitle = {Decision and Game Theory for Security - 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8840}, pages = {246--265}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12601-2\_14}, doi = {10.1007/978-3-319-12601-2\_14}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/PuG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/RasouliMT14, author = {Mohammad Rasouli and Erik Miehling and Demosthenis Teneketzis}, editor = {Radha Poovendran and Walid Saad}, title = {A Supervisory Control Approach to Dynamic Cyber-Security}, booktitle = {Decision and Game Theory for Security - 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8840}, pages = {99--117}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12601-2\_6}, doi = {10.1007/978-3-319-12601-2\_6}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/RasouliMT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/RassR14, author = {Stefan Rass and Benjamin Rainer}, editor = {Radha Poovendran and Walid Saad}, title = {Numerical Computation of Multi-goal Security Strategies}, booktitle = {Decision and Game Theory for Security - 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8840}, pages = {118--133}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12601-2\_7}, doi = {10.1007/978-3-319-12601-2\_7}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/RassR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/SarabiNL14, author = {Armin Sarabi and Parinaz Naghizadeh and Mingyan Liu}, editor = {Radha Poovendran and Walid Saad}, title = {Can Less Be More? {A} Game-Theoretic Analysis of Filtering vs. Investment}, booktitle = {Decision and Game Theory for Security - 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8840}, pages = {329--339}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12601-2\_19}, doi = {10.1007/978-3-319-12601-2\_19}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/SarabiNL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/WallrabensteinC14, author = {John Ross Wallrabenstein and Chris Clifton}, editor = {Radha Poovendran and Walid Saad}, title = {Realizable Rational Multiparty Cryptographic Protocols}, booktitle = {Decision and Game Theory for Security - 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8840}, pages = {134--154}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12601-2\_8}, doi = {10.1007/978-3-319-12601-2\_8}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/WallrabensteinC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/WellmanP14, author = {Michael P. Wellman and Achintya Prakash}, editor = {Radha Poovendran and Walid Saad}, title = {Empirical Game-Theoretic Analysis of an Adaptive Cyber-Defense Scenario (Preliminary Report)}, booktitle = {Decision and Game Theory for Security - 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8840}, pages = {43--58}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12601-2\_3}, doi = {10.1007/978-3-319-12601-2\_3}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/WellmanP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/ZhangJCH14, author = {Jianhua Zhang and Prateek Jaipuria and Aranya Chakrabortty and Alefiya Hussain}, editor = {Radha Poovendran and Walid Saad}, title = {A Distributed Optimization Algorithm for Attack-Resilient Wide-Area Monitoring of Power Systems: Theoretical and Experimental Methods}, booktitle = {Decision and Game Theory for Security - 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8840}, pages = {350--359}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12601-2\_21}, doi = {10.1007/978-3-319-12601-2\_21}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/ZhangJCH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/ZhangJSBT14, author = {Chao Zhang and Albert Xin Jiang and Martin B. Short and P. Jeffrey Brantingham and Milind Tambe}, editor = {Radha Poovendran and Walid Saad}, title = {Defending Against Opportunistic Criminals: New Game-Theoretic Frameworks and Algorithms}, booktitle = {Decision and Game Theory for Security - 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8840}, pages = {3--22}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12601-2\_1}, doi = {10.1007/978-3-319-12601-2\_1}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/ZhangJSBT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/gamesec/2014, editor = {Radha Poovendran and Walid Saad}, title = {Decision and Game Theory for Security - 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8840}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12601-2}, doi = {10.1007/978-3-319-12601-2}, isbn = {978-3-319-12600-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.