default search action
10th GameSec 2019: Stockholm, Sweden
- Tansu Alpcan, Yevgeniy Vorobeychik, John S. Baras, György Dán:
Decision and Game Theory for Security - 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings. Lecture Notes in Computer Science 11836, Springer 2019, ISBN 978-3-030-32429-2 - Carlos A. Barreto, Xenofon D. Koutsoukos:
Design of Load Forecast Systems Resilient Against Cyber-Attacks. 1-20 - Anjon Basak, Charles A. Kamhoua, Sridhar Venkatesan, Marcus Gutierrez, Ahmed H. Anwar, Christopher Kiekintveld:
Identifying Stealthy Attackers in a Game Theoretic Framework Using Deception. 21-32 - Yoav Ben Yaakov, Xinrun Wang, Joachim Meyer, Bo An:
Choosing Protection: User Investments in Security Measures for Cyber Risk Management. 33-44 - Radhika Bhargava, Chris Clifton:
When Is a Semi-honest Secure Multiparty Computation Valuable? 45-64 - Mark Bilinski, Kimberly Ferguson-Walter, Sunny Fugate, Ryan Gabrys, Justin Mauger, Brian Souza:
You only Lie Twice: A Multi-round Cyber Deception Game of Questionable Veracity. 65-84 - Nadia Boumkheld, Sakshyam Panda, Stefan Rass, Emmanouil Panaousis:
Honeypot Type Selection Games for Smart Grid Networks. 85-96 - Victor Bucarey, Martine Labbé:
Discussion of Fairness and Implementability in Stackelberg Security Games. 97-117 - Taylor J. Canann:
Toward a Theory of Vulnerability Disclosure Policy: A Hacker's Game. 118-134 - Anna Cartwright, Edward J. Cartwright, Lian Xue:
Investing in Prevention or Paying for Recovery - Attitudes to Cyber Risk. 135-151 - Yvo Desmedt, Arkadii Slinko:
Realistic versus Rational Secret Sharing. 152-163 - Noah Dunstatter, Alireza Tahsini, Mina Guirguis, Jelena Tesic:
Solving Cyber Alert Allocation Markov Games with Deep Reinforcement Learning. 164-183 - Christopher Griffin, Sarah Michele Rajtmajer, Prasanna Umar, Anna Cinzia Squicciarini:
Power Law Public Goods Game for Personal Information Sharing in News Commentaries. 184-195 - Linan Huang, Quanyan Zhu:
Adaptive Honeypot Engagement Through Reinforcement Learning of Semi-Markov Decision Processes. 196-216 - Yunhan Huang, Quanyan Zhu:
Deceptive Reinforcement Learning Under Adversarial Manipulations on Cost Signals. 217-237 - Nitin Kamra, Umang Gupta, Kai Wang, Fei Fang, Yan Liu, Milind Tambe:
DeepFP for Finding Nash Equilibrium in Continuous Action Spaces. 238-258 - Mohammad Mahdi Khalili, Xueru Zhang, Mingyan Liu:
Effective Premium Discrimination for Designing Cyber Insurance Policies with Rare Losses. 259-275 - Kavita Kumari, Murtuza Jadliwala, Anindya Maiti, Mohammad Hossein Manshaei:
Analyzing Defense Strategies Against Mobile Information Leakages: A Game-Theoretic Approach. 276-296 - Zuxing Li, György Dán:
Dynamic Cheap Talk for Robust Adversarial Learning. 297-309 - Jonathan S. A. Merlevede, Benjamin Johnson, Jens Grossklags, Tom Holvoet:
Time-Dependent Strategies in Games of Timing. 310-330 - Thanh Hong Nguyen, Amulya Yadav, Branislav Bosanský, Yu Liang:
Tackling Sequential Attacks in Security Games. 331-351 - Luyao Niu, Andrew Clark:
A Framework for Joint Attack Detection and Control Under False Data Injection. 352-363 - Lisa Oakley, Alina Oprea:
\mathsf QFlip : An Adaptive Reinforcement Learning Strategy for the \mathsf FlipIt Security Game. 364-384 - Bhaskar Ramasubramanian, Luyao Niu, Andrew Clark, Linda Bushnell, Radha Poovendran:
Linear Temporal Logic Satisfaction in Adversarial Environments Using Secure Control Barrier Certificates. 385-403 - Stefan Rass, Sandra König, Emmanouil Panaousis:
Cut-The-Rope: A Game of Stealthy Intrusion. 404-416 - Dinuka Sahabandu, Shana Moothedath, Joey Allen, Linda Bushnell, Wenke Lee, Radha Poovendran:
Stochastic Dynamic Information Flow Tracking Game with Reinforcement Learning. 417-438 - Serkan Saritas, Ezzeldin Shereen, Henrik Sandberg, György Dán:
Adversarial Attacks on Continuous Authentication Security: A Dynamic Game Approach. 439-458 - Muhammed O. Sayin, Tamer Basar:
On the Optimality of Linear Signaling to Deceive Kalman Filters over Finite/Infinite Horizons. 459-478 - Sailik Sengupta, Tathagata Chakraborti, Subbarao Kambhampati:
MTDeep: Boosting the Security of Deep Neural Nets Against Adversarial Attacks with Moving Target Defense. 479-491 - Sailik Sengupta, Ankur Chowdhary, Dijiang Huang, Subbarao Kambhampati:
General Sum Markov Games for Strategic Detection of Advanced Persistent Threats Using Moving Target Defense in Cloud Networks. 492-512 - Arkadii Slinko:
Operations over Linear Secret Sharing Schemes. 513-524 - Omkar Thakoor, Milind Tambe, Phebe Vayanos, Haifeng Xu, Christopher Kiekintveld, Fei Fang:
Cyber Camouflage Games for Strategic Deception. 525-541 - Xinrun Wang, Milind Tambe, Branislav Bosanský, Bo An:
When Players Affect Target Values: Modeling and Solving Dynamic Partially Observable Security Games. 542-562 - Kenji Yasunaga, Takeshi Koshiba:
Perfectly Secure Message Transmission Against Independent Rational Adversaries. 563-582 - Anthony Scavarelli, Ali Arya, Robert J. Teather:
Circles: exploring multi-platform accessible, socially scalable VR in the classroom. 1-4 - Kathleen Ruiz, Krystyna Kornecki:
Eco-resilience: Games, art, science. 1-11 - Jonah Warren:
Tiny online game engines. 1-7 - Wen Huang:
Exploring players' user experience in a high-embodied virtual reality game. 1-8
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.