default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 27 matches
- 2016
- Steve Alpern, Thomas Lidbetter, Alec Morton, Katerina Papadaki:
Patrolling a Pipeline. GameSec 2016: 129-138 - Eitan Altman, Aniruddha Singhal, Corinne Touati, Jie Li:
Resilience of Routing in Parallel Link Networks. GameSec 2016: 3-17 - Gabrielle Anderson, Guy McCusker, David J. Pym:
A Logic for the Compliance Budget. GameSec 2016: 370-381 - Anjon Basak, Fei Fang, Thanh Hong Nguyen, Christopher Kiekintveld:
Combining Graph Contraction and Strategy Generation for Green Security Games. GameSec 2016: 251-271 - Tristan Caulfield, Christos Ioannidis, David J. Pym:
On the Adoption of Privacy-enhancing Technologies. GameSec 2016: 175-194 - Hayreddin Çeker, Jun Zhuang, Shambhu J. Upadhyaya, Quang Duy La, Boon-Hee Soong:
Deception-Based Game Theoretical Approach to Mitigate DoS Attacks. GameSec 2016: 18-38 - Juntao Chen, Quanyan Zhu:
Optimal Contract Design Under Asymmetric Information for Cloud-Enabled Internet of Controlled Things. GameSec 2016: 329-348 - Renaud Chicoisne, Fernando Ordóñez:
Risk Averse Stackelberg Security Games with Quantal Response. GameSec 2016: 83-100 - Chris Culnane, Vanessa Teague:
Strategies for Voter-Initiated Election Audits. GameSec 2016: 235-247 - Marcin Dziubinski, Piotr Sankowski, Qiang Zhang:
Network Elicitation in Adversarial Environment. GameSec 2016: 397-414 - Sadegh Farhang, Jens Grossklags:
FlipLeakage: A Game-Theoretic Approach to Protect Against Stealthy Attackers in the Presence of Information Leakage. GameSec 2016: 195-214 - Amin Ghafouri, Waseem Abbas, Aron Laszka, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos:
Optimal Thresholds for Anomaly-Based Intrusion Detection in Dynamical Environments. GameSec 2016: 415-434 - Shahrzad Gholami, Bryan Wilder, Matthew Brown, Dana Thomas, Nicole D. Sintov, Milind Tambe:
Divide to Defend: Collusive Security Games. GameSec 2016: 272-293 - Karel Horák, Branislav Bosanský:
A Point-Based Approximate Algorithm for One-Sided Partially Observable Pursuit-Evasion Games. GameSec 2016: 435-454 - Ashish Ranjan Hota, Abraham A. Clements, Shreyas Sundaram, Saurabh Bagchi:
Optimal and Game-Theoretic Deployment of Security Investments in Interdependent Assets. GameSec 2016: 101-113 - Ziad Ismail, Jean Leneutre, David Bateman, Lin Chen:
A Methodology to Apply a Game Theoretic Model of Security Risks Interdependencies Between ICT and Electric Infrastructures. GameSec 2016: 159-171 - Kassem Kallas, Benedetta Tondi, Riccardo Lazzeretti, Mauro Barni:
Consensus Algorithm with Censored Data for Distributed Detection with Corrupted Measurements: A Game-Theoretic Approach. GameSec 2016: 455-466 - Aron Laszka, Galina Schwartz:
Becoming Cybercriminals: Incentives in Networks with Interdependent Security - Incentives in Networks with Interdependent Security. GameSec 2016: 349-369 - Sara Marie McCarthy, Arunesh Sinha, Milind Tambe, Pratyusa Manadhata:
Data Exfiltration Detection and Prevention: Virtually Distributed POMDPs for Practically Safer Networks. GameSec 2016: 39-61 - M. Kivanç Mihçak, Emrah Akyol, Tamer Basar, Cédric Langbort:
Scalar Quadratic-Gaussian Soft Watermarking Games. GameSec 2016: 215-234 - Amin Mohammadi, Mohammad Hossein Manshaei, Monireh Mohebbi Moghaddam, Quanyan Zhu:
A Game-Theoretic Analysis of Deception over Social Networks Using Fake Avatars. GameSec 2016: 382-394 - Ayan Mukhopadhyay, Chao Zhang, Yevgeniy Vorobeychik, Milind Tambe, Kenneth Pence, Paul Speer:
Optimal Allocation of Police Patrol Resources Using a Continuous-Time Crime Model. GameSec 2016: 139-158 - Mohammad A. Noureddine, Ahmed M. Fawaz, William H. Sanders, Tamer Basar:
A Game-Theoretic Approach to Respond to Attacker Lateral Movement. GameSec 2016: 294-313 - Stefan Rass, Quanyan Zhu:
GADAPT: A Sequential Game-Theoretic Framework for Designing Defense-in-Depth Strategies Against Advanced Persistent Threats. GameSec 2016: 314-326 - Eirini-Eleni Tsiropoulou, John S. Baras, Symeon Papavassiliou, Gang Qu:
On the Mitigation of Interference Imposed by Intruders in Passive RFID Networks. GameSec 2016: 62-80 - Zhengyuan Zhou, Nicholas Bambos, Peter W. Glynn:
Dynamics on Linear Influence Network Games Under Stochastic Environments. GameSec 2016: 114-126 - Quanyan Zhu, Tansu Alpcan, Emmanouil A. Panaousis, Milind Tambe, William Casey:
Decision and Game Theory for Security - 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings. Lecture Notes in Computer Science 9996, Springer 2016, ISBN 978-3-319-47412-0 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-11 10:31 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint