default search action
8th GameSec 2017: Vienna, Austria
- Stefan Rass, Bo An, Christopher Kiekintveld, Fei Fang, Stefan Schauer:
Decision and Game Theory for Security - 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings. Lecture Notes in Computer Science 10575, Springer 2017, ISBN 978-3-319-68710-0
Full Papers
- Ariel Rosenfeld, Oleg Maksimov, Sarit Kraus:
Optimizing Traffic Enforcement: From the Lab to the Roads. 3-20 - Yevhen Zolotavkin, Julián García, Carsten Rudolph:
Incentive Compatibility of Pay Per Last N Shares in Bitcoin Mining Pools. 21-39 - Bastián Bahamondes, José Correa, Jannik Matuschke, Gianpaolo Oriolo:
Adaptivity in Network Interdiction. 40-52 - Matteo Campanelli, Rosario Gennaro:
Efficient Rational Proofs for Space Bounded Computations. 53-73 - Yun Ai, Manav R. Bhatnagar, Michael Cheffena, Aashish Mathur, Artem A. Sedakov:
Game-Theoretical Analysis of PLC System Performance in the Presence of Jamming Attacks. 74-90 - Muhammed O. Sayin, Tamer Basar:
Secure Sensor Design for Cyber-Physical Systems Against Advanced Persistent Threats. 91-111 - Sarah Michele Rajtmajer, Anna Cinzia Squicciarini, Jose M. Such, Justin Semonsen, Andrew Belmonte:
An Ultimatum Game Model for the Evolution of Privacy in Jointly Managed Content. 112-130 - Tristan Caulfield, Christos Ioannidis, David J. Pym:
The U.S. Vulnerabilities Equities Process: An Economic Perspective. 131-150 - Thanh Hong Nguyen, Michael P. Wellman, Satinder Singh:
A Stackelberg Game Model for Botnet Data Exfiltration. 151-170 - Karel Durkota, Viliam Lisý, Christopher Kiekintveld, Karel Horák, Branislav Bosanský, Tomás Pevný:
Optimal Strategies for Detecting Data Exfiltration by Internal and External Attackers. 171-192 - Victor Bucarey, Carlos Casorrán, Óscar Figueroa, Karla Rosas, Hugo F. Navarrete, Fernando Ordóñez:
Building Real Stackelberg Security Games for Border Patrols. 193-212 - Tao Zhang, Quanyan Zhu:
Strategic Defense Against Deceptive Civilian GPS Spoofing of Unmanned Aerial Vehicles. 213-233 - Ziad Ismail, Christophe Kiennert, Jean Leneutre, Lin Chen:
A Game Theoretical Model for Optimal Distribution of Network Security Resources. 234-255 - Samuel Ang, Hau Chan, Albert Xin Jiang, William Yeoh:
Game-Theoretic Goal Recognition Models with Applications to Security Domains. 256-272 - Karel Horák, Quanyan Zhu, Branislav Bosanský:
Manipulating Adversary's Belief: A Dynamic Game Approach to Deception by Design for Proactive Network Security. 273-294 - Xiaobing He, Hermann de Meer:
A Stochastic Game-Theoretic Model for Smart Grid Communication Networks. 295-314 - Xiaotao Feng, Zizhan Zheng, Prasant Mohapatra, Derya Cansever:
A Stackelberg Game and Markov Modeling of Moving Target Defense. 315-335 - Jeffrey Pawlick, Quanyan Zhu:
Proactive Defense Against Physical Denial of Service Attacks Using Poisson Signaling Games. 336-356 - Linan Huang, Juntao Chen, Quanyan Zhu:
A Large-Scale Markov Game Approach to Dynamic Protection of Interdependent Infrastructure Networks. 357-376 - Elizabeth Bondi, Fei Fang, Debarun Kar, Venil Loyd Noronha, Donnabell Dmello, Milind Tambe, Arvind Iyer, Robert Hannaford:
VIOLA: Video Labeling Application for Security Domains. 377-396 - Aron Laszka, Sadegh Farhang, Jens Grossklags:
On the Economics of Ransomware. 397-417 - Jinshu Cui, Heather Rosoff, Richard S. John:
Deterrence of Cyber Attackers in a Three-Player Behavioral Game. 418-436 - Mário S. Alvim, Konstantinos Chatzikokolakis, Yusuke Kawamoto, Catuscia Palamidessi:
Information Leakage Games. 437-457 - Haifeng Xu, Benjamin J. Ford, Fei Fang, Bistra Dilkina, Andrew J. Plumptre, Milind Tambe, Margaret Driciru, Fred Wanyama, Aggrey Rwetsiba, Mustapha Nsubaga, Joshua Mabonga:
Optimal Patrol Planning for Green Security Games with Black-Box Attackers. 458-477
Short Papers
- Corine M. Laan, Ana Isabel Barros, Richard J. Boucherie, Herman Monsuur:
Security Games with Probabilistic Constraints on the Agent's Strategy. 481-493 - Stefan Rass, Sandra König, Stefan Schauer:
On the Cost of Game Playing: How to Control the Expenses in Mixed Strategies. 494-505 - Yezekael Hayel, Quanyan Zhu:
Dynamics of Strategic Protection Against Virus Propagation in Heterogeneous Complex Networks. 506-518 - Deepak K. Tosh, Iman Vakilinia, Sachin Shetty, Shamik Sengupta, Charles A. Kamhoua, Laurent Njilla, Kevin A. Kwiat:
Three Layer Game Theoretic Decision Framework for Cyber-Investment and Cyber-Insurance. 519-532
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.