default search action
6th GameSec 2015: London, UK
- M. H. R. Khouzani, Emmanouil A. Panaousis, George Theodorakopoulos:
Decision and Game Theory for Security - 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedings. Lecture Notes in Computer Science 9406, Springer 2015, ISBN 978-3-319-25593-4
Full Papers
- Andrew Clark, Kun Sun, Linda Bushnell, Radha Poovendran:
A Game-Theoretic Approach to IP Address Randomization in Decoy-Based Cyber Defense. 3-21 - Yezekael Hayel, Quanyan Zhu:
Attack-Aware Cyber Insurance for Risk Sharing in Computer Networks. 22-34 - Benjamin J. Ford, Thanh Hong Nguyen, Milind Tambe, Nicole D. Sintov, Francesco Maria Delle Fave:
Beware the Soothsayer: From Attack Prediction Accuracy to Predictive Reliability in Security Games. 35-56 - Benjamin Johnson, Aron Laszka, Jens Grossklags:
Games of Timing for Security in Dynamic Environments. 57-73 - David S. Leslie, Chris Sherfield, Nigel P. Smart:
Threshold FlipThem: When the Winner Does Not Need to Take All. 74-92 - Ming Zhang, Zizhan Zheng, Ness B. Shroff:
A Game Theoretic Model for Defending Against Stealthy Attacks with Limited Resources. 93-112 - Phillip Lee, Andrew Clark, Basel Alomair, Linda Bushnell, Radha Poovendran:
Passivity-Based Distributed Strategies for Stochastic Stackelberg Security Games. 113-129 - Richard Klíma, Viliam Lisý, Christopher Kiekintveld:
Combining Online Learning and Equilibrium Computation in Security Games. 130-149 - Ashish Ranjan Hota, Shreyas Sundaram:
Interdependent Security Games Under Behavioral Probability Weighting. 150-169 - Thanh Hong Nguyen, Francesco Maria Delle Fave, Debarun Kar, Aravind S. Lakshminarayanan, Amulya Yadav, Milind Tambe, Noa Agmon, Andrew J. Plumptre, Margaret Driciru, Fred Wanyama, Aggrey Rwetsiba:
Making the Most of Our Regrets: Regret-Based Solutions to Handle Payoff Uncertainty and Elicitation in Green Security Games. 170-191 - Nicola Basilico, Giuseppe De Nittis, Nicola Gatti:
A Security Game Model for Environment Protection in the Presence of an Alarm System. 192-207 - Sarah Michele Rajtmajer, Christopher Griffin, Anna Cinzia Squicciarini:
Determining a Discrete Set of Site-Constrained Privacy Options for Users in Social Networks Through Stackelberg Games. 208-227 - Karel Durkota, Viliam Lisý, Branislav Bosanský, Christopher Kiekintveld:
Approximate Solutions for Attack Graph Games with Imperfect Information. 228-249 - Chad Heitzenrater, Greg Taylor, Andrew Simpson:
When the Winning Move is Not to Play: Games of Deterrence in Cyber Security. 250-269 - Matteo Campanelli, Rosario Gennaro:
Sequentially Composable Rational Proofs. 270-288 - Jeffrey Pawlick, Sadegh Farhang, Quanyan Zhu:
Flip the Cloud: Cyber-Physical Signaling Games in the Presence of Advanced Persistent Threats. 289-308
Short Papers
- Aleksandr Lenin, Jan Willemson, Anton Charnamord:
Genetic Approximations for the Failure-Free Security Games. 311-321 - Monireh Mohebbi Moghaddam, Mohammad Hossein Manshaei, Quanyan Zhu:
To Trust or Not: A Security Signaling Game Between Service Provider and Client. 322-333 - Jonathan S. A. Merlevede, Tom Holvoet:
Game Theory and Security: Recent History and Future Directions. 334-345 - Stefan Rass, Sandra König, Stefan Schauer:
Uncertainty in Games: Using Probability-Distributions as Payoffs. 346-357 - Chong Huang, Lalitha Sankar, Anand D. Sarwate:
Incentive Schemes for Privacy-Sensitive Consumers. 358-369
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.