Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 38 matches
- 2019
- Christopher Griffin, Sarah Michele Rajtmajer, Prasanna Umar, Anna Cinzia Squicciarini:
Power Law Public Goods Game for Personal Information Sharing in News Commentaries. GameSec 2019: 184-195 - Carlos A. Barreto, Xenofon D. Koutsoukos:
Design of Load Forecast Systems Resilient Against Cyber-Attacks. GameSec 2019: 1-20 - Anjon Basak, Charles A. Kamhoua, Sridhar Venkatesan, Marcus Gutierrez, Ahmed H. Anwar, Christopher Kiekintveld:
Identifying Stealthy Attackers in a Game Theoretic Framework Using Deception. GameSec 2019: 21-32 - Radhika Bhargava, Chris Clifton:
When Is a Semi-honest Secure Multiparty Computation Valuable? GameSec 2019: 45-64 - Mark Bilinski, Kimberly Ferguson-Walter, Sunny Fugate, Ryan Gabrys, Justin Mauger, Brian Souza:
You only Lie Twice: A Multi-round Cyber Deception Game of Questionable Veracity. GameSec 2019: 65-84 - Nadia Boumkheld, Sakshyam Panda, Stefan Rass, Emmanouil Panaousis:
Honeypot Type Selection Games for Smart Grid Networks. GameSec 2019: 85-96 - Victor Bucarey, Martine Labbé:
Discussion of Fairness and Implementability in Stackelberg Security Games. GameSec 2019: 97-117 - Taylor J. Canann:
Toward a Theory of Vulnerability Disclosure Policy: A Hacker's Game. GameSec 2019: 118-134 - Anna Cartwright, Edward J. Cartwright, Lian Xue:
Investing in Prevention or Paying for Recovery - Attitudes to Cyber Risk. GameSec 2019: 135-151 - Yvo Desmedt, Arkadii Slinko:
Realistic versus Rational Secret Sharing. GameSec 2019: 152-163 - Noah Dunstatter, Alireza Tahsini, Mina Guirguis, Jelena Tesic:
Solving Cyber Alert Allocation Markov Games with Deep Reinforcement Learning. GameSec 2019: 164-183 - Wen Huang:
Exploring players' user experience in a high-embodied virtual reality game. GameSec 2019: 1-8 - Linan Huang, Quanyan Zhu:
Adaptive Honeypot Engagement Through Reinforcement Learning of Semi-Markov Decision Processes. GameSec 2019: 196-216 - Yunhan Huang, Quanyan Zhu:
Deceptive Reinforcement Learning Under Adversarial Manipulations on Cost Signals. GameSec 2019: 217-237 - Nitin Kamra, Umang Gupta, Kai Wang, Fei Fang, Yan Liu, Milind Tambe:
DeepFP for Finding Nash Equilibrium in Continuous Action Spaces. GameSec 2019: 238-258 - Mohammad Mahdi Khalili, Xueru Zhang, Mingyan Liu:
Effective Premium Discrimination for Designing Cyber Insurance Policies with Rare Losses. GameSec 2019: 259-275 - Kavita Kumari, Murtuza Jadliwala, Anindya Maiti, Mohammad Hossein Manshaei:
Analyzing Defense Strategies Against Mobile Information Leakages: A Game-Theoretic Approach. GameSec 2019: 276-296 - Zuxing Li, György Dán:
Dynamic Cheap Talk for Robust Adversarial Learning. GameSec 2019: 297-309 - Jonathan S. A. Merlevede, Benjamin Johnson, Jens Grossklags, Tom Holvoet:
Time-Dependent Strategies in Games of Timing. GameSec 2019: 310-330 - Thanh Hong Nguyen, Amulya Yadav, Branislav Bosanský, Yu Liang:
Tackling Sequential Attacks in Security Games. GameSec 2019: 331-351 - Luyao Niu, Andrew Clark:
A Framework for Joint Attack Detection and Control Under False Data Injection. GameSec 2019: 352-363 - Lisa Oakley, Alina Oprea:
\mathsf QFlip : An Adaptive Reinforcement Learning Strategy for the \mathsf FlipIt Security Game. GameSec 2019: 364-384 - Bhaskar Ramasubramanian, Luyao Niu, Andrew Clark, Linda Bushnell, Radha Poovendran:
Linear Temporal Logic Satisfaction in Adversarial Environments Using Secure Control Barrier Certificates. GameSec 2019: 385-403 - Stefan Rass, Sandra König, Emmanouil Panaousis:
Cut-The-Rope: A Game of Stealthy Intrusion. GameSec 2019: 404-416 - Kathleen Ruiz, Krystyna Kornecki:
Eco-resilience: Games, art, science. GameSec 2019: 1-11 - Dinuka Sahabandu, Shana Moothedath, Joey Allen, Linda Bushnell, Wenke Lee, Radha Poovendran:
Stochastic Dynamic Information Flow Tracking Game with Reinforcement Learning. GameSec 2019: 417-438 - Serkan Saritas, Ezzeldin Shereen, Henrik Sandberg, György Dán:
Adversarial Attacks on Continuous Authentication Security: A Dynamic Game Approach. GameSec 2019: 439-458 - Muhammed O. Sayin, Tamer Basar:
On the Optimality of Linear Signaling to Deceive Kalman Filters over Finite/Infinite Horizons. GameSec 2019: 459-478 - Anthony Scavarelli, Ali Arya, Robert J. Teather:
Circles: exploring multi-platform accessible, socially scalable VR in the classroom. GameSec 2019: 1-4 - Sailik Sengupta, Ankur Chowdhary, Dijiang Huang, Subbarao Kambhampati:
General Sum Markov Games for Strategic Detection of Advanced Persistent Threats Using Moving Target Defense in Cloud Networks. GameSec 2019: 492-512
skipping 8 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-20 13:03 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint