Search dblp for Publications

export results for "stream:conf/gamesec:"

 download as .bib file

@proceedings{DBLP:conf/gamesec/2024,
  editor       = {Arunesh Sinha and
                  Jie Fu and
                  Quanyan Zhu and
                  Tao Zhang},
  title        = {Decision and Game Theory for Security - 15th International Conference,
                  GameSec 2024, New York City, NY, USA, October 16-18, 2024, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14908},
  publisher    = {Springer},
  year         = {2025},
  url          = {https://doi.org/10.1007/978-3-031-74835-6},
  doi          = {10.1007/978-3-031-74835-6},
  isbn         = {978-3-031-74834-9},
  timestamp    = {Thu, 17 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/2024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/BanikBH24,
  author       = {Sandeep Banik and
                  Shaunak D. Bopardikar and
                  Naira Hovakimyan},
  editor       = {Arunesh Sinha and
                  Jie Fu and
                  Quanyan Zhu and
                  Tao Zhang},
  title        = {FlipDyn in Graphs: Resource Takeover Games in Graphs},
  booktitle    = {Decision and Game Theory for Security - 15th International Conference,
                  GameSec 2024, New York City, NY, USA, October 16-18, 2024, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14908},
  pages        = {220--239},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-74835-6\_11},
  doi          = {10.1007/978-3-031-74835-6\_11},
  timestamp    = {Tue, 22 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/BanikBH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/CernyLCZFKI24,
  author       = {Jakub Cern{\'{y}} and
                  Chun Kai Ling and
                  Darshan Chakrabarti and
                  Jingwen Zhang and
                  Gabriele Farina and
                  Christian Kroer and
                  Garud Iyengar},
  editor       = {Arunesh Sinha and
                  Jie Fu and
                  Quanyan Zhu and
                  Tao Zhang},
  title        = {Contested Logistics: {A} Game-Theoretic Approach},
  booktitle    = {Decision and Game Theory for Security - 15th International Conference,
                  GameSec 2024, New York City, NY, USA, October 16-18, 2024, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14908},
  pages        = {124--146},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-74835-6\_7},
  doi          = {10.1007/978-3-031-74835-6\_7},
  timestamp    = {Wed, 16 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/CernyLCZFKI24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/EbrahimiN24,
  author       = {Raman Ebrahimi and
                  Parinaz Naghizadeh},
  editor       = {Arunesh Sinha and
                  Jie Fu and
                  Quanyan Zhu and
                  Tao Zhang},
  title        = {Extended Horizons: Multi-hop Awareness in Network Games},
  booktitle    = {Decision and Game Theory for Security - 15th International Conference,
                  GameSec 2024, New York City, NY, USA, October 16-18, 2024, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14908},
  pages        = {201--219},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-74835-6\_10},
  doi          = {10.1007/978-3-031-74835-6\_10},
  timestamp    = {Wed, 16 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/EbrahimiN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/FrankPB24,
  author       = {Marcell Frank and
                  Bal{\'{a}}zs Pej{\'{o}} and
                  Gergely Bicz{\'{o}}k},
  editor       = {Arunesh Sinha and
                  Jie Fu and
                  Quanyan Zhu and
                  Tao Zhang},
  title        = {Effective Anonymous Messaging: The Role of Altruism},
  booktitle    = {Decision and Game Theory for Security - 15th International Conference,
                  GameSec 2024, New York City, NY, USA, October 16-18, 2024, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14908},
  pages        = {240--259},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-74835-6\_12},
  doi          = {10.1007/978-3-031-74835-6\_12},
  timestamp    = {Wed, 16 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/FrankPB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/GalinkinPM24,
  author       = {Erick Galinkin and
                  Emmanouil Pountourakis and
                  Spiros Mancoridis},
  editor       = {Arunesh Sinha and
                  Jie Fu and
                  Quanyan Zhu and
                  Tao Zhang},
  title        = {The Price of Pessimism for Automated Defense},
  booktitle    = {Decision and Game Theory for Security - 15th International Conference,
                  GameSec 2024, New York City, NY, USA, October 16-18, 2024, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14908},
  pages        = {45--64},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-74835-6\_3},
  doi          = {10.1007/978-3-031-74835-6\_3},
  timestamp    = {Tue, 22 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/GalinkinPM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/Ganzfried24,
  author       = {Sam Ganzfried},
  editor       = {Arunesh Sinha and
                  Jie Fu and
                  Quanyan Zhu and
                  Tao Zhang},
  title        = {Fast Complete Algorithm for Multiplayer Nash Equilibrium},
  booktitle    = {Decision and Game Theory for Security - 15th International Conference,
                  GameSec 2024, New York City, NY, USA, October 16-18, 2024, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14908},
  pages        = {109--123},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-74835-6\_6},
  doi          = {10.1007/978-3-031-74835-6\_6},
  timestamp    = {Wed, 16 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/Ganzfried24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/GeZ24,
  author       = {Yunfei Ge and
                  Quanyan Zhu},
  editor       = {Arunesh Sinha and
                  Jie Fu and
                  Quanyan Zhu and
                  Tao Zhang},
  title        = {{MEGA-PT:} {A} Meta-game Framework for Agile Penetration Testing},
  booktitle    = {Decision and Game Theory for Security - 15th International Conference,
                  GameSec 2024, New York City, NY, USA, October 16-18, 2024, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14908},
  pages        = {24--44},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-74835-6\_2},
  doi          = {10.1007/978-3-031-74835-6\_2},
  timestamp    = {Wed, 16 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/GeZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/HammarS24,
  author       = {Kim Hammar and
                  Rolf Stadler},
  editor       = {Arunesh Sinha and
                  Jie Fu and
                  Quanyan Zhu and
                  Tao Zhang},
  title        = {Intrusion Tolerance as a Two-Level Game},
  booktitle    = {Decision and Game Theory for Security - 15th International Conference,
                  GameSec 2024, New York City, NY, USA, October 16-18, 2024, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14908},
  pages        = {3--23},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-74835-6\_1},
  doi          = {10.1007/978-3-031-74835-6\_1},
  timestamp    = {Tue, 22 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/HammarS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/KumariJJM24,
  author       = {Kavita Kumari and
                  Murtuza Jadliwala and
                  Sumit Kumar Jha and
                  Anindya Maiti},
  editor       = {Arunesh Sinha and
                  Jie Fu and
                  Quanyan Zhu and
                  Tao Zhang},
  title        = {Towards a Game-Theoretic Understanding of Explanation-Based Membership
                  Inference Attacks},
  booktitle    = {Decision and Game Theory for Security - 15th International Conference,
                  GameSec 2024, New York City, NY, USA, October 16-18, 2024, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14908},
  pages        = {263--283},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-74835-6\_13},
  doi          = {10.1007/978-3-031-74835-6\_13},
  timestamp    = {Wed, 16 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/KumariJJM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/LiL24,
  author       = {Zhen Li and
                  Qi Liao},
  editor       = {Arunesh Sinha and
                  Jie Fu and
                  Quanyan Zhu and
                  Tao Zhang},
  title        = {How Much Should {I} Double Spend My Bitcoin? Game Theory of Quantum
                  Mining},
  booktitle    = {Decision and Game Theory for Security - 15th International Conference,
                  GameSec 2024, New York City, NY, USA, October 16-18, 2024, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14908},
  pages        = {87--106},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-74835-6\_5},
  doi          = {10.1007/978-3-031-74835-6\_5},
  timestamp    = {Wed, 16 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/LiL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/NeupaneBNRDMENC24,
  author       = {Roshan Lal Neupane and
                  Bishnu Bhusal and
                  Kiran Neupane and
                  Preyea Regmi and
                  Tam Dinh and
                  Lilliana Marrero and
                  Sayed M. Saghaian N. E. and
                  Venkata Sriram Siddhardh Nadendla and
                  Prasad Calyam},
  editor       = {Arunesh Sinha and
                  Jie Fu and
                  Quanyan Zhu and
                  Tao Zhang},
  title        = {On Countering Ransomware Attacks Using Strategic Deception},
  booktitle    = {Decision and Game Theory for Security - 15th International Conference,
                  GameSec 2024, New York City, NY, USA, October 16-18, 2024, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14908},
  pages        = {149--176},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-74835-6\_8},
  doi          = {10.1007/978-3-031-74835-6\_8},
  timestamp    = {Wed, 06 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/NeupaneBNRDMENC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/NooraniPZMGB24,
  author       = {Mahshid Noorani and
                  Tharun V. Puthanveettil and
                  Asim Zoulkarni and
                  Jack Mirenzi and
                  Charles D. Grody and
                  John S. Baras},
  editor       = {Arunesh Sinha and
                  Jie Fu and
                  Quanyan Zhu and
                  Tao Zhang},
  title        = {Multimodal Anomaly Detection for Autonomous Cyber-Physical Systems
                  Empowering Real-World Evaluation},
  booktitle    = {Decision and Game Theory for Security - 15th International Conference,
                  GameSec 2024, New York City, NY, USA, October 16-18, 2024, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14908},
  pages        = {306--325},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-74835-6\_15},
  doi          = {10.1007/978-3-031-74835-6\_15},
  timestamp    = {Wed, 16 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/NooraniPZMGB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/PflugelR24,
  author       = {Eckhard Pfl{\"{u}}gel and
                  Stefan Rass},
  editor       = {Arunesh Sinha and
                  Jie Fu and
                  Quanyan Zhu and
                  Tao Zhang},
  title        = {Ransom Roulette: Learning the Games Behind Cyber Extortion},
  booktitle    = {Decision and Game Theory for Security - 15th International Conference,
                  GameSec 2024, New York City, NY, USA, October 16-18, 2024, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14908},
  pages        = {67--86},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-74835-6\_4},
  doi          = {10.1007/978-3-031-74835-6\_4},
  timestamp    = {Tue, 22 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/PflugelR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/ProbineKT24,
  author       = {Caleb Probine and
                  Mustafa O. Karabag and
                  Ufuk Topcu},
  editor       = {Arunesh Sinha and
                  Jie Fu and
                  Quanyan Zhu and
                  Tao Zhang},
  title        = {A Decentralized Shotgun Approach for Team Deception},
  booktitle    = {Decision and Game Theory for Security - 15th International Conference,
                  GameSec 2024, New York City, NY, USA, October 16-18, 2024, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14908},
  pages        = {177--197},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-74835-6\_9},
  doi          = {10.1007/978-3-031-74835-6\_9},
  timestamp    = {Wed, 16 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/ProbineKT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/ZoulkarniDKB24,
  author       = {Asim Zoulkarni and
                  Sai Sandeep Damera and
                  M. S. Praveen Kumar and
                  John S. Baras},
  editor       = {Arunesh Sinha and
                  Jie Fu and
                  Quanyan Zhu and
                  Tao Zhang},
  title        = {Defending Against {APT} Attacks in Robots: {A} Multi-phase Game-Theoretical
                  Approach},
  booktitle    = {Decision and Game Theory for Security - 15th International Conference,
                  GameSec 2024, New York City, NY, USA, October 16-18, 2024, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14908},
  pages        = {287--305},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-74835-6\_14},
  doi          = {10.1007/978-3-031-74835-6\_14},
  timestamp    = {Wed, 16 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/ZoulkarniDKB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/AdamsCA23,
  author       = {Takuma Adams and
                  Andrew C. Cullen and
                  Tansu Alpcan},
  editor       = {Jie Fu and
                  Tom{\'{a}}s Kroupa and
                  Yezekael Hayel},
  title        = {Quantisation Effects in Adversarial Cyber-Physical Games},
  booktitle    = {Decision and Game Theory for Security: 14th International Conference,
                  GameSec 2023, Avignon, France, October 18-20, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14167},
  pages        = {153--171},
  publisher    = {Springe},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-50670-3\_8},
  doi          = {10.1007/978-3-031-50670-3\_8},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/AdamsCA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/CrompBGS23,
  author       = {Sonia Cromp and
                  Mark Bilinski and
                  Ryan Gabrys and
                  Frederic Sala},
  editor       = {Jie Fu and
                  Tom{\'{a}}s Kroupa and
                  Yezekael Hayel},
  title        = {The Credential is Not Enough: Deception with Honeypots and Fake Credentials},
  booktitle    = {Decision and Game Theory for Security: 14th International Conference,
                  GameSec 2023, Avignon, France, October 18-20, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14167},
  pages        = {234--254},
  publisher    = {Springe},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-50670-3\_12},
  doi          = {10.1007/978-3-031-50670-3\_12},
  timestamp    = {Tue, 22 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/CrompBGS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/Ganzfried23,
  author       = {Sam Ganzfried},
  editor       = {Jie Fu and
                  Tom{\'{a}}s Kroupa and
                  Yezekael Hayel},
  title        = {Observable Perfect Equilibrium},
  booktitle    = {Decision and Game Theory for Security: 14th International Conference,
                  GameSec 2023, Avignon, France, October 18-20, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14167},
  pages        = {3--22},
  publisher    = {Springe},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-50670-3\_1},
  doi          = {10.1007/978-3-031-50670-3\_1},
  timestamp    = {Wed, 02 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/Ganzfried23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/HammarS23,
  author       = {Kim Hammar and
                  Rolf Stadler},
  editor       = {Jie Fu and
                  Tom{\'{a}}s Kroupa and
                  Yezekael Hayel},
  title        = {Scalable Learning of Intrusion Response Through Recursive Decomposition},
  booktitle    = {Decision and Game Theory for Security: 14th International Conference,
                  GameSec 2023, Avignon, France, October 18-20, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14167},
  pages        = {172--192},
  publisher    = {Springe},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-50670-3\_9},
  doi          = {10.1007/978-3-031-50670-3\_9},
  timestamp    = {Wed, 02 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/HammarS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/HenaffC23,
  author       = {Jean Le H{\'{e}}naff and
                  H{\'{e}}l{\`{e}}ne Le Cadre},
  editor       = {Jie Fu and
                  Tom{\'{a}}s Kroupa and
                  Yezekael Hayel},
  title        = {Modeling and Analysis of a Nonlinear Security Game with Mixed Armament},
  booktitle    = {Decision and Game Theory for Security: 14th International Conference,
                  GameSec 2023, Avignon, France, October 18-20, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14167},
  pages        = {369--388},
  publisher    = {Springe},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-50670-3\_19},
  doi          = {10.1007/978-3-031-50670-3\_19},
  timestamp    = {Wed, 02 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/HenaffC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/JohnsonYuFWVSTT23,
  author       = {Sonja Johnson{-}Yu and
                  Jessie Finocchiaro and
                  Kai Wang and
                  Yevgeniy Vorobeychik and
                  Arunesh Sinha and
                  Aparna Taneja and
                  Milind Tambe},
  editor       = {Jie Fu and
                  Tom{\'{a}}s Kroupa and
                  Yezekael Hayel},
  title        = {Characterizing and Improving the Robustness of Predict-Then-Optimize
                  Frameworks},
  booktitle    = {Decision and Game Theory for Security: 14th International Conference,
                  GameSec 2023, Avignon, France, October 18-20, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14167},
  pages        = {133--152},
  publisher    = {Springe},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-50670-3\_7},
  doi          = {10.1007/978-3-031-50670-3\_7},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/JohnsonYuFWVSTT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/KouamHDTK23,
  author       = {Willie Kouam and
                  Yezekael Hayel and
                  Gabriel Deugoue and
                  Olivier Tsemogne and
                  Charles A. Kamhoua},
  editor       = {Jie Fu and
                  Tom{\'{a}}s Kroupa and
                  Yezekael Hayel},
  title        = {Asymmetric Centrality Game Against Network Epidemic Propagation},
  booktitle    = {Decision and Game Theory for Security: 14th International Conference,
                  GameSec 2023, Avignon, France, October 18-20, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14167},
  pages        = {86--109},
  publisher    = {Springe},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-50670-3\_5},
  doi          = {10.1007/978-3-031-50670-3\_5},
  timestamp    = {Tue, 22 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/KouamHDTK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/LiL23,
  author       = {Zhen Li and
                  Qi Liao},
  editor       = {Jie Fu and
                  Tom{\'{a}}s Kroupa and
                  Yezekael Hayel},
  title        = {Does Cyber-Insurance Benefit the Insured or the Attacker? - {A} Game
                  of Cyber-Insurance},
  booktitle    = {Decision and Game Theory for Security: 14th International Conference,
                  GameSec 2023, Avignon, France, October 18-20, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14167},
  pages        = {23--42},
  publisher    = {Springe},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-50670-3\_2},
  doi          = {10.1007/978-3-031-50670-3\_2},
  timestamp    = {Wed, 02 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/LiL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/MaHKF23,
  author       = {Haoxiang Ma and
                  Shuo Han and
                  Charles A. Kamhoua and
                  Jie Fu},
  editor       = {Jie Fu and
                  Tom{\'{a}}s Kroupa and
                  Yezekael Hayel},
  title        = {Optimal Resource Allocation for Proactive Defense with Deception in
                  Probabilistic Attack Graphs},
  booktitle    = {Decision and Game Theory for Security: 14th International Conference,
                  GameSec 2023, Avignon, France, October 18-20, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14167},
  pages        = {215--233},
  publisher    = {Springe},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-50670-3\_11},
  doi          = {10.1007/978-3-031-50670-3\_11},
  timestamp    = {Tue, 22 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/MaHKF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/MaheshBDT23,
  author       = {Shivakumar Mahesh and
                  Nicholas Bishop and
                  Le Cong Dinh and
                  Long Tran{-}Thanh},
  editor       = {Jie Fu and
                  Tom{\'{a}}s Kroupa and
                  Yezekael Hayel},
  title        = {Playing Repeated Coopetitive Polymatrix Games with Small Manipulation
                  Cost},
  booktitle    = {Decision and Game Theory for Security: 14th International Conference,
                  GameSec 2023, Avignon, France, October 18-20, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14167},
  pages        = {257--276},
  publisher    = {Springe},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-50670-3\_13},
  doi          = {10.1007/978-3-031-50670-3\_13},
  timestamp    = {Wed, 02 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/MaheshBDT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/MeursCC23,
  author       = {Tom Meurs and
                  Edward J. Cartwright and
                  Anna Cartwright},
  editor       = {Jie Fu and
                  Tom{\'{a}}s Kroupa and
                  Yezekael Hayel},
  title        = {Double-Sided Information Asymmetry in Double Extortion Ransomware},
  booktitle    = {Decision and Game Theory for Security: 14th International Conference,
                  GameSec 2023, Avignon, France, October 18-20, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14167},
  pages        = {311--328},
  publisher    = {Springe},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-50670-3\_16},
  doi          = {10.1007/978-3-031-50670-3\_16},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/MeursCC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/MvahTDATK23,
  author       = {Fabrice Mvah and
                  Vianney Kengne Tchendji and
                  Cl{\'{e}}mentin Tayou Djam{\'{e}}gni and
                  Ahmed H. Anwar and
                  Deepak K. Tosh and
                  Charles A. Kamhoua},
  editor       = {Jie Fu and
                  Tom{\'{a}}s Kroupa and
                  Yezekael Hayel},
  title        = {FlipPath Game to Counter Stealthy Attacks in SDN-Based Tactical Networks},
  booktitle    = {Decision and Game Theory for Security: 14th International Conference,
                  GameSec 2023, Avignon, France, October 18-20, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14167},
  pages        = {294--308},
  publisher    = {Springe},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-50670-3\_15},
  doi          = {10.1007/978-3-031-50670-3\_15},
  timestamp    = {Tue, 22 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/MvahTDATK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/Pflugel23,
  author       = {Eckhard Pfl{\"{u}}gel},
  editor       = {Jie Fu and
                  Tom{\'{a}}s Kroupa and
                  Yezekael Hayel},
  title        = {Shades of Grey: Strategic Bimatrix Stopping Games for Modelling (Un)Ethical
                  Hacking Roles},
  booktitle    = {Decision and Game Theory for Security: 14th International Conference,
                  GameSec 2023, Avignon, France, October 18-20, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14167},
  pages        = {110--129},
  publisher    = {Springe},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-50670-3\_6},
  doi          = {10.1007/978-3-031-50670-3\_6},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/Pflugel23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/SayedAKK23,
  author       = {Md. Abu Sayed and
                  Ahmed H. Anwar and
                  Christopher Kiekintveld and
                  Charles A. Kamhoua},
  editor       = {Jie Fu and
                  Tom{\'{a}}s Kroupa and
                  Yezekael Hayel},
  title        = {Honeypot Allocation for Cyber Deception in Dynamic Tactical Networks:
                  {A} Game Theoretic Approach},
  booktitle    = {Decision and Game Theory for Security: 14th International Conference,
                  GameSec 2023, Avignon, France, October 18-20, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14167},
  pages        = {195--214},
  publisher    = {Springe},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-50670-3\_10},
  doi          = {10.1007/978-3-031-50670-3\_10},
  timestamp    = {Tue, 22 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/SayedAKK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/SongLF23,
  author       = {Zimeng Song and
                  Chun Kai Ling and
                  Fei Fang},
  editor       = {Jie Fu and
                  Tom{\'{a}}s Kroupa and
                  Yezekael Hayel},
  title        = {Multi-defender Security Games with Schedules},
  booktitle    = {Decision and Game Theory for Security: 14th International Conference,
                  GameSec 2023, Avignon, France, October 18-20, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14167},
  pages        = {65--85},
  publisher    = {Springe},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-50670-3\_4},
  doi          = {10.1007/978-3-031-50670-3\_4},
  timestamp    = {Wed, 02 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/SongLF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/SychrovskyDL23,
  author       = {David Sychrovsky and
                  Sameer Desai and
                  Martin Loebl},
  editor       = {Jie Fu and
                  Tom{\'{a}}s Kroupa and
                  Yezekael Hayel},
  title        = {Rule Enforcing Through Ordering},
  booktitle    = {Decision and Game Theory for Security: 14th International Conference,
                  GameSec 2023, Avignon, France, October 18-20, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14167},
  pages        = {43--62},
  publisher    = {Springe},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-50670-3\_3},
  doi          = {10.1007/978-3-031-50670-3\_3},
  timestamp    = {Tue, 22 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/SychrovskyDL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/UdupaRF23,
  author       = {Sumukha Udupa and
                  Hazhar Rahmani and
                  Jie Fu},
  editor       = {Jie Fu and
                  Tom{\'{a}}s Kroupa and
                  Yezekael Hayel},
  title        = {Opacity-Enforcing Active Perception and Control Against Eavesdropping
                  Attacks},
  booktitle    = {Decision and Game Theory for Security: 14th International Conference,
                  GameSec 2023, Avignon, France, October 18-20, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14167},
  pages        = {329--348},
  publisher    = {Springe},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-50670-3\_17},
  doi          = {10.1007/978-3-031-50670-3\_17},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/UdupaRF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/YamashitaY23,
  author       = {Keigo Yamashita and
                  Kenji Yasunaga},
  editor       = {Jie Fu and
                  Tom{\'{a}}s Kroupa and
                  Yezekael Hayel},
  title        = {Rational Broadcast Protocols Against Timid Adversaries},
  booktitle    = {Decision and Game Theory for Security: 14th International Conference,
                  GameSec 2023, Avignon, France, October 18-20, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14167},
  pages        = {277--293},
  publisher    = {Springe},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-50670-3\_14},
  doi          = {10.1007/978-3-031-50670-3\_14},
  timestamp    = {Wed, 02 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/YamashitaY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/YangZZ23,
  author       = {Ya{-}Ting Yang and
                  Tao Zhang and
                  Quanyan Zhu},
  editor       = {Jie Fu and
                  Tom{\'{a}}s Kroupa and
                  Yezekael Hayel},
  title        = {A Game-Theoretic Analysis of Auditing Differentially Private Algorithms
                  with Epistemically Disparate Herd},
  booktitle    = {Decision and Game Theory for Security: 14th International Conference,
                  GameSec 2023, Avignon, France, October 18-20, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14167},
  pages        = {349--368},
  publisher    = {Springe},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-50670-3\_18},
  doi          = {10.1007/978-3-031-50670-3\_18},
  timestamp    = {Mon, 07 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/YangZZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/gamesec/2022,
  editor       = {Fei Fang and
                  Haifeng Xu and
                  Yezekael Hayel},
  title        = {Decision and Game Theory for Security - 13th International Conference,
                  GameSec 2022, Pittsburgh, PA, USA, October 26-28, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13727},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-26369-9},
  doi          = {10.1007/978-3-031-26369-9},
  isbn         = {978-3-031-26368-2},
  timestamp    = {Wed, 07 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/gamesec/2023,
  editor       = {Jie Fu and
                  Tom{\'{a}}s Kroupa and
                  Yezekael Hayel},
  title        = {Decision and Game Theory for Security: 14th International Conference,
                  GameSec 2023, Avignon, France, October 18-20, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14167},
  publisher    = {Springe},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-50670-3},
  doi          = {10.1007/978-3-031-50670-3},
  isbn         = {978-3-031-50669-7},
  timestamp    = {Wed, 02 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/BajajB22,
  author       = {Shivam Bajaj and
                  Shaunak D. Bopardikar},
  editor       = {Fei Fang and
                  Haifeng Xu and
                  Yezekael Hayel},
  title        = {Optimal Pursuit of Surveilling Agents Near a High Value Target},
  booktitle    = {Decision and Game Theory for Security - 13th International Conference,
                  GameSec 2022, Pittsburgh, PA, USA, October 26-28, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13727},
  pages        = {168--187},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-26369-9\_9},
  doi          = {10.1007/978-3-031-26369-9\_9},
  timestamp    = {Wed, 07 Feb 2024 17:23:12 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/BajajB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/BhambriCADK22,
  author       = {Siddhant Bhambri and
                  Purv Chauhan and
                  Frederico Araujo and
                  Adam Doup{\'{e}} and
                  Subbarao Kambhampati},
  editor       = {Fei Fang and
                  Haifeng Xu and
                  Yezekael Hayel},
  title        = {Using Deception in Markov Game to Understand Adversarial Behaviors
                  Through a Capture-The-Flag Environment},
  booktitle    = {Decision and Game Theory for Security - 13th International Conference,
                  GameSec 2022, Pittsburgh, PA, USA, October 26-28, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13727},
  pages        = {87--106},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-26369-9\_5},
  doi          = {10.1007/978-3-031-26369-9\_5},
  timestamp    = {Tue, 14 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/BhambriCADK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/BhattacherjeeS22,
  author       = {Sanjay Bhattacherjee and
                  Palash Sarkar},
  editor       = {Fei Fang and
                  Haifeng Xu and
                  Yezekael Hayel},
  title        = {Voting Games to Model Protocol Stability and Security of Proof-of-Work
                  Cryptocurrencies},
  booktitle    = {Decision and Game Theory for Security - 13th International Conference,
                  GameSec 2022, Pittsburgh, PA, USA, October 26-28, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13727},
  pages        = {297--318},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-26369-9\_15},
  doi          = {10.1007/978-3-031-26369-9\_15},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/BhattacherjeeS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/Fu22,
  author       = {Jie Fu},
  editor       = {Fei Fang and
                  Haifeng Xu and
                  Yezekael Hayel},
  title        = {On Almost-Sure Intention Deception Planning that Exploits Imperfect
                  Observers},
  booktitle    = {Decision and Game Theory for Security - 13th International Conference,
                  GameSec 2022, Pittsburgh, PA, USA, October 26-28, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13727},
  pages        = {67--86},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-26369-9\_4},
  doi          = {10.1007/978-3-031-26369-9\_4},
  timestamp    = {Fri, 20 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/Fu22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/GabrysBMSF22,
  author       = {Ryan Gabrys and
                  Mark Bilinski and
                  Justin Mauger and
                  Daniel Silva and
                  Sunny Fugate},
  editor       = {Fei Fang and
                  Haifeng Xu and
                  Yezekael Hayel},
  title        = {Casino Rationale: Countering Attacker Deception in Zero-Sum Stackelberg
                  Security Games of Bounded Rationality},
  booktitle    = {Decision and Game Theory for Security - 13th International Conference,
                  GameSec 2022, Pittsburgh, PA, USA, October 26-28, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13727},
  pages        = {23--43},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-26369-9\_2},
  doi          = {10.1007/978-3-031-26369-9\_2},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/GabrysBMSF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/KinseyTSN22,
  author       = {Sarah Eve Kinsey and
                  Wong Wai Tuck and
                  Arunesh Sinha and
                  Thanh Hong Nguyen},
  editor       = {Fei Fang and
                  Haifeng Xu and
                  Yezekael Hayel},
  title        = {An Exploration of Poisoning Attacks on Data-Based Decision Making},
  booktitle    = {Decision and Game Theory for Security - 13th International Conference,
                  GameSec 2022, Pittsburgh, PA, USA, October 26-28, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13727},
  pages        = {231--252},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-26369-9\_12},
  doi          = {10.1007/978-3-031-26369-9\_12},
  timestamp    = {Tue, 14 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/KinseyTSN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/KroupaV22,
  author       = {Tom{\'{a}}s Kroupa and
                  Tom{\'{a}}s Votroubek},
  editor       = {Fei Fang and
                  Haifeng Xu and
                  Yezekael Hayel},
  title        = {Multiple Oracle Algorithm to Solve Continuous Games},
  booktitle    = {Decision and Game Theory for Security - 13th International Conference,
                  GameSec 2022, Pittsburgh, PA, USA, October 26-28, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13727},
  pages        = {149--167},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-26369-9\_8},
  doi          = {10.1007/978-3-031-26369-9\_8},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/KroupaV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/LiZ22,
  author       = {Henger Li and
                  Zizhan Zheng},
  editor       = {Fei Fang and
                  Haifeng Xu and
                  Yezekael Hayel},
  title        = {Robust Moving Target Defense Against Unknown Attacks: {A} Meta-reinforcement
                  Learning Approach},
  booktitle    = {Decision and Game Theory for Security - 13th International Conference,
                  GameSec 2022, Pittsburgh, PA, USA, October 26-28, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13727},
  pages        = {107--126},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-26369-9\_6},
  doi          = {10.1007/978-3-031-26369-9\_6},
  timestamp    = {Tue, 14 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/LiZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/NguyenY22,
  author       = {Thanh Hong Nguyen and
                  Amulya Yadav},
  editor       = {Fei Fang and
                  Haifeng Xu and
                  Yezekael Hayel},
  title        = {The Risk of Attacker Behavioral Learning: Can Attacker Fool Defender
                  Under Uncertainty?},
  booktitle    = {Decision and Game Theory for Security - 13th International Conference,
                  GameSec 2022, Pittsburgh, PA, USA, October 26-28, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13727},
  pages        = {3--22},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-26369-9\_1},
  doi          = {10.1007/978-3-031-26369-9\_1},
  timestamp    = {Tue, 14 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/NguyenY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/PanZ22,
  author       = {Yunian Pan and
                  Quanyan Zhu},
  editor       = {Fei Fang and
                  Haifeng Xu and
                  Yezekael Hayel},
  title        = {On Poisoned Wardrop Equilibrium in Congestion Games},
  booktitle    = {Decision and Game Theory for Security - 13th International Conference,
                  GameSec 2022, Pittsburgh, PA, USA, October 26-28, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13727},
  pages        = {191--211},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-26369-9\_10},
  doi          = {10.1007/978-3-031-26369-9\_10},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/PanZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/RassK22,
  author       = {Stefan Rass and
                  Sandra K{\"{o}}nig},
  editor       = {Fei Fang and
                  Haifeng Xu and
                  Yezekael Hayel},
  title        = {Synchronization in Security Games},
  booktitle    = {Decision and Game Theory for Security - 13th International Conference,
                  GameSec 2022, Pittsburgh, PA, USA, October 26-28, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13727},
  pages        = {129--148},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-26369-9\_7},
  doi          = {10.1007/978-3-031-26369-9\_7},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/RassK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/SarkarFVGZ22,
  author       = {Anindya Sarkar and
                  Jiarui Feng and
                  Yevgeniy Vorobeychik and
                  Christopher D. Gill and
                  Ning Zhang},
  editor       = {Fei Fang and
                  Haifeng Xu and
                  Yezekael Hayel},
  title        = {Reward Delay Attacks on Deep Reinforcement Learning},
  booktitle    = {Decision and Game Theory for Security - 13th International Conference,
                  GameSec 2022, Pittsburgh, PA, USA, October 26-28, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13727},
  pages        = {212--230},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-26369-9\_11},
  doi          = {10.1007/978-3-031-26369-9\_11},
  timestamp    = {Tue, 14 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/SarkarFVGZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/SayedAKBK22,
  author       = {Md. Abu Sayed and
                  Ahmed H. Anwar and
                  Christopher Kiekintveld and
                  Branislav Bosansk{\'{y}} and
                  Charles A. Kamhoua},
  editor       = {Fei Fang and
                  Haifeng Xu and
                  Yezekael Hayel},
  title        = {Cyber Deception Against Zero-Day Attacks: {A} Game Theoretic Approach},
  booktitle    = {Decision and Game Theory for Security - 13th International Conference,
                  GameSec 2022, Pittsburgh, PA, USA, October 26-28, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13727},
  pages        = {44--63},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-26369-9\_3},
  doi          = {10.1007/978-3-031-26369-9\_3},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/SayedAKBK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/TsemogneHKD22,
  author       = {Olivier Tsemogne and
                  Yezekael Hayel and
                  Charles A. Kamhoua and
                  Gabriel Deugoue},
  editor       = {Fei Fang and
                  Haifeng Xu and
                  Yezekael Hayel},
  title        = {Optimizing Intrusion Detection Systems Placement Against Network Virus
                  Spreading Using a Partially Observable Stochastic Minimum-Threat Path
                  Game},
  booktitle    = {Decision and Game Theory for Security - 13th International Conference,
                  GameSec 2022, Pittsburgh, PA, USA, October 26-28, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13727},
  pages        = {274--296},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-26369-9\_14},
  doi          = {10.1007/978-3-031-26369-9\_14},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/TsemogneHKD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/TsemogneKAHKD22,
  author       = {Olivier Tsemogne and
                  Willie Kouam and
                  Ahmed H. Anwar and
                  Yezekael Hayel and
                  Charles A. Kamhoua and
                  Gabriel Deugoue},
  editor       = {Fei Fang and
                  Haifeng Xu and
                  Yezekael Hayel},
  title        = {A Network Centrality Game for Epidemic Control},
  booktitle    = {Decision and Game Theory for Security - 13th International Conference,
                  GameSec 2022, Pittsburgh, PA, USA, October 26-28, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13727},
  pages        = {255--273},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-26369-9\_13},
  doi          = {10.1007/978-3-031-26369-9\_13},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/TsemogneKAHKD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/BaiBH21,
  author       = {Wenjie Bai and
                  Jeremiah Blocki and
                  Benjamin Harsha},
  editor       = {Branislav Bosansk{\'{y}} and
                  Cleotilde Gonzalez and
                  Stefan Rass and
                  Arunesh Sinha},
  title        = {Password Strength Signaling: {A} Counter-Intuitive Defense Against
                  Password Cracking},
  booktitle    = {Decision and Game Theory for Security - 12th International Conference,
                  GameSec 2021, Virtual Event, October 25-27, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13061},
  pages        = {334--353},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90370-1\_18},
  doi          = {10.1007/978-3-030-90370-1\_18},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/BaiBH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/BilinskiDFFGMS21,
  author       = {Mark Bilinski and
                  Joseph DiVita and
                  Kimberly Ferguson{-}Walter and
                  Sunny Fugate and
                  Ryan Gabrys and
                  Justin Mauger and
                  Brian Souza},
  editor       = {Branislav Bosansk{\'{y}} and
                  Cleotilde Gonzalez and
                  Stefan Rass and
                  Arunesh Sinha},
  title        = {No Time to Lie: Bounds on the Learning Rate of a Defender for Inferring
                  Attacker Target Preferences},
  booktitle    = {Decision and Game Theory for Security - 12th International Conference,
                  GameSec 2021, Virtual Event, October 25-27, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13061},
  pages        = {138--157},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90370-1\_8},
  doi          = {10.1007/978-3-030-90370-1\_8},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/BilinskiDFFGMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/BrahmaNN21,
  author       = {Swastik Brahma and
                  Laurent Njilla and
                  Satyaki Nan},
  editor       = {Branislav Bosansk{\'{y}} and
                  Cleotilde Gonzalez and
                  Stefan Rass and
                  Arunesh Sinha},
  title        = {Game Theoretic Hardware Trojan Testing Under Cost Considerations},
  booktitle    = {Decision and Game Theory for Security - 12th International Conference,
                  GameSec 2021, Virtual Event, October 25-27, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13061},
  pages        = {251--270},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90370-1\_14},
  doi          = {10.1007/978-3-030-90370-1\_14},
  timestamp    = {Fri, 05 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/BrahmaNN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/ButlerNS21,
  author       = {Andrew R. Butler and
                  Thanh Hong Nguyen and
                  Arunesh Sinha},
  editor       = {Branislav Bosansk{\'{y}} and
                  Cleotilde Gonzalez and
                  Stefan Rass and
                  Arunesh Sinha},
  title        = {Countering Attacker Data Manipulation in Security Games},
  booktitle    = {Decision and Game Theory for Security - 12th International Conference,
                  GameSec 2021, Virtual Event, October 25-27, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13061},
  pages        = {59--79},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90370-1\_4},
  doi          = {10.1007/978-3-030-90370-1\_4},
  timestamp    = {Fri, 03 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/ButlerNS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/CollinsXB21,
  author       = {Brandon C. Collins and
                  Shouhuai Xu and
                  Philip N. Brown},
  editor       = {Branislav Bosansk{\'{y}} and
                  Cleotilde Gonzalez and
                  Stefan Rass and
                  Arunesh Sinha},
  title        = {Paying Firms to Share Cyber Threat Intelligence},
  booktitle    = {Decision and Game Theory for Security - 12th International Conference,
                  GameSec 2021, Virtual Event, October 25-27, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13061},
  pages        = {365--377},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90370-1\_20},
  doi          = {10.1007/978-3-030-90370-1\_20},
  timestamp    = {Fri, 05 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/CollinsXB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/Galinkin21,
  author       = {Erick Galinkin},
  editor       = {Branislav Bosansk{\'{y}} and
                  Cleotilde Gonzalez and
                  Stefan Rass and
                  Arunesh Sinha},
  title        = {Winning the Ransomware Lottery - {A} Game-Theoretic Approach to Preventing
                  Ransomware Attacks},
  booktitle    = {Decision and Game Theory for Security - 12th International Conference,
                  GameSec 2021, Virtual Event, October 25-27, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13061},
  pages        = {195--207},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90370-1\_11},
  doi          = {10.1007/978-3-030-90370-1\_11},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/Galinkin21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/GalinkinCM21,
  author       = {Erick Galinkin and
                  John Carter and
                  Spiros Mancoridis},
  editor       = {Branislav Bosansk{\'{y}} and
                  Cleotilde Gonzalez and
                  Stefan Rass and
                  Arunesh Sinha},
  title        = {Evaluating Attacker Risk Behavior in an Internet of Things Ecosystem},
  booktitle    = {Decision and Game Theory for Security - 12th International Conference,
                  GameSec 2021, Virtual Event, October 25-27, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13061},
  pages        = {354--364},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90370-1\_19},
  doi          = {10.1007/978-3-030-90370-1\_19},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/GalinkinCM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/Ganzfried21,
  author       = {Sam Ganzfried},
  editor       = {Branislav Bosansk{\'{y}} and
                  Cleotilde Gonzalez and
                  Stefan Rass and
                  Arunesh Sinha},
  title        = {Computing Nash Equilibria in Multiplayer DAG-Structured Stochastic
                  Games with Persistent Imperfect Information},
  booktitle    = {Decision and Game Theory for Security - 12th International Conference,
                  GameSec 2021, Virtual Event, October 25-27, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13061},
  pages        = {3--16},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90370-1\_1},
  doi          = {10.1007/978-3-030-90370-1\_1},
  timestamp    = {Fri, 05 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/Ganzfried21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/HuangZ21,
  author       = {Linan Huang and
                  Quanyan Zhu},
  editor       = {Branislav Bosansk{\'{y}} and
                  Cleotilde Gonzalez and
                  Stefan Rass and
                  Arunesh Sinha},
  title        = {Combating Informational Denial-of-Service (IDoS) Attacks: Modeling
                  and Mitigation of Attentional Human Vulnerability},
  booktitle    = {Decision and Game Theory for Security - 12th International Conference,
                  GameSec 2021, Virtual Event, October 25-27, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13061},
  pages        = {314--333},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90370-1\_17},
  doi          = {10.1007/978-3-030-90370-1\_17},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/HuangZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/JinYKL21,
  author       = {Kun Jin and
                  Tongxin Yin and
                  Charles A. Kamhoua and
                  Mingyan Liu},
  editor       = {Branislav Bosansk{\'{y}} and
                  Cleotilde Gonzalez and
                  Stefan Rass and
                  Arunesh Sinha},
  title        = {Network Games with Strategic Machine Learning},
  booktitle    = {Decision and Game Theory for Security - 12th International Conference,
                  GameSec 2021, Virtual Event, October 25-27, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13061},
  pages        = {118--137},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90370-1\_7},
  doi          = {10.1007/978-3-030-90370-1\_7},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/JinYKL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/KroupaVV21,
  author       = {Tom{\'{a}}s Kroupa and
                  Sara Vannucci and
                  Tom{\'{a}}s Votroubek},
  editor       = {Branislav Bosansk{\'{y}} and
                  Cleotilde Gonzalez and
                  Stefan Rass and
                  Arunesh Sinha},
  title        = {Separable Network Games with Compact Strategy Sets},
  booktitle    = {Decision and Game Theory for Security - 12th International Conference,
                  GameSec 2021, Virtual Event, October 25-27, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13061},
  pages        = {37--56},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90370-1\_3},
  doi          = {10.1007/978-3-030-90370-1\_3},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/KroupaVV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/MotaqyABY21,
  author       = {Zahra Motaqy and
                  Ghada Almashaqbeh and
                  Behnam Bahrak and
                  Naser Yazdani},
  editor       = {Branislav Bosansk{\'{y}} and
                  Cleotilde Gonzalez and
                  Stefan Rass and
                  Arunesh Sinha},
  title        = {Bet and Attack: Incentive Compatible Collaborative Attacks Using Smart
                  Contracts},
  booktitle    = {Decision and Game Theory for Security - 12th International Conference,
                  GameSec 2021, Virtual Event, October 25-27, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13061},
  pages        = {293--313},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90370-1\_16},
  doi          = {10.1007/978-3-030-90370-1\_16},
  timestamp    = {Fri, 05 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/MotaqyABY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/NiuSCP21,
  author       = {Luyao Niu and
                  Dinuka Sahabandu and
                  Andrew Clark and
                  Radha Poovendran},
  editor       = {Branislav Bosansk{\'{y}} and
                  Cleotilde Gonzalez and
                  Stefan Rass and
                  Arunesh Sinha},
  title        = {A Game-Theoretic Framework for Controlled Islanding in the Presence
                  of Adversaries},
  booktitle    = {Decision and Game Theory for Security - 12th International Conference,
                  GameSec 2021, Virtual Event, October 25-27, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13061},
  pages        = {231--250},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90370-1\_13},
  doi          = {10.1007/978-3-030-90370-1\_13},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/NiuSCP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/PiHG21,
  author       = {Jianzong Pi and
                  Joseph L. Heyman and
                  Abhishek Gupta},
  editor       = {Branislav Bosansk{\'{y}} and
                  Cleotilde Gonzalez and
                  Stefan Rass and
                  Arunesh Sinha},
  title        = {Two Algorithms for Computing Exact and Approximate Nash Equilibria
                  in Bimatrix Games},
  booktitle    = {Decision and Game Theory for Security - 12th International Conference,
                  GameSec 2021, Virtual Event, October 25-27, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13061},
  pages        = {17--36},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90370-1\_2},
  doi          = {10.1007/978-3-030-90370-1\_2},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/PiHG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/RoussillonL21,
  author       = {Benjamin Roussillon and
                  Patrick Loiseau},
  editor       = {Branislav Bosansk{\'{y}} and
                  Cleotilde Gonzalez and
                  Stefan Rass and
                  Arunesh Sinha},
  title        = {Scalable Optimal Classifiers for Adversarial Settings Under Uncertainty},
  booktitle    = {Decision and Game Theory for Security - 12th International Conference,
                  GameSec 2021, Virtual Event, October 25-27, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13061},
  pages        = {80--97},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90370-1\_5},
  doi          = {10.1007/978-3-030-90370-1\_5},
  timestamp    = {Fri, 05 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/RoussillonL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/RoyKVL21,
  author       = {Shanto Roy and
                  Salah Uddin Kadir and
                  Yevgeniy Vorobeychik and
                  Aron Laszka},
  editor       = {Branislav Bosansk{\'{y}} and
                  Cleotilde Gonzalez and
                  Stefan Rass and
                  Arunesh Sinha},
  title        = {Strategic Remote Attestation: Testbed for Internet-of-Things Devices
                  and Stackelberg Security Game for Optimal Strategies},
  booktitle    = {Decision and Game Theory for Security - 12th International Conference,
                  GameSec 2021, Virtual Event, October 25-27, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13061},
  pages        = {271--290},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90370-1\_15},
  doi          = {10.1007/978-3-030-90370-1\_15},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/RoyKVL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/SamsingerMSP21,
  author       = {Maximilian Samsinger and
                  Florian Merkle and
                  Pascal Sch{\"{o}}ttle and
                  Tom{\'{a}}s Pevn{\'{y}}},
  editor       = {Branislav Bosansk{\'{y}} and
                  Cleotilde Gonzalez and
                  Stefan Rass and
                  Arunesh Sinha},
  title        = {When Should You Defend Your Classifier? - - {A} Game-Theoretical Analysis
                  of Countermeasures Against Adversarial Examples},
  booktitle    = {Decision and Game Theory for Security - 12th International Conference,
                  GameSec 2021, Virtual Event, October 25-27, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13061},
  pages        = {158--177},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90370-1\_9},
  doi          = {10.1007/978-3-030-90370-1\_9},
  timestamp    = {Fri, 05 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/SamsingerMSP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/VakiliniaKL21,
  author       = {Iman Vakilinia and
                  Mohammad Mahdi Khalili and
                  Ming Li},
  editor       = {Branislav Bosansk{\'{y}} and
                  Cleotilde Gonzalez and
                  Stefan Rass and
                  Arunesh Sinha},
  title        = {A Mechanism Design Approach to Solve Ransomware Dilemmas},
  booktitle    = {Decision and Game Theory for Security - 12th International Conference,
                  GameSec 2021, Virtual Event, October 25-27, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13061},
  pages        = {181--194},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90370-1\_10},
  doi          = {10.1007/978-3-030-90370-1\_10},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/VakiliniaKL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/WuKKV21,
  author       = {Junlin Wu and
                  Charles A. Kamhoua and
                  Murat Kantarcioglu and
                  Yevgeniy Vorobeychik},
  editor       = {Branislav Bosansk{\'{y}} and
                  Cleotilde Gonzalez and
                  Stefan Rass and
                  Arunesh Sinha},
  title        = {Learning Generative Deception Strategies in Combinatorial Masking
                  Games},
  booktitle    = {Decision and Game Theory for Security - 12th International Conference,
                  GameSec 2021, Virtual Event, October 25-27, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13061},
  pages        = {98--117},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90370-1\_6},
  doi          = {10.1007/978-3-030-90370-1\_6},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/WuKKV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/ZhaoGZ21,
  author       = {Yuhan Zhao and
                  Yunfei Ge and
                  Quanyan Zhu},
  editor       = {Branislav Bosansk{\'{y}} and
                  Cleotilde Gonzalez and
                  Stefan Rass and
                  Arunesh Sinha},
  title        = {Combating Ransomware in Internet of Things: {A} Games-in-Games Approach
                  for Cross-Layer Cyber Defense and Security Investment},
  booktitle    = {Decision and Game Theory for Security - 12th International Conference,
                  GameSec 2021, Virtual Event, October 25-27, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13061},
  pages        = {208--228},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90370-1\_12},
  doi          = {10.1007/978-3-030-90370-1\_12},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/ZhaoGZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/gamesec/2021,
  editor       = {Branislav Bosansk{\'{y}} and
                  Cleotilde Gonzalez and
                  Stefan Rass and
                  Arunesh Sinha},
  title        = {Decision and Game Theory for Security - 12th International Conference,
                  GameSec 2021, Virtual Event, October 25-27, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13061},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90370-1},
  doi          = {10.1007/978-3-030-90370-1},
  isbn         = {978-3-030-90369-5},
  timestamp    = {Fri, 05 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/AnwarK20,
  author       = {Ahmed H. Anwar and
                  Charles A. Kamhoua},
  editor       = {Quanyan Zhu and
                  John S. Baras and
                  Radha Poovendran and
                  Juntao Chen},
  title        = {Game Theory on Attack Graph for Cyber Deception},
  booktitle    = {Decision and Game Theory for Security - 11th International Conference,
                  GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12513},
  pages        = {445--456},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64793-3\_24},
  doi          = {10.1007/978-3-030-64793-3\_24},
  timestamp    = {Sat, 09 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/AnwarK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/AnwarLKK20,
  author       = {Ahmed H. Anwar and
                  Nandi O. Leslie and
                  Charles A. Kamhoua and
                  Christopher Kiekintveld},
  editor       = {Quanyan Zhu and
                  John S. Baras and
                  Radha Poovendran and
                  Juntao Chen},
  title        = {A Game Theoretic Framework for Software Diversity for Network Security},
  booktitle    = {Decision and Game Theory for Security - 11th International Conference,
                  GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12513},
  pages        = {297--311},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64793-3\_16},
  doi          = {10.1007/978-3-030-64793-3\_16},
  timestamp    = {Sat, 09 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/AnwarLKK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/BelavadiZKT20,
  author       = {Vibha Belavadi and
                  Yan Zhou and
                  Murat Kantarcioglu and
                  Bhavani Thuraisingham},
  editor       = {Quanyan Zhu and
                  John S. Baras and
                  Radha Poovendran and
                  Juntao Chen},
  title        = {Attacking Machine Learning Models for Social Good},
  booktitle    = {Decision and Game Theory for Security - 11th International Conference,
                  GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12513},
  pages        = {457--471},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64793-3\_25},
  doi          = {10.1007/978-3-030-64793-3\_25},
  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/BelavadiZKT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/BilinskidFFGMS20,
  author       = {Mark Bilinski and
                  Joe DiVita and
                  Kimberly Ferguson{-}Walter and
                  Sunny Fugate and
                  Ryan Gabrys and
                  Justin Mauger and
                  Brian Souza},
  editor       = {Quanyan Zhu and
                  John S. Baras and
                  Radha Poovendran and
                  Juntao Chen},
  title        = {Lie Another Day: Demonstrating Bias in a Multi-round Cyber Deception
                  Game of Questionable Veracity},
  booktitle    = {Decision and Game Theory for Security - 11th International Conference,
                  GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12513},
  pages        = {80--100},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64793-3\_5},
  doi          = {10.1007/978-3-030-64793-3\_5},
  timestamp    = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/BilinskidFFGMS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/Cansever20,
  author       = {Derya Cansever},
  editor       = {Quanyan Zhu and
                  John S. Baras and
                  Radha Poovendran and
                  Juntao Chen},
  title        = {Security Games with Insider Threats},
  booktitle    = {Decision and Game Theory for Security - 11th International Conference,
                  GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12513},
  pages        = {502--505},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64793-3\_28},
  doi          = {10.1007/978-3-030-64793-3\_28},
  timestamp    = {Tue, 05 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/Cansever20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/EghtesadVL20,
  author       = {Taha Eghtesad and
                  Yevgeniy Vorobeychik and
                  Aron Laszka},
  editor       = {Quanyan Zhu and
                  John S. Baras and
                  Radha Poovendran and
                  Juntao Chen},
  title        = {Adversarial Deep Reinforcement Learning Based Adaptive Moving Target
                  Defense},
  booktitle    = {Decision and Game Theory for Security - 11th International Conference,
                  GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12513},
  pages        = {58--79},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64793-3\_4},
  doi          = {10.1007/978-3-030-64793-3\_4},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/EghtesadVL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/EmadiB20,
  author       = {Hamid Emadi and
                  Sourabh Bhattacharya},
  editor       = {Quanyan Zhu and
                  John S. Baras and
                  Radha Poovendran and
                  Juntao Chen},
  title        = {On the Characterization of Saddle Point Equilibrium for Security Games
                  with Additive Utility},
  booktitle    = {Decision and Game Theory for Security - 11th International Conference,
                  GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12513},
  pages        = {349--364},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64793-3\_19},
  doi          = {10.1007/978-3-030-64793-3\_19},
  timestamp    = {Sat, 09 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/EmadiB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/GranadosMOK20,
  author       = {Alonso Granados and
                  Mohammad Sujan Miah and
                  Anthony Ortiz and
                  Christopher Kiekintveld},
  editor       = {Quanyan Zhu and
                  John S. Baras and
                  Radha Poovendran and
                  Juntao Chen},
  title        = {A Realistic Approach for Network Traffic Obfuscation Using Adversarial
                  Machine Learning},
  booktitle    = {Decision and Game Theory for Security - 11th International Conference,
                  GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12513},
  pages        = {45--57},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64793-3\_3},
  doi          = {10.1007/978-3-030-64793-3\_3},
  timestamp    = {Tue, 05 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/GranadosMOK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/HuangZ20,
  author       = {Linan Huang and
                  Quanyan Zhu},
  editor       = {Quanyan Zhu and
                  John S. Baras and
                  Radha Poovendran and
                  Juntao Chen},
  title        = {Farsighted Risk Mitigation of Lateral Movement Using Dynamic Cognitive
                  Honeypots},
  booktitle    = {Decision and Game Theory for Security - 11th International Conference,
                  GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12513},
  pages        = {125--146},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64793-3\_7},
  doi          = {10.1007/978-3-030-64793-3\_7},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/HuangZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/JiaZKV20,
  author       = {Feiran Jia and
                  Kai Zhou and
                  Charles A. Kamhoua and
                  Yevgeniy Vorobeychik},
  editor       = {Quanyan Zhu and
                  John S. Baras and
                  Radha Poovendran and
                  Juntao Chen},
  title        = {Blocking Adversarial Influence in Social Networks},
  booktitle    = {Decision and Game Theory for Security - 11th International Conference,
                  GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12513},
  pages        = {257--276},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64793-3\_14},
  doi          = {10.1007/978-3-030-64793-3\_14},
  timestamp    = {Mon, 22 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/JiaZKV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/KatzefCALK20,
  author       = {Marc Katzef and
                  Andrew C. Cullen and
                  Tansu Alpcan and
                  Christopher Leckie and
                  Justin Kopacz},
  editor       = {Quanyan Zhu and
                  John S. Baras and
                  Radha Poovendran and
                  Juntao Chen},
  title        = {Distributed Generative Adversarial Networks for Anomaly Detection},
  booktitle    = {Decision and Game Theory for Security - 11th International Conference,
                  GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12513},
  pages        = {3--22},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64793-3\_1},
  doi          = {10.1007/978-3-030-64793-3\_1},
  timestamp    = {Sat, 09 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/KatzefCALK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/KulkarniFLKL20,
  author       = {Abhishek Ninad Kulkarni and
                  Jie Fu and
                  Huan Luo and
                  Charles A. Kamhoua and
                  Nandi O. Leslie},
  editor       = {Quanyan Zhu and
                  John S. Baras and
                  Radha Poovendran and
                  Juntao Chen},
  title        = {Decoy Allocation Games on Graphs with Temporal Logic Objectives},
  booktitle    = {Decision and Game Theory for Security - 11th International Conference,
                  GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12513},
  pages        = {168--187},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64793-3\_9},
  doi          = {10.1007/978-3-030-64793-3\_9},
  timestamp    = {Fri, 20 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/KulkarniFLKL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/MaGK20,
  author       = {Xiaobai Ma and
                  Jayesh K. Gupta and
                  Mykel J. Kochenderfer},
  editor       = {Quanyan Zhu and
                  John S. Baras and
                  Radha Poovendran and
                  Juntao Chen},
  title        = {Normalizing Flow Policies for Multi-agent Systems},
  booktitle    = {Decision and Game Theory for Security - 11th International Conference,
                  GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12513},
  pages        = {277--296},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64793-3\_15},
  doi          = {10.1007/978-3-030-64793-3\_15},
  timestamp    = {Sat, 09 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/MaGK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/MavridisSB20,
  author       = {Christos N. Mavridis and
                  Nilesh Suriyarachchi and
                  John S. Baras},
  editor       = {Quanyan Zhu and
                  John S. Baras and
                  Radha Poovendran and
                  Juntao Chen},
  title        = {Detection of Dynamically Changing Leaders in Complex Swarms from Observed
                  Dynamic Data},
  booktitle    = {Decision and Game Theory for Security - 11th International Conference,
                  GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12513},
  pages        = {223--240},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64793-3\_12},
  doi          = {10.1007/978-3-030-64793-3\_12},
  timestamp    = {Tue, 05 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/MavridisSB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/MilaniSCVLKF20,
  author       = {Stephanie Milani and
                  Weiran Shen and
                  Kevin S. Chan and
                  Sridhar Venkatesan and
                  Nandi O. Leslie and
                  Charles A. Kamhoua and
                  Fei Fang},
  editor       = {Quanyan Zhu and
                  John S. Baras and
                  Radha Poovendran and
                  Juntao Chen},
  title        = {Harnessing the Power of Deception in Attack Graph-Based Security Games},
  booktitle    = {Decision and Game Theory for Security - 11th International Conference,
                  GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12513},
  pages        = {147--167},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64793-3\_8},
  doi          = {10.1007/978-3-030-64793-3\_8},
  timestamp    = {Wed, 07 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/MilaniSCVLKF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/PanPCZ20,
  author       = {Yunian Pan and
                  Guanze Peng and
                  Juntao Chen and
                  Quanyan Zhu},
  editor       = {Quanyan Zhu and
                  John S. Baras and
                  Radha Poovendran and
                  Juntao Chen},
  title        = {{MASAGE:} Model-Agnostic Sequential and Adaptive Game Estimation},
  booktitle    = {Decision and Game Theory for Security - 11th International Conference,
                  GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12513},
  pages        = {365--384},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64793-3\_20},
  doi          = {10.1007/978-3-030-64793-3\_20},
  timestamp    = {Sat, 09 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/PanPCZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/PengZZ20,
  author       = {Guanze Peng and
                  Tao Zhang and
                  Quanyan Zhu},
  editor       = {Quanyan Zhu and
                  John S. Baras and
                  Radha Poovendran and
                  Juntao Chen},
  title        = {A Data-Driven Distributionally Robust Game Using Wasserstein Distance},
  booktitle    = {Decision and Game Theory for Security - 11th International Conference,
                  GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12513},
  pages        = {405--421},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64793-3\_22},
  doi          = {10.1007/978-3-030-64793-3\_22},
  timestamp    = {Sat, 09 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/PengZZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/Qu20,
  author       = {Gang Qu},
  editor       = {Quanyan Zhu and
                  John S. Baras and
                  Radha Poovendran and
                  Juntao Chen},
  title        = {Hardware Security and Trust: {A} New Battlefield of Information},
  booktitle    = {Decision and Game Theory for Security - 11th International Conference,
                  GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12513},
  pages        = {486--501},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64793-3\_27},
  doi          = {10.1007/978-3-030-64793-3\_27},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/Qu20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/RassWK20,
  author       = {Stefan Rass and
                  Angelika Wiegele and
                  Sandra K{\"{o}}nig},
  editor       = {Quanyan Zhu and
                  John S. Baras and
                  Radha Poovendran and
                  Juntao Chen},
  title        = {Security Games over Lexicographic Orders},
  booktitle    = {Decision and Game Theory for Security - 11th International Conference,
                  GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12513},
  pages        = {422--441},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64793-3\_23},
  doi          = {10.1007/978-3-030-64793-3\_23},
  timestamp    = {Sat, 09 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/RassWK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/SenZMN20,
  author       = {Ayon Sen and
                  Xiaojin Zhu and
                  Erin Marshall and
                  Robert D. Nowak},
  editor       = {Quanyan Zhu and
                  John S. Baras and
                  Radha Poovendran and
                  Juntao Chen},
  title        = {Popular Imperceptibility Measures in Visual Adversarial Attacks are
                  Far from Human Perception},
  booktitle    = {Decision and Game Theory for Security - 11th International Conference,
                  GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12513},
  pages        = {188--199},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64793-3\_10},
  doi          = {10.1007/978-3-030-64793-3\_10},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/SenZMN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/SenguptaBSK20,
  author       = {Sailik Sengupta and
                  Kaustav Basu and
                  Arunabha Sen and
                  Subbarao Kambhampati},
  editor       = {Quanyan Zhu and
                  John S. Baras and
                  Radha Poovendran and
                  Juntao Chen},
  title        = {Moving Target Defense for Robust Monitoring of Electric Grid Transformers
                  in Adversarial Environments},
  booktitle    = {Decision and Game Theory for Security - 11th International Conference,
                  GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12513},
  pages        = {241--253},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64793-3\_13},
  doi          = {10.1007/978-3-030-64793-3\_13},
  timestamp    = {Tue, 05 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/SenguptaBSK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/ShiPCVBLKF20,
  author       = {Zheyuan Ryan Shi and
                  Ariel D. Procaccia and
                  Kevin S. Chan and
                  Sridhar Venkatesan and
                  Noam Ben{-}Asher and
                  Nandi O. Leslie and
                  Charles A. Kamhoua and
                  Fei Fang},
  editor       = {Quanyan Zhu and
                  John S. Baras and
                  Radha Poovendran and
                  Juntao Chen},
  title        = {Learning and Planning in the Feature Deception Problem},
  booktitle    = {Decision and Game Theory for Security - 11th International Conference,
                  GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12513},
  pages        = {23--44},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64793-3\_2},
  doi          = {10.1007/978-3-030-64793-3\_2},
  timestamp    = {Wed, 07 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/ShiPCVBLKF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/ShishikaK20,
  author       = {Daigo Shishika and
                  Vijay Kumar},
  editor       = {Quanyan Zhu and
                  John S. Baras and
                  Radha Poovendran and
                  Juntao Chen},
  title        = {A Review of Multi Agent Perimeter Defense Games},
  booktitle    = {Decision and Game Theory for Security - 11th International Conference,
                  GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12513},
  pages        = {472--485},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64793-3\_26},
  doi          = {10.1007/978-3-030-64793-3\_26},
  timestamp    = {Sat, 09 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/ShishikaK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/Sprintson20,
  author       = {Alex Sprintson},
  editor       = {Quanyan Zhu and
                  John S. Baras and
                  Radha Poovendran and
                  Juntao Chen},
  title        = {Securing Next-Generation Wireless Networks: Challenges and Opportunities
                  (Extended Abstract)},
  booktitle    = {Decision and Game Theory for Security - 11th International Conference,
                  GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12513},
  pages        = {506--510},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64793-3\_29},
  doi          = {10.1007/978-3-030-64793-3\_29},
  timestamp    = {Sat, 09 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/Sprintson20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/ThakoorJAGTV20,
  author       = {Omkar Thakoor and
                  Shahin Jabbari and
                  Palvi Aggarwal and
                  Cleotilde Gonzalez and
                  Milind Tambe and
                  Phebe Vayanos},
  editor       = {Quanyan Zhu and
                  John S. Baras and
                  Radha Poovendran and
                  Juntao Chen},
  title        = {Exploiting Bounded Rationality in Risk-Based Cyber Camouflage Games},
  booktitle    = {Decision and Game Theory for Security - 11th International Conference,
                  GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12513},
  pages        = {103--124},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64793-3\_6},
  doi          = {10.1007/978-3-030-64793-3\_6},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/ThakoorJAGTV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/TomasekBN20,
  author       = {Petr Tom{\'{a}}sek and
                  Branislav Bosansk{\'{y}} and
                  Thanh Hong Nguyen},
  editor       = {Quanyan Zhu and
                  John S. Baras and
                  Radha Poovendran and
                  Juntao Chen},
  title        = {Using One-Sided Partially Observable Stochastic Games for Solving
                  Zero-Sum Security Games with Sequential Attacks},
  booktitle    = {Decision and Game Theory for Security - 11th International Conference,
                  GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12513},
  pages        = {385--404},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64793-3\_21},
  doi          = {10.1007/978-3-030-64793-3\_21},
  timestamp    = {Tue, 05 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/TomasekBN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/TsemogneHKD20,
  author       = {Olivier Tsemogne and
                  Yezekael Hayel and
                  Charles A. Kamhoua and
                  Gabriel Deugoue},
  editor       = {Quanyan Zhu and
                  John S. Baras and
                  Radha Poovendran and
                  Juntao Chen},
  title        = {Partially Observable Stochastic Games for Cyber Deception Against
                  Network Epidemic},
  booktitle    = {Decision and Game Theory for Security - 11th International Conference,
                  GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12513},
  pages        = {312--325},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64793-3\_17},
  doi          = {10.1007/978-3-030-64793-3\_17},
  timestamp    = {Tue, 05 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/TsemogneHKD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/ZamanBB20,
  author       = {Muhammad Aneeq uz Zaman and
                  Sujay Bhatt and
                  Tamer Basar},
  editor       = {Quanyan Zhu and
                  John S. Baras and
                  Radha Poovendran and
                  Juntao Chen},
  title        = {Secure Discrete-Time Linear-Quadratic Mean-Field Games},
  booktitle    = {Decision and Game Theory for Security - 11th International Conference,
                  GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12513},
  pages        = {203--222},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64793-3\_11},
  doi          = {10.1007/978-3-030-64793-3\_11},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/ZamanBB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/ZhaoZ20,
  author       = {Yuhan Zhao and
                  Quanyan Zhu},
  editor       = {Quanyan Zhu and
                  John S. Baras and
                  Radha Poovendran and
                  Juntao Chen},
  title        = {Combating Online Counterfeits: {A} Game-Theoretic Analysis of Cyber
                  Supply Chain Ecosystem},
  booktitle    = {Decision and Game Theory for Security - 11th International Conference,
                  GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12513},
  pages        = {326--345},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64793-3\_18},
  doi          = {10.1007/978-3-030-64793-3\_18},
  timestamp    = {Tue, 05 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/ZhaoZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/gamesec/2020,
  editor       = {Quanyan Zhu and
                  John S. Baras and
                  Radha Poovendran and
                  Juntao Chen},
  title        = {Decision and Game Theory for Security - 11th International Conference,
                  GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12513},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64793-3},
  doi          = {10.1007/978-3-030-64793-3},
  isbn         = {978-3-030-64792-6},
  timestamp    = {Tue, 05 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/0001RUS19,
  author       = {Christopher Griffin and
                  Sarah Michele Rajtmajer and
                  Prasanna Umar and
                  Anna Cinzia Squicciarini},
  editor       = {Tansu Alpcan and
                  Yevgeniy Vorobeychik and
                  John S. Baras and
                  Gy{\"{o}}rgy D{\'{a}}n},
  title        = {Power Law Public Goods Game for Personal Information Sharing in News
                  Commentaries},
  booktitle    = {Decision and Game Theory for Security - 10th International Conference,
                  GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11836},
  pages        = {184--195},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32430-8\_12},
  doi          = {10.1007/978-3-030-32430-8\_12},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/0001RUS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/BarretoK19,
  author       = {Carlos A. Barreto and
                  Xenofon D. Koutsoukos},
  editor       = {Tansu Alpcan and
                  Yevgeniy Vorobeychik and
                  John S. Baras and
                  Gy{\"{o}}rgy D{\'{a}}n},
  title        = {Design of Load Forecast Systems Resilient Against Cyber-Attacks},
  booktitle    = {Decision and Game Theory for Security - 10th International Conference,
                  GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11836},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32430-8\_1},
  doi          = {10.1007/978-3-030-32430-8\_1},
  timestamp    = {Wed, 23 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/BarretoK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/BasakKVGAK19,
  author       = {Anjon Basak and
                  Charles A. Kamhoua and
                  Sridhar Venkatesan and
                  Marcus Gutierrez and
                  Ahmed H. Anwar and
                  Christopher Kiekintveld},
  editor       = {Tansu Alpcan and
                  Yevgeniy Vorobeychik and
                  John S. Baras and
                  Gy{\"{o}}rgy D{\'{a}}n},
  title        = {Identifying Stealthy Attackers in a Game Theoretic Framework Using
                  Deception},
  booktitle    = {Decision and Game Theory for Security - 10th International Conference,
                  GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11836},
  pages        = {21--32},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32430-8\_2},
  doi          = {10.1007/978-3-030-32430-8\_2},
  timestamp    = {Sat, 27 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/BasakKVGAK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/BhargavaC19,
  author       = {Radhika Bhargava and
                  Chris Clifton},
  editor       = {Tansu Alpcan and
                  Yevgeniy Vorobeychik and
                  John S. Baras and
                  Gy{\"{o}}rgy D{\'{a}}n},
  title        = {When Is a Semi-honest Secure Multiparty Computation Valuable?},
  booktitle    = {Decision and Game Theory for Security - 10th International Conference,
                  GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11836},
  pages        = {45--64},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32430-8\_4},
  doi          = {10.1007/978-3-030-32430-8\_4},
  timestamp    = {Wed, 23 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/BhargavaC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/BilinskiFFGMS19,
  author       = {Mark Bilinski and
                  Kimberly Ferguson{-}Walter and
                  Sunny Fugate and
                  Ryan Gabrys and
                  Justin Mauger and
                  Brian Souza},
  editor       = {Tansu Alpcan and
                  Yevgeniy Vorobeychik and
                  John S. Baras and
                  Gy{\"{o}}rgy D{\'{a}}n},
  title        = {You only Lie Twice: {A} Multi-round Cyber Deception Game of Questionable
                  Veracity},
  booktitle    = {Decision and Game Theory for Security - 10th International Conference,
                  GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11836},
  pages        = {65--84},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32430-8\_5},
  doi          = {10.1007/978-3-030-32430-8\_5},
  timestamp    = {Thu, 07 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/BilinskiFFGMS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/BoumkheldPRP19,
  author       = {Nadia Boumkheld and
                  Sakshyam Panda and
                  Stefan Rass and
                  Emmanouil Panaousis},
  editor       = {Tansu Alpcan and
                  Yevgeniy Vorobeychik and
                  John S. Baras and
                  Gy{\"{o}}rgy D{\'{a}}n},
  title        = {Honeypot Type Selection Games for Smart Grid Networks},
  booktitle    = {Decision and Game Theory for Security - 10th International Conference,
                  GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11836},
  pages        = {85--96},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32430-8\_6},
  doi          = {10.1007/978-3-030-32430-8\_6},
  timestamp    = {Thu, 07 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/BoumkheldPRP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/BucareyL19,
  author       = {Victor Bucarey and
                  Martine Labb{\'{e}}},
  editor       = {Tansu Alpcan and
                  Yevgeniy Vorobeychik and
                  John S. Baras and
                  Gy{\"{o}}rgy D{\'{a}}n},
  title        = {Discussion of Fairness and Implementability in Stackelberg Security
                  Games},
  booktitle    = {Decision and Game Theory for Security - 10th International Conference,
                  GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11836},
  pages        = {97--117},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32430-8\_7},
  doi          = {10.1007/978-3-030-32430-8\_7},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/BucareyL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/Canann19,
  author       = {Taylor J. Canann},
  editor       = {Tansu Alpcan and
                  Yevgeniy Vorobeychik and
                  John S. Baras and
                  Gy{\"{o}}rgy D{\'{a}}n},
  title        = {Toward a Theory of Vulnerability Disclosure Policy: {A} Hacker's Game},
  booktitle    = {Decision and Game Theory for Security - 10th International Conference,
                  GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11836},
  pages        = {118--134},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32430-8\_8},
  doi          = {10.1007/978-3-030-32430-8\_8},
  timestamp    = {Wed, 23 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/Canann19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/CartwrightCX19,
  author       = {Anna Cartwright and
                  Edward J. Cartwright and
                  Lian Xue},
  editor       = {Tansu Alpcan and
                  Yevgeniy Vorobeychik and
                  John S. Baras and
                  Gy{\"{o}}rgy D{\'{a}}n},
  title        = {Investing in Prevention or Paying for Recovery - Attitudes to Cyber
                  Risk},
  booktitle    = {Decision and Game Theory for Security - 10th International Conference,
                  GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11836},
  pages        = {135--151},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32430-8\_9},
  doi          = {10.1007/978-3-030-32430-8\_9},
  timestamp    = {Thu, 20 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/CartwrightCX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/DesmedtS19,
  author       = {Yvo Desmedt and
                  Arkadii Slinko},
  editor       = {Tansu Alpcan and
                  Yevgeniy Vorobeychik and
                  John S. Baras and
                  Gy{\"{o}}rgy D{\'{a}}n},
  title        = {Realistic versus Rational Secret Sharing},
  booktitle    = {Decision and Game Theory for Security - 10th International Conference,
                  GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11836},
  pages        = {152--163},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32430-8\_10},
  doi          = {10.1007/978-3-030-32430-8\_10},
  timestamp    = {Wed, 23 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/DesmedtS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/DunstatterTGT19,
  author       = {Noah Dunstatter and
                  Alireza Tahsini and
                  Mina Guirguis and
                  Jelena Tesic},
  editor       = {Tansu Alpcan and
                  Yevgeniy Vorobeychik and
                  John S. Baras and
                  Gy{\"{o}}rgy D{\'{a}}n},
  title        = {Solving Cyber Alert Allocation Markov Games with Deep Reinforcement
                  Learning},
  booktitle    = {Decision and Game Theory for Security - 10th International Conference,
                  GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11836},
  pages        = {164--183},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32430-8\_11},
  doi          = {10.1007/978-3-030-32430-8\_11},
  timestamp    = {Thu, 07 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/DunstatterTGT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/Huang19,
  author       = {Wen Huang},
  editor       = {Tansu Alpcan and
                  Yevgeniy Vorobeychik and
                  John S. Baras and
                  Gy{\"{o}}rgy D{\'{a}}n},
  title        = {Exploring players' user experience in a high-embodied virtual reality
                  game},
  booktitle    = {Decision and Game Theory for Security - 10th International Conference,
                  GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11836},
  pages        = {1--8},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1109/GEM.2019.8902148},
  doi          = {10.1109/GEM.2019.8902148},
  timestamp    = {Thu, 05 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/Huang19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/HuangZ19,
  author       = {Linan Huang and
                  Quanyan Zhu},
  editor       = {Tansu Alpcan and
                  Yevgeniy Vorobeychik and
                  John S. Baras and
                  Gy{\"{o}}rgy D{\'{a}}n},
  title        = {Adaptive Honeypot Engagement Through Reinforcement Learning of Semi-Markov
                  Decision Processes},
  booktitle    = {Decision and Game Theory for Security - 10th International Conference,
                  GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11836},
  pages        = {196--216},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32430-8\_13},
  doi          = {10.1007/978-3-030-32430-8\_13},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/HuangZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/HuangZ19a,
  author       = {Yunhan Huang and
                  Quanyan Zhu},
  editor       = {Tansu Alpcan and
                  Yevgeniy Vorobeychik and
                  John S. Baras and
                  Gy{\"{o}}rgy D{\'{a}}n},
  title        = {Deceptive Reinforcement Learning Under Adversarial Manipulations on
                  Cost Signals},
  booktitle    = {Decision and Game Theory for Security - 10th International Conference,
                  GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11836},
  pages        = {217--237},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32430-8\_14},
  doi          = {10.1007/978-3-030-32430-8\_14},
  timestamp    = {Thu, 07 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/HuangZ19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/KamraGWF0T19,
  author       = {Nitin Kamra and
                  Umang Gupta and
                  Kai Wang and
                  Fei Fang and
                  Yan Liu and
                  Milind Tambe},
  editor       = {Tansu Alpcan and
                  Yevgeniy Vorobeychik and
                  John S. Baras and
                  Gy{\"{o}}rgy D{\'{a}}n},
  title        = {DeepFP for Finding Nash Equilibrium in Continuous Action Spaces},
  booktitle    = {Decision and Game Theory for Security - 10th International Conference,
                  GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11836},
  pages        = {238--258},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32430-8\_15},
  doi          = {10.1007/978-3-030-32430-8\_15},
  timestamp    = {Wed, 07 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/KamraGWF0T19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/KhaliliZL19,
  author       = {Mohammad Mahdi Khalili and
                  Xueru Zhang and
                  Mingyan Liu},
  editor       = {Tansu Alpcan and
                  Yevgeniy Vorobeychik and
                  John S. Baras and
                  Gy{\"{o}}rgy D{\'{a}}n},
  title        = {Effective Premium Discrimination for Designing Cyber Insurance Policies
                  with Rare Losses},
  booktitle    = {Decision and Game Theory for Security - 10th International Conference,
                  GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11836},
  pages        = {259--275},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32430-8\_16},
  doi          = {10.1007/978-3-030-32430-8\_16},
  timestamp    = {Wed, 23 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/KhaliliZL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/KumariJMM19,
  author       = {Kavita Kumari and
                  Murtuza Jadliwala and
                  Anindya Maiti and
                  Mohammad Hossein Manshaei},
  editor       = {Tansu Alpcan and
                  Yevgeniy Vorobeychik and
                  John S. Baras and
                  Gy{\"{o}}rgy D{\'{a}}n},
  title        = {Analyzing Defense Strategies Against Mobile Information Leakages:
                  {A} Game-Theoretic Approach},
  booktitle    = {Decision and Game Theory for Security - 10th International Conference,
                  GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11836},
  pages        = {276--296},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32430-8\_17},
  doi          = {10.1007/978-3-030-32430-8\_17},
  timestamp    = {Thu, 07 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/KumariJMM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/LiD19,
  author       = {Zuxing Li and
                  Gy{\"{o}}rgy D{\'{a}}n},
  editor       = {Tansu Alpcan and
                  Yevgeniy Vorobeychik and
                  John S. Baras and
                  Gy{\"{o}}rgy D{\'{a}}n},
  title        = {Dynamic Cheap Talk for Robust Adversarial Learning},
  booktitle    = {Decision and Game Theory for Security - 10th International Conference,
                  GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11836},
  pages        = {297--309},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32430-8\_18},
  doi          = {10.1007/978-3-030-32430-8\_18},
  timestamp    = {Thu, 07 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/LiD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/Merlevede0GH19,
  author       = {Jonathan S. A. Merlevede and
                  Benjamin Johnson and
                  Jens Grossklags and
                  Tom Holvoet},
  editor       = {Tansu Alpcan and
                  Yevgeniy Vorobeychik and
                  John S. Baras and
                  Gy{\"{o}}rgy D{\'{a}}n},
  title        = {Time-Dependent Strategies in Games of Timing},
  booktitle    = {Decision and Game Theory for Security - 10th International Conference,
                  GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11836},
  pages        = {310--330},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32430-8\_19},
  doi          = {10.1007/978-3-030-32430-8\_19},
  timestamp    = {Thu, 07 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/Merlevede0GH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/NguyenYBL19,
  author       = {Thanh Hong Nguyen and
                  Amulya Yadav and
                  Branislav Bosansk{\'{y}} and
                  Yu Liang},
  editor       = {Tansu Alpcan and
                  Yevgeniy Vorobeychik and
                  John S. Baras and
                  Gy{\"{o}}rgy D{\'{a}}n},
  title        = {Tackling Sequential Attacks in Security Games},
  booktitle    = {Decision and Game Theory for Security - 10th International Conference,
                  GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11836},
  pages        = {331--351},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32430-8\_20},
  doi          = {10.1007/978-3-030-32430-8\_20},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/NguyenYBL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/NiuC19,
  author       = {Luyao Niu and
                  Andrew Clark},
  editor       = {Tansu Alpcan and
                  Yevgeniy Vorobeychik and
                  John S. Baras and
                  Gy{\"{o}}rgy D{\'{a}}n},
  title        = {A Framework for Joint Attack Detection and Control Under False Data
                  Injection},
  booktitle    = {Decision and Game Theory for Security - 10th International Conference,
                  GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11836},
  pages        = {352--363},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32430-8\_21},
  doi          = {10.1007/978-3-030-32430-8\_21},
  timestamp    = {Tue, 06 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/NiuC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/OakleyO19,
  author       = {Lisa Oakley and
                  Alina Oprea},
  editor       = {Tansu Alpcan and
                  Yevgeniy Vorobeychik and
                  John S. Baras and
                  Gy{\"{o}}rgy D{\'{a}}n},
  title        = {{\textbackslash}mathsf QFlip : An Adaptive Reinforcement Learning
                  Strategy for the {\textbackslash}mathsf FlipIt Security Game},
  booktitle    = {Decision and Game Theory for Security - 10th International Conference,
                  GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11836},
  pages        = {364--384},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32430-8\_22},
  doi          = {10.1007/978-3-030-32430-8\_22},
  timestamp    = {Wed, 23 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/OakleyO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/Ramasubramanian19,
  author       = {Bhaskar Ramasubramanian and
                  Luyao Niu and
                  Andrew Clark and
                  Linda Bushnell and
                  Radha Poovendran},
  editor       = {Tansu Alpcan and
                  Yevgeniy Vorobeychik and
                  John S. Baras and
                  Gy{\"{o}}rgy D{\'{a}}n},
  title        = {Linear Temporal Logic Satisfaction in Adversarial Environments Using
                  Secure Control Barrier Certificates},
  booktitle    = {Decision and Game Theory for Security - 10th International Conference,
                  GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11836},
  pages        = {385--403},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32430-8\_23},
  doi          = {10.1007/978-3-030-32430-8\_23},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/Ramasubramanian19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/RassKP19,
  author       = {Stefan Rass and
                  Sandra K{\"{o}}nig and
                  Emmanouil Panaousis},
  editor       = {Tansu Alpcan and
                  Yevgeniy Vorobeychik and
                  John S. Baras and
                  Gy{\"{o}}rgy D{\'{a}}n},
  title        = {Cut-The-Rope: {A} Game of Stealthy Intrusion},
  booktitle    = {Decision and Game Theory for Security - 10th International Conference,
                  GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11836},
  pages        = {404--416},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32430-8\_24},
  doi          = {10.1007/978-3-030-32430-8\_24},
  timestamp    = {Thu, 07 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/RassKP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/RuizK19,
  author       = {Kathleen Ruiz and
                  Krystyna Kornecki},
  editor       = {Tansu Alpcan and
                  Yevgeniy Vorobeychik and
                  John S. Baras and
                  Gy{\"{o}}rgy D{\'{a}}n},
  title        = {Eco-resilience: Games, art, science},
  booktitle    = {Decision and Game Theory for Security - 10th International Conference,
                  GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11836},
  pages        = {1--11},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1109/GEM.2019.8901974},
  doi          = {10.1109/GEM.2019.8901974},
  timestamp    = {Thu, 05 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/RuizK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/SahabanduMABLP19,
  author       = {Dinuka Sahabandu and
                  Shana Moothedath and
                  Joey Allen and
                  Linda Bushnell and
                  Wenke Lee and
                  Radha Poovendran},
  editor       = {Tansu Alpcan and
                  Yevgeniy Vorobeychik and
                  John S. Baras and
                  Gy{\"{o}}rgy D{\'{a}}n},
  title        = {Stochastic Dynamic Information Flow Tracking Game with Reinforcement
                  Learning},
  booktitle    = {Decision and Game Theory for Security - 10th International Conference,
                  GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11836},
  pages        = {417--438},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32430-8\_25},
  doi          = {10.1007/978-3-030-32430-8\_25},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/SahabanduMABLP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/SaritasSSD19,
  author       = {Serkan Saritas and
                  Ezzeldin Shereen and
                  Henrik Sandberg and
                  Gy{\"{o}}rgy D{\'{a}}n},
  editor       = {Tansu Alpcan and
                  Yevgeniy Vorobeychik and
                  John S. Baras and
                  Gy{\"{o}}rgy D{\'{a}}n},
  title        = {Adversarial Attacks on Continuous Authentication Security: {A} Dynamic
                  Game Approach},
  booktitle    = {Decision and Game Theory for Security - 10th International Conference,
                  GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11836},
  pages        = {439--458},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32430-8\_26},
  doi          = {10.1007/978-3-030-32430-8\_26},
  timestamp    = {Thu, 07 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/SaritasSSD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/SayinB19,
  author       = {Muhammed O. Sayin and
                  Tamer Basar},
  editor       = {Tansu Alpcan and
                  Yevgeniy Vorobeychik and
                  John S. Baras and
                  Gy{\"{o}}rgy D{\'{a}}n},
  title        = {On the Optimality of Linear Signaling to Deceive Kalman Filters over
                  Finite/Infinite Horizons},
  booktitle    = {Decision and Game Theory for Security - 10th International Conference,
                  GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11836},
  pages        = {459--478},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32430-8\_27},
  doi          = {10.1007/978-3-030-32430-8\_27},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/SayinB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/ScavarelliAT19,
  author       = {Anthony Scavarelli and
                  Ali Arya and
                  Robert J. Teather},
  editor       = {Tansu Alpcan and
                  Yevgeniy Vorobeychik and
                  John S. Baras and
                  Gy{\"{o}}rgy D{\'{a}}n},
  title        = {Circles: exploring multi-platform accessible, socially scalable {VR}
                  in the classroom},
  booktitle    = {Decision and Game Theory for Security - 10th International Conference,
                  GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11836},
  pages        = {1--4},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1109/GEM.2019.8897532},
  doi          = {10.1109/GEM.2019.8897532},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/ScavarelliAT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/SenguptaCHK19,
  author       = {Sailik Sengupta and
                  Ankur Chowdhary and
                  Dijiang Huang and
                  Subbarao Kambhampati},
  editor       = {Tansu Alpcan and
                  Yevgeniy Vorobeychik and
                  John S. Baras and
                  Gy{\"{o}}rgy D{\'{a}}n},
  title        = {General Sum Markov Games for Strategic Detection of Advanced Persistent
                  Threats Using Moving Target Defense in Cloud Networks},
  booktitle    = {Decision and Game Theory for Security - 10th International Conference,
                  GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11836},
  pages        = {492--512},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32430-8\_29},
  doi          = {10.1007/978-3-030-32430-8\_29},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/SenguptaCHK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/SenguptaCK19,
  author       = {Sailik Sengupta and
                  Tathagata Chakraborti and
                  Subbarao Kambhampati},
  editor       = {Tansu Alpcan and
                  Yevgeniy Vorobeychik and
                  John S. Baras and
                  Gy{\"{o}}rgy D{\'{a}}n},
  title        = {MTDeep: Boosting the Security of Deep Neural Nets Against Adversarial
                  Attacks with Moving Target Defense},
  booktitle    = {Decision and Game Theory for Security - 10th International Conference,
                  GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11836},
  pages        = {479--491},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32430-8\_28},
  doi          = {10.1007/978-3-030-32430-8\_28},
  timestamp    = {Wed, 23 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/SenguptaCK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/Slinko19,
  author       = {Arkadii Slinko},
  editor       = {Tansu Alpcan and
                  Yevgeniy Vorobeychik and
                  John S. Baras and
                  Gy{\"{o}}rgy D{\'{a}}n},
  title        = {Operations over Linear Secret Sharing Schemes},
  booktitle    = {Decision and Game Theory for Security - 10th International Conference,
                  GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11836},
  pages        = {513--524},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32430-8\_30},
  doi          = {10.1007/978-3-030-32430-8\_30},
  timestamp    = {Wed, 23 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/Slinko19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/ThakoorTVXKF19,
  author       = {Omkar Thakoor and
                  Milind Tambe and
                  Phebe Vayanos and
                  Haifeng Xu and
                  Christopher Kiekintveld and
                  Fei Fang},
  editor       = {Tansu Alpcan and
                  Yevgeniy Vorobeychik and
                  John S. Baras and
                  Gy{\"{o}}rgy D{\'{a}}n},
  title        = {Cyber Camouflage Games for Strategic Deception},
  booktitle    = {Decision and Game Theory for Security - 10th International Conference,
                  GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11836},
  pages        = {525--541},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32430-8\_31},
  doi          = {10.1007/978-3-030-32430-8\_31},
  timestamp    = {Wed, 07 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/ThakoorTVXKF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/WangTBA19,
  author       = {Xinrun Wang and
                  Milind Tambe and
                  Branislav Bosansk{\'{y}} and
                  Bo An},
  editor       = {Tansu Alpcan and
                  Yevgeniy Vorobeychik and
                  John S. Baras and
                  Gy{\"{o}}rgy D{\'{a}}n},
  title        = {When Players Affect Target Values: Modeling and Solving Dynamic Partially
                  Observable Security Games},
  booktitle    = {Decision and Game Theory for Security - 10th International Conference,
                  GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11836},
  pages        = {542--562},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32430-8\_32},
  doi          = {10.1007/978-3-030-32430-8\_32},
  timestamp    = {Wed, 06 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/WangTBA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/Warren19,
  author       = {Jonah Warren},
  editor       = {Tansu Alpcan and
                  Yevgeniy Vorobeychik and
                  John S. Baras and
                  Gy{\"{o}}rgy D{\'{a}}n},
  title        = {Tiny online game engines},
  booktitle    = {Decision and Game Theory for Security - 10th International Conference,
                  GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11836},
  pages        = {1--7},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1109/GEM.2019.8901975},
  doi          = {10.1109/GEM.2019.8901975},
  timestamp    = {Thu, 05 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/Warren19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/YaakovWMA19,
  author       = {Yoav Ben Yaakov and
                  Xinrun Wang and
                  Joachim Meyer and
                  Bo An},
  editor       = {Tansu Alpcan and
                  Yevgeniy Vorobeychik and
                  John S. Baras and
                  Gy{\"{o}}rgy D{\'{a}}n},
  title        = {Choosing Protection: User Investments in Security Measures for Cyber
                  Risk Management},
  booktitle    = {Decision and Game Theory for Security - 10th International Conference,
                  GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11836},
  pages        = {33--44},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32430-8\_3},
  doi          = {10.1007/978-3-030-32430-8\_3},
  timestamp    = {Fri, 11 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/YaakovWMA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/YasunagaK19,
  author       = {Kenji Yasunaga and
                  Takeshi Koshiba},
  editor       = {Tansu Alpcan and
                  Yevgeniy Vorobeychik and
                  John S. Baras and
                  Gy{\"{o}}rgy D{\'{a}}n},
  title        = {Perfectly Secure Message Transmission Against Independent Rational
                  Adversaries},
  booktitle    = {Decision and Game Theory for Security - 10th International Conference,
                  GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11836},
  pages        = {563--582},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32430-8\_33},
  doi          = {10.1007/978-3-030-32430-8\_33},
  timestamp    = {Thu, 07 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/YasunagaK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/gamesec/2019,
  editor       = {Tansu Alpcan and
                  Yevgeniy Vorobeychik and
                  John S. Baras and
                  Gy{\"{o}}rgy D{\'{a}}n},
  title        = {Decision and Game Theory for Security - 10th International Conference,
                  GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11836},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32430-8},
  doi          = {10.1007/978-3-030-32430-8},
  isbn         = {978-3-030-32429-2},
  timestamp    = {Wed, 23 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/0003RAAVEHLM18,
  author       = {Yi Han and
                  Benjamin I. P. Rubinstein and
                  Tamas Abraham and
                  Tansu Alpcan and
                  Olivier Y. de Vel and
                  Sarah M. Erfani and
                  David Hubczenko and
                  Christopher Leckie and
                  Paul Montague},
  editor       = {Linda Bushnell and
                  Radha Poovendran and
                  Tamer Basar},
  title        = {Reinforcement Learning for Autonomous Defence in Software-Defined
                  Networking},
  booktitle    = {Decision and Game Theory for Security - 9th International Conference,
                  GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11199},
  pages        = {145--165},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01554-1\_9},
  doi          = {10.1007/978-3-030-01554-1\_9},
  timestamp    = {Tue, 07 May 2024 20:08:32 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/0003RAAVEHLM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/0011Z18,
  author       = {Tao Zhang and
                  Quanyan Zhu},
  editor       = {Linda Bushnell and
                  Radha Poovendran and
                  Tamer Basar},
  title        = {Hypothesis Testing Game for Cyber Deception},
  booktitle    = {Decision and Game Theory for Security - 9th International Conference,
                  GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11199},
  pages        = {540--555},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01554-1\_31},
  doi          = {10.1007/978-3-030-01554-1\_31},
  timestamp    = {Wed, 24 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/0011Z18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/AlzahraniB18,
  author       = {Naif Alzahrani and
                  Nirupama Bulusu},
  editor       = {Linda Bushnell and
                  Radha Poovendran and
                  Tamer Basar},
  title        = {Towards True Decentralization: {A} Blockchain Consensus Protocol Based
                  on Game Theory and Randomness},
  booktitle    = {Decision and Game Theory for Security - 9th International Conference,
                  GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11199},
  pages        = {465--485},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01554-1\_27},
  doi          = {10.1007/978-3-030-01554-1\_27},
  timestamp    = {Wed, 24 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/AlzahraniB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/BasakCGCKJBK18,
  author       = {Anjon Basak and
                  Jakub Cern{\'{y}} and
                  Marcus Gutierrez and
                  Shelby R. Curtis and
                  Charles A. Kamhoua and
                  Daniel Jones and
                  Branislav Bosansk{\'{y}} and
                  Christopher Kiekintveld},
  editor       = {Linda Bushnell and
                  Radha Poovendran and
                  Tamer Basar},
  title        = {An Initial Study of Targeted Personality Models in the FlipIt Game},
  booktitle    = {Decision and Game Theory for Security - 9th International Conference,
                  GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11199},
  pages        = {623--636},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01554-1\_36},
  doi          = {10.1007/978-3-030-01554-1\_36},
  timestamp    = {Fri, 05 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/BasakCGCKJBK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/BasakGK18,
  author       = {Anjon Basak and
                  Marcus Gutierrez and
                  Christopher Kiekintveld},
  editor       = {Linda Bushnell and
                  Radha Poovendran and
                  Tamer Basar},
  title        = {Algorithms for Subgame Abstraction with Applications to Cyber Defense},
  booktitle    = {Decision and Game Theory for Security - 9th International Conference,
                  GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11199},
  pages        = {556--568},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01554-1\_32},
  doi          = {10.1007/978-3-030-01554-1\_32},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/BasakGK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/BilinskiGM18,
  author       = {Mark Bilinski and
                  Ryan Gabrys and
                  Justin Mauger},
  editor       = {Linda Bushnell and
                  Radha Poovendran and
                  Tamer Basar},
  title        = {Optimal Placement of Honeypots for Network Defense},
  booktitle    = {Decision and Game Theory for Security - 9th International Conference,
                  GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11199},
  pages        = {115--126},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01554-1\_7},
  doi          = {10.1007/978-3-030-01554-1\_7},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/BilinskiGM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/ChenHBJ18,
  author       = {Jundong Chen and
                  Md. Shafaeat Hossain and
                  Matthias R. Brust and
                  Naomi Johnson},
  editor       = {Linda Bushnell and
                  Radha Poovendran and
                  Tamer Basar},
  title        = {A Game Theoretic Analysis of the Twitter Follow-Unfollow Mechanism},
  booktitle    = {Decision and Game Theory for Security - 9th International Conference,
                  GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11199},
  pages        = {265--276},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01554-1\_15},
  doi          = {10.1007/978-3-030-01554-1\_15},
  timestamp    = {Thu, 14 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/ChenHBJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/ClouseB18,
  author       = {Daniel Clouse and
                  David Burke},
  editor       = {Linda Bushnell and
                  Radha Poovendran and
                  Tamer Basar},
  title        = {Approximating Power Indices to Assess Cybersecurity Criticality},
  booktitle    = {Decision and Game Theory for Security - 9th International Conference,
                  GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11199},
  pages        = {346--365},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01554-1\_20},
  doi          = {10.1007/978-3-030-01554-1\_20},
  timestamp    = {Wed, 24 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/ClouseB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/DemazyKA18,
  author       = {Antonin Demazy and
                  Alexander C. Kalloniatis and
                  Tansu Alpcan},
  editor       = {Linda Bushnell and
                  Radha Poovendran and
                  Tamer Basar},
  title        = {A Game-Theoretic Analysis of the Adversarial Boyd-Kuramoto Model},
  booktitle    = {Decision and Game Theory for Security - 9th International Conference,
                  GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11199},
  pages        = {248--264},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01554-1\_14},
  doi          = {10.1007/978-3-030-01554-1\_14},
  timestamp    = {Wed, 02 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/DemazyKA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/FeldmanFG18,
  author       = {Moran Feldman and
                  Gonen Frim and
                  Rica Gonen},
  editor       = {Linda Bushnell and
                  Radha Poovendran and
                  Tamer Basar},
  title        = {Multi-sided Advertising Markets: Dynamic Mechanisms and Incremental
                  User Compensations},
  booktitle    = {Decision and Game Theory for Security - 9th International Conference,
                  GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11199},
  pages        = {227--247},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01554-1\_13},
  doi          = {10.1007/978-3-030-01554-1\_13},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/FeldmanFG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/FujitaYK18,
  author       = {Maiki Fujita and
                  Kenji Yasunaga and
                  Takeshi Koshiba},
  editor       = {Linda Bushnell and
                  Radha Poovendran and
                  Tamer Basar},
  title        = {Perfectly Secure Message Transmission Against Rational Timid Adversaries},
  booktitle    = {Decision and Game Theory for Security - 9th International Conference,
                  GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11199},
  pages        = {127--144},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01554-1\_8},
  doi          = {10.1007/978-3-030-01554-1\_8},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/FujitaYK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/HeymanG18,
  author       = {Joseph L. Heyman and
                  Abhishek Gupta},
  editor       = {Linda Bushnell and
                  Radha Poovendran and
                  Tamer Basar},
  title        = {Colonel Blotto Game with Coalition Formation for Sharing Resources},
  booktitle    = {Decision and Game Theory for Security - 9th International Conference,
                  GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11199},
  pages        = {166--185},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01554-1\_10},
  doi          = {10.1007/978-3-030-01554-1\_10},
  timestamp    = {Sat, 03 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/HeymanG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/HuangS18,
  author       = {Chong Huang and
                  Lalitha Sankar},
  editor       = {Linda Bushnell and
                  Radha Poovendran and
                  Tamer Basar},
  title        = {Impact of Privacy on Free Online Service Markets},
  booktitle    = {Decision and Game Theory for Security - 9th International Conference,
                  GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11199},
  pages        = {1--21},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01554-1\_1},
  doi          = {10.1007/978-3-030-01554-1\_1},
  timestamp    = {Wed, 24 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/HuangS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/HuangZ18,
  author       = {Linan Huang and
                  Quanyan Zhu},
  editor       = {Linda Bushnell and
                  Radha Poovendran and
                  Tamer Basar},
  title        = {Analysis and Computation of Adaptive Defense Strategies Against Advanced
                  Persistent Threats for Cyber-Physical Systems},
  booktitle    = {Decision and Game Theory for Security - 9th International Conference,
                  GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11199},
  pages        = {205--226},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01554-1\_12},
  doi          = {10.1007/978-3-030-01554-1\_12},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/HuangZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/KiumarsiB18,
  author       = {Bahare Kiumarsi and
                  Tamer Basar},
  editor       = {Linda Bushnell and
                  Radha Poovendran and
                  Tamer Basar},
  title        = {Distributed Aggregative Games on Graphs in Adversarial Environments},
  booktitle    = {Decision and Game Theory for Security - 9th International Conference,
                  GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11199},
  pages        = {296--313},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01554-1\_17},
  doi          = {10.1007/978-3-030-01554-1\_17},
  timestamp    = {Wed, 24 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/KiumarsiB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/KrawecM18,
  author       = {Walter O. Krawec and
                  Fei Miao},
  editor       = {Linda Bushnell and
                  Radha Poovendran and
                  Tamer Basar},
  title        = {Game Theoretic Security Framework for Quantum Key Distribution},
  booktitle    = {Decision and Game Theory for Security - 9th International Conference,
                  GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11199},
  pages        = {38--58},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01554-1\_3},
  doi          = {10.1007/978-3-030-01554-1\_3},
  timestamp    = {Wed, 24 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/KrawecM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/LaszkaPG18,
  author       = {Aron Laszka and
                  Emmanouil Panaousis and
                  Jens Grossklags},
  editor       = {Linda Bushnell and
                  Radha Poovendran and
                  Tamer Basar},
  title        = {Cyber-Insurance as a Signaling Game: Self-reporting and External Security
                  Audits},
  booktitle    = {Decision and Game Theory for Security - 9th International Conference,
                  GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11199},
  pages        = {508--520},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01554-1\_29},
  doi          = {10.1007/978-3-030-01554-1\_29},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/LaszkaPG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/LiuCC18,
  author       = {Yongshuai Liu and
                  Jiyu Chen and
                  Hao Chen},
  editor       = {Linda Bushnell and
                  Radha Poovendran and
                  Tamer Basar},
  title        = {Less is More: Culling the Training Set to Improve Robustness of Deep
                  Neural Networks},
  booktitle    = {Decision and Game Theory for Security - 9th International Conference,
                  GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11199},
  pages        = {102--114},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01554-1\_6},
  doi          = {10.1007/978-3-030-01554-1\_6},
  timestamp    = {Wed, 20 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/LiuCC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/MaJ0018,
  author       = {Yuzhe Ma and
                  Kwang{-}Sung Jun and
                  Lihong Li and
                  Xiaojin Zhu},
  editor       = {Linda Bushnell and
                  Radha Poovendran and
                  Tamer Basar},
  title        = {Data Poisoning Attacks in Contextual Bandits},
  booktitle    = {Decision and Game Theory for Security - 9th International Conference,
                  GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11199},
  pages        = {186--204},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01554-1\_11},
  doi          = {10.1007/978-3-030-01554-1\_11},
  timestamp    = {Wed, 24 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/MaJ0018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/MiehlingXPB18,
  author       = {Erik Miehling and
                  Baicen Xiao and
                  Radha Poovendran and
                  Tamer Basar},
  editor       = {Linda Bushnell and
                  Radha Poovendran and
                  Tamer Basar},
  title        = {A Bayesian Multi-armed Bandit Approach for Identifying Human Vulnerabilities},
  booktitle    = {Decision and Game Theory for Security - 9th International Conference,
                  GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11199},
  pages        = {521--539},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01554-1\_30},
  doi          = {10.1007/978-3-030-01554-1\_30},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/MiehlingXPB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/MoothedathSC0LP18,
  author       = {Shana Moothedath and
                  Dinuka Sahabandu and
                  Andrew Clark and
                  Sangho Lee and
                  Wenke Lee and
                  Radha Poovendran},
  editor       = {Linda Bushnell and
                  Radha Poovendran and
                  Tamer Basar},
  title        = {Multi-stage Dynamic Information Flow Tracking Game},
  booktitle    = {Decision and Game Theory for Security - 9th International Conference,
                  GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11199},
  pages        = {80--101},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01554-1\_5},
  doi          = {10.1007/978-3-030-01554-1\_5},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/MoothedathSC0LP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/NguyenWS18,
  author       = {Linh Nguyen and
                  Sky Wang and
                  Arunesh Sinha},
  editor       = {Linda Bushnell and
                  Radha Poovendran and
                  Tamer Basar},
  title        = {A Learning and Masking Approach to Secure Learning},
  booktitle    = {Decision and Game Theory for Security - 9th International Conference,
                  GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11199},
  pages        = {453--464},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01554-1\_26},
  doi          = {10.1007/978-3-030-01554-1\_26},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/NguyenWS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/NiuC18,
  author       = {Luyao Niu and
                  Andrew Clark},
  editor       = {Linda Bushnell and
                  Radha Poovendran and
                  Tamer Basar},
  title        = {A Differentially Private and Truthful Incentive Mechanism for Traffic
                  Offload to Public Transportation},
  booktitle    = {Decision and Game Theory for Security - 9th International Conference,
                  GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11199},
  pages        = {366--385},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01554-1\_21},
  doi          = {10.1007/978-3-030-01554-1\_21},
  timestamp    = {Tue, 06 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/NiuC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/Nojoumian18,
  author       = {Mehrdad Nojoumian},
  editor       = {Linda Bushnell and
                  Radha Poovendran and
                  Tamer Basar},
  title        = {Rational Trust Modeling},
  booktitle    = {Decision and Game Theory for Security - 9th International Conference,
                  GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11199},
  pages        = {418--431},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01554-1\_24},
  doi          = {10.1007/978-3-030-01554-1\_24},
  timestamp    = {Wed, 24 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/Nojoumian18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/OuTDV18,
  author       = {Han{-}Ching Ou and
                  Milind Tambe and
                  Bistra Dilkina and
                  Phebe Vayanos},
  editor       = {Linda Bushnell and
                  Radha Poovendran and
                  Tamer Basar},
  title        = {Imbalanced Collusive Security Games},
  booktitle    = {Decision and Game Theory for Security - 9th International Conference,
                  GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11199},
  pages        = {583--602},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01554-1\_34},
  doi          = {10.1007/978-3-030-01554-1\_34},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/OuTDV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/PlewtongD18,
  author       = {Nick Plewtong and
                  Bruce DeBruhl},
  editor       = {Linda Bushnell and
                  Radha Poovendran and
                  Tamer Basar},
  title        = {Game Theoretic Analysis of a Byzantine Attacker in Vehicular Mix-Zones},
  booktitle    = {Decision and Game Theory for Security - 9th International Conference,
                  GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11199},
  pages        = {277--295},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01554-1\_16},
  doi          = {10.1007/978-3-030-01554-1\_16},
  timestamp    = {Wed, 24 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/PlewtongD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/RahmattalabiVT18,
  author       = {Aida Rahmattalabi and
                  Phebe Vayanos and
                  Milind Tambe},
  editor       = {Linda Bushnell and
                  Radha Poovendran and
                  Tamer Basar},
  title        = {A Robust Optimization Approach to Designing Near-Optimal Strategies
                  for Constant-Sum Monitoring Games},
  booktitle    = {Decision and Game Theory for Security - 9th International Conference,
                  GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11199},
  pages        = {603--622},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01554-1\_35},
  doi          = {10.1007/978-3-030-01554-1\_35},
  timestamp    = {Wed, 24 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/RahmattalabiVT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/SayinHPB18,
  author       = {Muhammed O. Sayin and
                  Hossein Hosseini and
                  Radha Poovendran and
                  Tamer Basar},
  editor       = {Linda Bushnell and
                  Radha Poovendran and
                  Tamer Basar},
  title        = {A Game Theoretical Framework for Inter-process Adversarial Intervention
                  Detection},
  booktitle    = {Decision and Game Theory for Security - 9th International Conference,
                  GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11199},
  pages        = {486--507},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01554-1\_28},
  doi          = {10.1007/978-3-030-01554-1\_28},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/SayinHPB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/SenAZVM018,
  author       = {Ayon Sen and
                  Scott Alfeld and
                  Xuezhou Zhang and
                  Ara Vartanian and
                  Yuzhe Ma and
                  Xiaojin Zhu},
  editor       = {Linda Bushnell and
                  Radha Poovendran and
                  Tamer Basar},
  title        = {Training Set Camouflage},
  booktitle    = {Decision and Game Theory for Security - 9th International Conference,
                  GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11199},
  pages        = {59--79},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01554-1\_4},
  doi          = {10.1007/978-3-030-01554-1\_4},
  timestamp    = {Wed, 24 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/SenAZVM018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/SenguptaCHK18,
  author       = {Sailik Sengupta and
                  Ankur Chowdhary and
                  Dijiang Huang and
                  Subbarao Kambhampati},
  editor       = {Linda Bushnell and
                  Radha Poovendran and
                  Tamer Basar},
  title        = {Moving Target Defense for the Placement of Intrusion Detection Systems
                  in the Cloud},
  booktitle    = {Decision and Game Theory for Security - 9th International Conference,
                  GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11199},
  pages        = {326--345},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01554-1\_19},
  doi          = {10.1007/978-3-030-01554-1\_19},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/SenguptaCHK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/SinhaSDT18,
  author       = {Arunesh Sinha and
                  Aaron Schlenker and
                  Donnabell Dmello and
                  Milind Tambe},
  editor       = {Linda Bushnell and
                  Radha Poovendran and
                  Tamer Basar},
  title        = {Scaling-Up Stackelberg Security Games Applications Using Approximations},
  booktitle    = {Decision and Game Theory for Security - 9th International Conference,
                  GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11199},
  pages        = {432--452},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01554-1\_25},
  doi          = {10.1007/978-3-030-01554-1\_25},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/SinhaSDT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/SpringP18,
  author       = {Jonathan M. Spring and
                  David J. Pym},
  editor       = {Linda Bushnell and
                  Radha Poovendran and
                  Tamer Basar},
  title        = {Towards Scientific Incident Response},
  booktitle    = {Decision and Game Theory for Security - 9th International Conference,
                  GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11199},
  pages        = {398--417},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01554-1\_23},
  doi          = {10.1007/978-3-030-01554-1\_23},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/SpringP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/WachterRKS18,
  author       = {Jasmin Wachter and
                  Stefan Rass and
                  Sandra K{\"{o}}nig and
                  Stefan Schauer},
  editor       = {Linda Bushnell and
                  Radha Poovendran and
                  Tamer Basar},
  title        = {Disappointment-Aversion in Security Games},
  booktitle    = {Decision and Game Theory for Security - 9th International Conference,
                  GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11199},
  pages        = {314--325},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01554-1\_18},
  doi          = {10.1007/978-3-030-01554-1\_18},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/WachterRKS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/WangZ18,
  author       = {Wei Wang and
                  Bo Zeng},
  editor       = {Linda Bushnell and
                  Radha Poovendran and
                  Tamer Basar},
  title        = {A Two-Stage Deception Game for Network Defense},
  booktitle    = {Decision and Game Theory for Security - 9th International Conference,
                  GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11199},
  pages        = {569--582},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01554-1\_33},
  doi          = {10.1007/978-3-030-01554-1\_33},
  timestamp    = {Thu, 20 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/WangZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/WeerasingheAELP18,
  author       = {Sandamal Weerasinghe and
                  Tansu Alpcan and
                  Sarah M. Erfani and
                  Christopher Leckie and
                  Peyam Pourbeik and
                  Jack Riddle},
  editor       = {Linda Bushnell and
                  Radha Poovendran and
                  Tamer Basar},
  title        = {Deep Learning Based Game-Theoretical Approach to Evade Jamming Attacks},
  booktitle    = {Decision and Game Theory for Security - 9th International Conference,
                  GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11199},
  pages        = {386--397},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01554-1\_22},
  doi          = {10.1007/978-3-030-01554-1\_22},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/WeerasingheAELP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/WoodsS18,
  author       = {Daniel W. Woods and
                  Andrew C. Simpson},
  editor       = {Linda Bushnell and
                  Radha Poovendran and
                  Tamer Basar},
  title        = {Cyber-Warranties as a Quality Signal for Information Security Products},
  booktitle    = {Decision and Game Theory for Security - 9th International Conference,
                  GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11199},
  pages        = {22--37},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01554-1\_2},
  doi          = {10.1007/978-3-030-01554-1\_2},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/WoodsS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/gamesec/2018,
  editor       = {Linda Bushnell and
                  Radha Poovendran and
                  Tamer Basar},
  title        = {Decision and Game Theory for Security - 9th International Conference,
                  GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11199},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01554-1},
  doi          = {10.1007/978-3-030-01554-1},
  isbn         = {978-3-030-01553-4},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/AiBCMS17,
  author       = {Yun Ai and
                  Manav R. Bhatnagar and
                  Michael Cheffena and
                  Aashish Mathur and
                  Artem A. Sedakov},
  editor       = {Stefan Rass and
                  Bo An and
                  Christopher Kiekintveld and
                  Fei Fang and
                  Stefan Schauer},
  title        = {Game-Theoretical Analysis of {PLC} System Performance in the Presence
                  of Jamming Attacks},
  booktitle    = {Decision and Game Theory for Security - 8th International Conference,
                  GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10575},
  pages        = {74--90},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68711-7\_5},
  doi          = {10.1007/978-3-319-68711-7\_5},
  timestamp    = {Wed, 07 Feb 2024 17:23:12 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/AiBCMS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/Alvim00P17,
  author       = {M{\'{a}}rio S. Alvim and
                  Konstantinos Chatzikokolakis and
                  Yusuke Kawamoto and
                  Catuscia Palamidessi},
  editor       = {Stefan Rass and
                  Bo An and
                  Christopher Kiekintveld and
                  Fei Fang and
                  Stefan Schauer},
  title        = {Information Leakage Games},
  booktitle    = {Decision and Game Theory for Security - 8th International Conference,
                  GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10575},
  pages        = {437--457},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68711-7\_23},
  doi          = {10.1007/978-3-319-68711-7\_23},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/Alvim00P17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/AngCJY17,
  author       = {Samuel Ang and
                  Hau Chan and
                  Albert Xin Jiang and
                  William Yeoh},
  editor       = {Stefan Rass and
                  Bo An and
                  Christopher Kiekintveld and
                  Fei Fang and
                  Stefan Schauer},
  title        = {Game-Theoretic Goal Recognition Models with Applications to Security
                  Domains},
  booktitle    = {Decision and Game Theory for Security - 8th International Conference,
                  GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10575},
  pages        = {256--272},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68711-7\_14},
  doi          = {10.1007/978-3-319-68711-7\_14},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/AngCJY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/BahamondesCMO17,
  author       = {Basti{\'{a}}n Bahamondes and
                  Jos{\'{e}} Correa and
                  Jannik Matuschke and
                  Gianpaolo Oriolo},
  editor       = {Stefan Rass and
                  Bo An and
                  Christopher Kiekintveld and
                  Fei Fang and
                  Stefan Schauer},
  title        = {Adaptivity in Network Interdiction},
  booktitle    = {Decision and Game Theory for Security - 8th International Conference,
                  GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10575},
  pages        = {40--52},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68711-7\_3},
  doi          = {10.1007/978-3-319-68711-7\_3},
  timestamp    = {Wed, 03 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/BahamondesCMO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/BondiFKNDTIH17,
  author       = {Elizabeth Bondi and
                  Fei Fang and
                  Debarun Kar and
                  Venil Loyd Noronha and
                  Donnabell Dmello and
                  Milind Tambe and
                  Arvind Iyer and
                  Robert Hannaford},
  editor       = {Stefan Rass and
                  Bo An and
                  Christopher Kiekintveld and
                  Fei Fang and
                  Stefan Schauer},
  title        = {{VIOLA:} Video Labeling Application for Security Domains},
  booktitle    = {Decision and Game Theory for Security - 8th International Conference,
                  GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10575},
  pages        = {377--396},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68711-7\_20},
  doi          = {10.1007/978-3-319-68711-7\_20},
  timestamp    = {Wed, 07 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/BondiFKNDTIH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/BucareyCFRNO17,
  author       = {Victor Bucarey and
                  Carlos Casorr{\'{a}}n and
                  {\'{O}}scar Figueroa and
                  Karla Rosas and
                  Hugo F. Navarrete and
                  Fernando Ord{\'{o}}{\~{n}}ez},
  editor       = {Stefan Rass and
                  Bo An and
                  Christopher Kiekintveld and
                  Fei Fang and
                  Stefan Schauer},
  title        = {Building Real Stackelberg Security Games for Border Patrols},
  booktitle    = {Decision and Game Theory for Security - 8th International Conference,
                  GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10575},
  pages        = {193--212},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68711-7\_11},
  doi          = {10.1007/978-3-319-68711-7\_11},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/BucareyCFRNO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/CampanelliG17,
  author       = {Matteo Campanelli and
                  Rosario Gennaro},
  editor       = {Stefan Rass and
                  Bo An and
                  Christopher Kiekintveld and
                  Fei Fang and
                  Stefan Schauer},
  title        = {Efficient Rational Proofs for Space Bounded Computations},
  booktitle    = {Decision and Game Theory for Security - 8th International Conference,
                  GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10575},
  pages        = {53--73},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68711-7\_4},
  doi          = {10.1007/978-3-319-68711-7\_4},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/CampanelliG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/CaulfieldIP17,
  author       = {Tristan Caulfield and
                  Christos Ioannidis and
                  David J. Pym},
  editor       = {Stefan Rass and
                  Bo An and
                  Christopher Kiekintveld and
                  Fei Fang and
                  Stefan Schauer},
  title        = {The {U.S.} Vulnerabilities Equities Process: An Economic Perspective},
  booktitle    = {Decision and Game Theory for Security - 8th International Conference,
                  GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10575},
  pages        = {131--150},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68711-7\_8},
  doi          = {10.1007/978-3-319-68711-7\_8},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/CaulfieldIP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/CuiRJ17,
  author       = {Jinshu Cui and
                  Heather Rosoff and
                  Richard S. John},
  editor       = {Stefan Rass and
                  Bo An and
                  Christopher Kiekintveld and
                  Fei Fang and
                  Stefan Schauer},
  title        = {Deterrence of Cyber Attackers in a Three-Player Behavioral Game},
  booktitle    = {Decision and Game Theory for Security - 8th International Conference,
                  GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10575},
  pages        = {418--436},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68711-7\_22},
  doi          = {10.1007/978-3-319-68711-7\_22},
  timestamp    = {Wed, 18 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/CuiRJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/DurkotaLKHBP17,
  author       = {Karel Durkota and
                  Viliam Lis{\'{y}} and
                  Christopher Kiekintveld and
                  Karel Hor{\'{a}}k and
                  Branislav Bosansk{\'{y}} and
                  Tom{\'{a}}s Pevn{\'{y}}},
  editor       = {Stefan Rass and
                  Bo An and
                  Christopher Kiekintveld and
                  Fei Fang and
                  Stefan Schauer},
  title        = {Optimal Strategies for Detecting Data Exfiltration by Internal and
                  External Attackers},
  booktitle    = {Decision and Game Theory for Security - 8th International Conference,
                  GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10575},
  pages        = {171--192},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68711-7\_10},
  doi          = {10.1007/978-3-319-68711-7\_10},
  timestamp    = {Tue, 19 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/DurkotaLKHBP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/FengZMC17,
  author       = {Xiaotao Feng and
                  Zizhan Zheng and
                  Prasant Mohapatra and
                  Derya Cansever},
  editor       = {Stefan Rass and
                  Bo An and
                  Christopher Kiekintveld and
                  Fei Fang and
                  Stefan Schauer},
  title        = {A Stackelberg Game and Markov Modeling of Moving Target Defense},
  booktitle    = {Decision and Game Theory for Security - 8th International Conference,
                  GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10575},
  pages        = {315--335},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68711-7\_17},
  doi          = {10.1007/978-3-319-68711-7\_17},
  timestamp    = {Wed, 18 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/FengZMC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/HayelZ17,
  author       = {Yezekael Hayel and
                  Quanyan Zhu},
  editor       = {Stefan Rass and
                  Bo An and
                  Christopher Kiekintveld and
                  Fei Fang and
                  Stefan Schauer},
  title        = {Dynamics of Strategic Protection Against Virus Propagation in Heterogeneous
                  Complex Networks},
  booktitle    = {Decision and Game Theory for Security - 8th International Conference,
                  GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10575},
  pages        = {506--518},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68711-7\_27},
  doi          = {10.1007/978-3-319-68711-7\_27},
  timestamp    = {Wed, 18 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/HayelZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/HeM17,
  author       = {Xiaobing He and
                  Hermann de Meer},
  editor       = {Stefan Rass and
                  Bo An and
                  Christopher Kiekintveld and
                  Fei Fang and
                  Stefan Schauer},
  title        = {A Stochastic Game-Theoretic Model for Smart Grid Communication Networks},
  booktitle    = {Decision and Game Theory for Security - 8th International Conference,
                  GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10575},
  pages        = {295--314},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68711-7\_16},
  doi          = {10.1007/978-3-319-68711-7\_16},
  timestamp    = {Wed, 18 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/HeM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/HorakZB17,
  author       = {Karel Hor{\'{a}}k and
                  Quanyan Zhu and
                  Branislav Bosansk{\'{y}}},
  editor       = {Stefan Rass and
                  Bo An and
                  Christopher Kiekintveld and
                  Fei Fang and
                  Stefan Schauer},
  title        = {Manipulating Adversary's Belief: {A} Dynamic Game Approach to Deception
                  by Design for Proactive Network Security},
  booktitle    = {Decision and Game Theory for Security - 8th International Conference,
                  GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10575},
  pages        = {273--294},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68711-7\_15},
  doi          = {10.1007/978-3-319-68711-7\_15},
  timestamp    = {Tue, 19 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/HorakZB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/HuangCZ17,
  author       = {Linan Huang and
                  Juntao Chen and
                  Quanyan Zhu},
  editor       = {Stefan Rass and
                  Bo An and
                  Christopher Kiekintveld and
                  Fei Fang and
                  Stefan Schauer},
  title        = {A Large-Scale Markov Game Approach to Dynamic Protection of Interdependent
                  Infrastructure Networks},
  booktitle    = {Decision and Game Theory for Security - 8th International Conference,
                  GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10575},
  pages        = {357--376},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68711-7\_19},
  doi          = {10.1007/978-3-319-68711-7\_19},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/HuangCZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/IsmailKL017,
  author       = {Ziad Ismail and
                  Christophe Kiennert and
                  Jean Leneutre and
                  Lin Chen},
  editor       = {Stefan Rass and
                  Bo An and
                  Christopher Kiekintveld and
                  Fei Fang and
                  Stefan Schauer},
  title        = {A Game Theoretical Model for Optimal Distribution of Network Security
                  Resources},
  booktitle    = {Decision and Game Theory for Security - 8th International Conference,
                  GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10575},
  pages        = {234--255},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68711-7\_13},
  doi          = {10.1007/978-3-319-68711-7\_13},
  timestamp    = {Wed, 18 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/IsmailKL017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/LaanBBM17,
  author       = {Corine M. Laan and
                  Ana Isabel Barros and
                  Richard J. Boucherie and
                  Herman Monsuur},
  editor       = {Stefan Rass and
                  Bo An and
                  Christopher Kiekintveld and
                  Fei Fang and
                  Stefan Schauer},
  title        = {Security Games with Probabilistic Constraints on the Agent's Strategy},
  booktitle    = {Decision and Game Theory for Security - 8th International Conference,
                  GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10575},
  pages        = {481--493},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68711-7\_25},
  doi          = {10.1007/978-3-319-68711-7\_25},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/LaanBBM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/LaszkaFG17,
  author       = {Aron Laszka and
                  Sadegh Farhang and
                  Jens Grossklags},
  editor       = {Stefan Rass and
                  Bo An and
                  Christopher Kiekintveld and
                  Fei Fang and
                  Stefan Schauer},
  title        = {On the Economics of Ransomware},
  booktitle    = {Decision and Game Theory for Security - 8th International Conference,
                  GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10575},
  pages        = {397--417},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68711-7\_21},
  doi          = {10.1007/978-3-319-68711-7\_21},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/LaszkaFG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/NguyenWS17,
  author       = {Thanh Hong Nguyen and
                  Michael P. Wellman and
                  Satinder Singh},
  editor       = {Stefan Rass and
                  Bo An and
                  Christopher Kiekintveld and
                  Fei Fang and
                  Stefan Schauer},
  title        = {A Stackelberg Game Model for Botnet Data Exfiltration},
  booktitle    = {Decision and Game Theory for Security - 8th International Conference,
                  GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10575},
  pages        = {151--170},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68711-7\_9},
  doi          = {10.1007/978-3-319-68711-7\_9},
  timestamp    = {Thu, 07 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/NguyenWS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/PawlickZ17,
  author       = {Jeffrey Pawlick and
                  Quanyan Zhu},
  editor       = {Stefan Rass and
                  Bo An and
                  Christopher Kiekintveld and
                  Fei Fang and
                  Stefan Schauer},
  title        = {Proactive Defense Against Physical Denial of Service Attacks Using
                  Poisson Signaling Games},
  booktitle    = {Decision and Game Theory for Security - 8th International Conference,
                  GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10575},
  pages        = {336--356},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68711-7\_18},
  doi          = {10.1007/978-3-319-68711-7\_18},
  timestamp    = {Wed, 18 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/PawlickZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/RajtmajerSSSB17,
  author       = {Sarah Michele Rajtmajer and
                  Anna Cinzia Squicciarini and
                  Jose M. Such and
                  Justin Semonsen and
                  Andrew Belmonte},
  editor       = {Stefan Rass and
                  Bo An and
                  Christopher Kiekintveld and
                  Fei Fang and
                  Stefan Schauer},
  title        = {An Ultimatum Game Model for the Evolution of Privacy in Jointly Managed
                  Content},
  booktitle    = {Decision and Game Theory for Security - 8th International Conference,
                  GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10575},
  pages        = {112--130},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68711-7\_7},
  doi          = {10.1007/978-3-319-68711-7\_7},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/RajtmajerSSSB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/RassKS17,
  author       = {Stefan Rass and
                  Sandra K{\"{o}}nig and
                  Stefan Schauer},
  editor       = {Stefan Rass and
                  Bo An and
                  Christopher Kiekintveld and
                  Fei Fang and
                  Stefan Schauer},
  title        = {On the Cost of Game Playing: How to Control the Expenses in Mixed
                  Strategies},
  booktitle    = {Decision and Game Theory for Security - 8th International Conference,
                  GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10575},
  pages        = {494--505},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68711-7\_26},
  doi          = {10.1007/978-3-319-68711-7\_26},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/RassKS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/RosenfeldMK17,
  author       = {Ariel Rosenfeld and
                  Oleg Maksimov and
                  Sarit Kraus},
  editor       = {Stefan Rass and
                  Bo An and
                  Christopher Kiekintveld and
                  Fei Fang and
                  Stefan Schauer},
  title        = {Optimizing Traffic Enforcement: From the Lab to the Roads},
  booktitle    = {Decision and Game Theory for Security - 8th International Conference,
                  GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10575},
  pages        = {3--20},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68711-7\_1},
  doi          = {10.1007/978-3-319-68711-7\_1},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/RosenfeldMK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/SayinB17,
  author       = {Muhammed O. Sayin and
                  Tamer Basar},
  editor       = {Stefan Rass and
                  Bo An and
                  Christopher Kiekintveld and
                  Fei Fang and
                  Stefan Schauer},
  title        = {Secure Sensor Design for Cyber-Physical Systems Against Advanced Persistent
                  Threats},
  booktitle    = {Decision and Game Theory for Security - 8th International Conference,
                  GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10575},
  pages        = {91--111},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68711-7\_6},
  doi          = {10.1007/978-3-319-68711-7\_6},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/SayinB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/ToshVSSKNK17,
  author       = {Deepak K. Tosh and
                  Iman Vakilinia and
                  Sachin Shetty and
                  Shamik Sengupta and
                  Charles A. Kamhoua and
                  Laurent Njilla and
                  Kevin A. Kwiat},
  editor       = {Stefan Rass and
                  Bo An and
                  Christopher Kiekintveld and
                  Fei Fang and
                  Stefan Schauer},
  title        = {Three Layer Game Theoretic Decision Framework for Cyber-Investment
                  and Cyber-Insurance},
  booktitle    = {Decision and Game Theory for Security - 8th International Conference,
                  GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10575},
  pages        = {519--532},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68711-7\_28},
  doi          = {10.1007/978-3-319-68711-7\_28},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/ToshVSSKNK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/XuFFDPTDWRNM17,
  author       = {Haifeng Xu and
                  Benjamin J. Ford and
                  Fei Fang and
                  Bistra Dilkina and
                  Andrew J. Plumptre and
                  Milind Tambe and
                  Margaret Driciru and
                  Fred Wanyama and
                  Aggrey Rwetsiba and
                  Mustapha Nsubaga and
                  Joshua Mabonga},
  editor       = {Stefan Rass and
                  Bo An and
                  Christopher Kiekintveld and
                  Fei Fang and
                  Stefan Schauer},
  title        = {Optimal Patrol Planning for Green Security Games with Black-Box Attackers},
  booktitle    = {Decision and Game Theory for Security - 8th International Conference,
                  GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10575},
  pages        = {458--477},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68711-7\_24},
  doi          = {10.1007/978-3-319-68711-7\_24},
  timestamp    = {Wed, 07 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/XuFFDPTDWRNM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/ZhangZ17,
  author       = {Tao Zhang and
                  Quanyan Zhu},
  editor       = {Stefan Rass and
                  Bo An and
                  Christopher Kiekintveld and
                  Fei Fang and
                  Stefan Schauer},
  title        = {Strategic Defense Against Deceptive Civilian {GPS} Spoofing of Unmanned
                  Aerial Vehicles},
  booktitle    = {Decision and Game Theory for Security - 8th International Conference,
                  GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10575},
  pages        = {213--233},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68711-7\_12},
  doi          = {10.1007/978-3-319-68711-7\_12},
  timestamp    = {Thu, 19 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/ZhangZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/ZolotavkinGR17,
  author       = {Yevhen Zolotavkin and
                  Juli{\'{a}}n Garc{\'{\i}}a and
                  Carsten Rudolph},
  editor       = {Stefan Rass and
                  Bo An and
                  Christopher Kiekintveld and
                  Fei Fang and
                  Stefan Schauer},
  title        = {Incentive Compatibility of Pay Per Last {N} Shares in Bitcoin Mining
                  Pools},
  booktitle    = {Decision and Game Theory for Security - 8th International Conference,
                  GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10575},
  pages        = {21--39},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68711-7\_2},
  doi          = {10.1007/978-3-319-68711-7\_2},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/ZolotavkinGR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/gamesec/2017,
  editor       = {Stefan Rass and
                  Bo An and
                  Christopher Kiekintveld and
                  Fei Fang and
                  Stefan Schauer},
  title        = {Decision and Game Theory for Security - 8th International Conference,
                  GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10575},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68711-7},
  doi          = {10.1007/978-3-319-68711-7},
  isbn         = {978-3-319-68710-0},
  timestamp    = {Wed, 07 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/AlpernLM016,
  author       = {Steve Alpern and
                  Thomas Lidbetter and
                  Alec Morton and
                  Katerina Papadaki},
  editor       = {Quanyan Zhu and
                  Tansu Alpcan and
                  Emmanouil A. Panaousis and
                  Milind Tambe and
                  William Casey},
  title        = {Patrolling a Pipeline},
  booktitle    = {Decision and Game Theory for Security - 7th International Conference,
                  GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9996},
  pages        = {129--138},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47413-7\_8},
  doi          = {10.1007/978-3-319-47413-7\_8},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/AlpernLM016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/AltmanSTL16,
  author       = {Eitan Altman and
                  Aniruddha Singhal and
                  Corinne Touati and
                  Jie Li},
  editor       = {Quanyan Zhu and
                  Tansu Alpcan and
                  Emmanouil A. Panaousis and
                  Milind Tambe and
                  William Casey},
  title        = {Resilience of Routing in Parallel Link Networks},
  booktitle    = {Decision and Game Theory for Security - 7th International Conference,
                  GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9996},
  pages        = {3--17},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47413-7\_1},
  doi          = {10.1007/978-3-319-47413-7\_1},
  timestamp    = {Tue, 19 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/AltmanSTL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/AndersonMP16,
  author       = {Gabrielle Anderson and
                  Guy McCusker and
                  David J. Pym},
  editor       = {Quanyan Zhu and
                  Tansu Alpcan and
                  Emmanouil A. Panaousis and
                  Milind Tambe and
                  William Casey},
  title        = {A Logic for the Compliance Budget},
  booktitle    = {Decision and Game Theory for Security - 7th International Conference,
                  GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9996},
  pages        = {370--381},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47413-7\_21},
  doi          = {10.1007/978-3-319-47413-7\_21},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/AndersonMP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/BasakFNK16,
  author       = {Anjon Basak and
                  Fei Fang and
                  Thanh Hong Nguyen and
                  Christopher Kiekintveld},
  editor       = {Quanyan Zhu and
                  Tansu Alpcan and
                  Emmanouil A. Panaousis and
                  Milind Tambe and
                  William Casey},
  title        = {Combining Graph Contraction and Strategy Generation for Green Security
                  Games},
  booktitle    = {Decision and Game Theory for Security - 7th International Conference,
                  GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9996},
  pages        = {251--271},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47413-7\_15},
  doi          = {10.1007/978-3-319-47413-7\_15},
  timestamp    = {Wed, 07 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/BasakFNK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/CaulfieldIP16,
  author       = {Tristan Caulfield and
                  Christos Ioannidis and
                  David J. Pym},
  editor       = {Quanyan Zhu and
                  Tansu Alpcan and
                  Emmanouil A. Panaousis and
                  Milind Tambe and
                  William Casey},
  title        = {On the Adoption of Privacy-enhancing Technologies},
  booktitle    = {Decision and Game Theory for Security - 7th International Conference,
                  GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9996},
  pages        = {175--194},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47413-7\_11},
  doi          = {10.1007/978-3-319-47413-7\_11},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/CaulfieldIP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/CekerZULS16,
  author       = {Hayreddin {\c{C}}eker and
                  Jun Zhuang and
                  Shambhu J. Upadhyaya and
                  Quang Duy La and
                  Boon{-}Hee Soong},
  editor       = {Quanyan Zhu and
                  Tansu Alpcan and
                  Emmanouil A. Panaousis and
                  Milind Tambe and
                  William Casey},
  title        = {Deception-Based Game Theoretical Approach to Mitigate DoS Attacks},
  booktitle    = {Decision and Game Theory for Security - 7th International Conference,
                  GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9996},
  pages        = {18--38},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47413-7\_2},
  doi          = {10.1007/978-3-319-47413-7\_2},
  timestamp    = {Sun, 27 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/CekerZULS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/ChenZ16,
  author       = {Juntao Chen and
                  Quanyan Zhu},
  editor       = {Quanyan Zhu and
                  Tansu Alpcan and
                  Emmanouil A. Panaousis and
                  Milind Tambe and
                  William Casey},
  title        = {Optimal Contract Design Under Asymmetric Information for Cloud-Enabled
                  Internet of Controlled Things},
  booktitle    = {Decision and Game Theory for Security - 7th International Conference,
                  GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9996},
  pages        = {329--348},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47413-7\_19},
  doi          = {10.1007/978-3-319-47413-7\_19},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/ChenZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/ChicoisneO16,
  author       = {Renaud Chicoisne and
                  Fernando Ord{\'{o}}{\~{n}}ez},
  editor       = {Quanyan Zhu and
                  Tansu Alpcan and
                  Emmanouil A. Panaousis and
                  Milind Tambe and
                  William Casey},
  title        = {Risk Averse Stackelberg Security Games with Quantal Response},
  booktitle    = {Decision and Game Theory for Security - 7th International Conference,
                  GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9996},
  pages        = {83--100},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47413-7\_5},
  doi          = {10.1007/978-3-319-47413-7\_5},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/ChicoisneO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/CulnaneT16,
  author       = {Chris Culnane and
                  Vanessa Teague},
  editor       = {Quanyan Zhu and
                  Tansu Alpcan and
                  Emmanouil A. Panaousis and
                  Milind Tambe and
                  William Casey},
  title        = {Strategies for Voter-Initiated Election Audits},
  booktitle    = {Decision and Game Theory for Security - 7th International Conference,
                  GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9996},
  pages        = {235--247},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47413-7\_14},
  doi          = {10.1007/978-3-319-47413-7\_14},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/CulnaneT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/DziubinskiSZ16,
  author       = {Marcin Dziubinski and
                  Piotr Sankowski and
                  Qiang Zhang},
  editor       = {Quanyan Zhu and
                  Tansu Alpcan and
                  Emmanouil A. Panaousis and
                  Milind Tambe and
                  William Casey},
  title        = {Network Elicitation in Adversarial Environment},
  booktitle    = {Decision and Game Theory for Security - 7th International Conference,
                  GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9996},
  pages        = {397--414},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47413-7\_23},
  doi          = {10.1007/978-3-319-47413-7\_23},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/DziubinskiSZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/FarhangG16,
  author       = {Sadegh Farhang and
                  Jens Grossklags},
  editor       = {Quanyan Zhu and
                  Tansu Alpcan and
                  Emmanouil A. Panaousis and
                  Milind Tambe and
                  William Casey},
  title        = {FlipLeakage: {A} Game-Theoretic Approach to Protect Against Stealthy
                  Attackers in the Presence of Information Leakage},
  booktitle    = {Decision and Game Theory for Security - 7th International Conference,
                  GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9996},
  pages        = {195--214},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47413-7\_12},
  doi          = {10.1007/978-3-319-47413-7\_12},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/FarhangG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/GhafouriALVK16,
  author       = {Amin Ghafouri and
                  Waseem Abbas and
                  Aron Laszka and
                  Yevgeniy Vorobeychik and
                  Xenofon D. Koutsoukos},
  editor       = {Quanyan Zhu and
                  Tansu Alpcan and
                  Emmanouil A. Panaousis and
                  Milind Tambe and
                  William Casey},
  title        = {Optimal Thresholds for Anomaly-Based Intrusion Detection in Dynamical
                  Environments},
  booktitle    = {Decision and Game Theory for Security - 7th International Conference,
                  GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9996},
  pages        = {415--434},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47413-7\_24},
  doi          = {10.1007/978-3-319-47413-7\_24},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/GhafouriALVK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/GholamiWBTST16,
  author       = {Shahrzad Gholami and
                  Bryan Wilder and
                  Matthew Brown and
                  Dana Thomas and
                  Nicole D. Sintov and
                  Milind Tambe},
  editor       = {Quanyan Zhu and
                  Tansu Alpcan and
                  Emmanouil A. Panaousis and
                  Milind Tambe and
                  William Casey},
  title        = {Divide to Defend: Collusive Security Games},
  booktitle    = {Decision and Game Theory for Security - 7th International Conference,
                  GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9996},
  pages        = {272--293},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47413-7\_16},
  doi          = {10.1007/978-3-319-47413-7\_16},
  timestamp    = {Thu, 05 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/GholamiWBTST16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/HorakB16,
  author       = {Karel Hor{\'{a}}k and
                  Branislav Bosansk{\'{y}}},
  editor       = {Quanyan Zhu and
                  Tansu Alpcan and
                  Emmanouil A. Panaousis and
                  Milind Tambe and
                  William Casey},
  title        = {A Point-Based Approximate Algorithm for One-Sided Partially Observable
                  Pursuit-Evasion Games},
  booktitle    = {Decision and Game Theory for Security - 7th International Conference,
                  GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9996},
  pages        = {435--454},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47413-7\_25},
  doi          = {10.1007/978-3-319-47413-7\_25},
  timestamp    = {Tue, 19 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/HorakB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/HotaCSB16,
  author       = {Ashish Ranjan Hota and
                  Abraham A. Clements and
                  Shreyas Sundaram and
                  Saurabh Bagchi},
  editor       = {Quanyan Zhu and
                  Tansu Alpcan and
                  Emmanouil A. Panaousis and
                  Milind Tambe and
                  William Casey},
  title        = {Optimal and Game-Theoretic Deployment of Security Investments in Interdependent
                  Assets},
  booktitle    = {Decision and Game Theory for Security - 7th International Conference,
                  GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9996},
  pages        = {101--113},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47413-7\_6},
  doi          = {10.1007/978-3-319-47413-7\_6},
  timestamp    = {Wed, 08 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/HotaCSB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/IsmailLB016,
  author       = {Ziad Ismail and
                  Jean Leneutre and
                  David Bateman and
                  Lin Chen},
  editor       = {Quanyan Zhu and
                  Tansu Alpcan and
                  Emmanouil A. Panaousis and
                  Milind Tambe and
                  William Casey},
  title        = {A Methodology to Apply a Game Theoretic Model of Security Risks Interdependencies
                  Between {ICT} and Electric Infrastructures},
  booktitle    = {Decision and Game Theory for Security - 7th International Conference,
                  GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9996},
  pages        = {159--171},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47413-7\_10},
  doi          = {10.1007/978-3-319-47413-7\_10},
  timestamp    = {Thu, 17 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/IsmailLB016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/KallasTLB16,
  author       = {Kassem Kallas and
                  Benedetta Tondi and
                  Riccardo Lazzeretti and
                  Mauro Barni},
  editor       = {Quanyan Zhu and
                  Tansu Alpcan and
                  Emmanouil A. Panaousis and
                  Milind Tambe and
                  William Casey},
  title        = {Consensus Algorithm with Censored Data for Distributed Detection with
                  Corrupted Measurements: {A} Game-Theoretic Approach},
  booktitle    = {Decision and Game Theory for Security - 7th International Conference,
                  GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9996},
  pages        = {455--466},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47413-7\_26},
  doi          = {10.1007/978-3-319-47413-7\_26},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/KallasTLB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/LaszkaS16,
  author       = {Aron Laszka and
                  Galina Schwartz},
  editor       = {Quanyan Zhu and
                  Tansu Alpcan and
                  Emmanouil A. Panaousis and
                  Milind Tambe and
                  William Casey},
  title        = {Becoming Cybercriminals: Incentives in Networks with Interdependent
                  Security - Incentives in Networks with Interdependent Security},
  booktitle    = {Decision and Game Theory for Security - 7th International Conference,
                  GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9996},
  pages        = {349--369},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47413-7\_20},
  doi          = {10.1007/978-3-319-47413-7\_20},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/LaszkaS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/McCarthySTM16,
  author       = {Sara Marie McCarthy and
                  Arunesh Sinha and
                  Milind Tambe and
                  Pratyusa Manadhata},
  editor       = {Quanyan Zhu and
                  Tansu Alpcan and
                  Emmanouil A. Panaousis and
                  Milind Tambe and
                  William Casey},
  title        = {Data Exfiltration Detection and Prevention: Virtually Distributed
                  POMDPs for Practically Safer Networks},
  booktitle    = {Decision and Game Theory for Security - 7th International Conference,
                  GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9996},
  pages        = {39--61},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47413-7\_3},
  doi          = {10.1007/978-3-319-47413-7\_3},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/McCarthySTM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/MihcakABL16,
  author       = {M. Kivan{\c{c}} Mih{\c{c}}ak and
                  Emrah Akyol and
                  Tamer Basar and
                  C{\'{e}}dric Langbort},
  editor       = {Quanyan Zhu and
                  Tansu Alpcan and
                  Emmanouil A. Panaousis and
                  Milind Tambe and
                  William Casey},
  title        = {Scalar Quadratic-Gaussian Soft Watermarking Games},
  booktitle    = {Decision and Game Theory for Security - 7th International Conference,
                  GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9996},
  pages        = {215--234},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47413-7\_13},
  doi          = {10.1007/978-3-319-47413-7\_13},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/MihcakABL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/MohammadiMMZ16,
  author       = {Amin Mohammadi and
                  Mohammad Hossein Manshaei and
                  Monireh Mohebbi Moghaddam and
                  Quanyan Zhu},
  editor       = {Quanyan Zhu and
                  Tansu Alpcan and
                  Emmanouil A. Panaousis and
                  Milind Tambe and
                  William Casey},
  title        = {A Game-Theoretic Analysis of Deception over Social Networks Using
                  Fake Avatars},
  booktitle    = {Decision and Game Theory for Security - 7th International Conference,
                  GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9996},
  pages        = {382--394},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47413-7\_22},
  doi          = {10.1007/978-3-319-47413-7\_22},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/MohammadiMMZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/MukhopadhyayZVT16,
  author       = {Ayan Mukhopadhyay and
                  Chao Zhang and
                  Yevgeniy Vorobeychik and
                  Milind Tambe and
                  Kenneth Pence and
                  Paul Speer},
  editor       = {Quanyan Zhu and
                  Tansu Alpcan and
                  Emmanouil A. Panaousis and
                  Milind Tambe and
                  William Casey},
  title        = {Optimal Allocation of Police Patrol Resources Using a Continuous-Time
                  Crime Model},
  booktitle    = {Decision and Game Theory for Security - 7th International Conference,
                  GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9996},
  pages        = {139--158},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47413-7\_9},
  doi          = {10.1007/978-3-319-47413-7\_9},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/MukhopadhyayZVT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/NoureddineFSB16,
  author       = {Mohammad A. Noureddine and
                  Ahmed M. Fawaz and
                  William H. Sanders and
                  Tamer Basar},
  editor       = {Quanyan Zhu and
                  Tansu Alpcan and
                  Emmanouil A. Panaousis and
                  Milind Tambe and
                  William Casey},
  title        = {A Game-Theoretic Approach to Respond to Attacker Lateral Movement},
  booktitle    = {Decision and Game Theory for Security - 7th International Conference,
                  GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9996},
  pages        = {294--313},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47413-7\_17},
  doi          = {10.1007/978-3-319-47413-7\_17},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/NoureddineFSB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/RassZ16,
  author       = {Stefan Rass and
                  Quanyan Zhu},
  editor       = {Quanyan Zhu and
                  Tansu Alpcan and
                  Emmanouil A. Panaousis and
                  Milind Tambe and
                  William Casey},
  title        = {{GADAPT:} {A} Sequential Game-Theoretic Framework for Designing Defense-in-Depth
                  Strategies Against Advanced Persistent Threats},
  booktitle    = {Decision and Game Theory for Security - 7th International Conference,
                  GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9996},
  pages        = {314--326},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47413-7\_18},
  doi          = {10.1007/978-3-319-47413-7\_18},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/RassZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/TsiropoulouBPQ16,
  author       = {Eirini{-}Eleni Tsiropoulou and
                  John S. Baras and
                  Symeon Papavassiliou and
                  Gang Qu},
  editor       = {Quanyan Zhu and
                  Tansu Alpcan and
                  Emmanouil A. Panaousis and
                  Milind Tambe and
                  William Casey},
  title        = {On the Mitigation of Interference Imposed by Intruders in Passive
                  {RFID} Networks},
  booktitle    = {Decision and Game Theory for Security - 7th International Conference,
                  GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9996},
  pages        = {62--80},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47413-7\_4},
  doi          = {10.1007/978-3-319-47413-7\_4},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/TsiropoulouBPQ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/ZhouBG16,
  author       = {Zhengyuan Zhou and
                  Nicholas Bambos and
                  Peter W. Glynn},
  editor       = {Quanyan Zhu and
                  Tansu Alpcan and
                  Emmanouil A. Panaousis and
                  Milind Tambe and
                  William Casey},
  title        = {Dynamics on Linear Influence Network Games Under Stochastic Environments},
  booktitle    = {Decision and Game Theory for Security - 7th International Conference,
                  GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9996},
  pages        = {114--126},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47413-7\_7},
  doi          = {10.1007/978-3-319-47413-7\_7},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/ZhouBG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/gamesec/2016,
  editor       = {Quanyan Zhu and
                  Tansu Alpcan and
                  Emmanouil A. Panaousis and
                  Milind Tambe and
                  William Casey},
  title        = {Decision and Game Theory for Security - 7th International Conference,
                  GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9996},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47413-7},
  doi          = {10.1007/978-3-319-47413-7},
  isbn         = {978-3-319-47412-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/BasilicoNG15,
  author       = {Nicola Basilico and
                  Giuseppe De Nittis and
                  Nicola Gatti},
  editor       = {M. H. R. Khouzani and
                  Emmanouil A. Panaousis and
                  George Theodorakopoulos},
  title        = {A Security Game Model for Environment Protection in the Presence of
                  an Alarm System},
  booktitle    = {Decision and Game Theory for Security - 6th International Conference,
                  GameSec 2015, London, UK, November 4-5, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9406},
  pages        = {192--207},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25594-1\_11},
  doi          = {10.1007/978-3-319-25594-1\_11},
  timestamp    = {Thu, 17 Sep 2020 10:44:10 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/BasilicoNG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/CampanelliG15,
  author       = {Matteo Campanelli and
                  Rosario Gennaro},
  editor       = {M. H. R. Khouzani and
                  Emmanouil A. Panaousis and
                  George Theodorakopoulos},
  title        = {Sequentially Composable Rational Proofs},
  booktitle    = {Decision and Game Theory for Security - 6th International Conference,
                  GameSec 2015, London, UK, November 4-5, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9406},
  pages        = {270--288},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25594-1\_15},
  doi          = {10.1007/978-3-319-25594-1\_15},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/CampanelliG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/ClarkSBP15,
  author       = {Andrew Clark and
                  Kun Sun and
                  Linda Bushnell and
                  Radha Poovendran},
  editor       = {M. H. R. Khouzani and
                  Emmanouil A. Panaousis and
                  George Theodorakopoulos},
  title        = {A Game-Theoretic Approach to {IP} Address Randomization in Decoy-Based
                  Cyber Defense},
  booktitle    = {Decision and Game Theory for Security - 6th International Conference,
                  GameSec 2015, London, UK, November 4-5, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9406},
  pages        = {3--21},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25594-1\_1},
  doi          = {10.1007/978-3-319-25594-1\_1},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/ClarkSBP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/DurkotaLBK15,
  author       = {Karel Durkota and
                  Viliam Lis{\'{y}} and
                  Branislav Bosansk{\'{y}} and
                  Christopher Kiekintveld},
  editor       = {M. H. R. Khouzani and
                  Emmanouil A. Panaousis and
                  George Theodorakopoulos},
  title        = {Approximate Solutions for Attack Graph Games with Imperfect Information},
  booktitle    = {Decision and Game Theory for Security - 6th International Conference,
                  GameSec 2015, London, UK, November 4-5, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9406},
  pages        = {228--249},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25594-1\_13},
  doi          = {10.1007/978-3-319-25594-1\_13},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/DurkotaLBK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/FordNTSF15,
  author       = {Benjamin J. Ford and
                  Thanh Hong Nguyen and
                  Milind Tambe and
                  Nicole D. Sintov and
                  Francesco Maria Delle Fave},
  editor       = {M. H. R. Khouzani and
                  Emmanouil A. Panaousis and
                  George Theodorakopoulos},
  title        = {Beware the Soothsayer: From Attack Prediction Accuracy to Predictive
                  Reliability in Security Games},
  booktitle    = {Decision and Game Theory for Security - 6th International Conference,
                  GameSec 2015, London, UK, November 4-5, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9406},
  pages        = {35--56},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25594-1\_3},
  doi          = {10.1007/978-3-319-25594-1\_3},
  timestamp    = {Thu, 05 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/FordNTSF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/HayelZ15,
  author       = {Yezekael Hayel and
                  Quanyan Zhu},
  editor       = {M. H. R. Khouzani and
                  Emmanouil A. Panaousis and
                  George Theodorakopoulos},
  title        = {Attack-Aware Cyber Insurance for Risk Sharing in Computer Networks},
  booktitle    = {Decision and Game Theory for Security - 6th International Conference,
                  GameSec 2015, London, UK, November 4-5, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9406},
  pages        = {22--34},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25594-1\_2},
  doi          = {10.1007/978-3-319-25594-1\_2},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/HayelZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/HeitzenraterTS15,
  author       = {Chad Heitzenrater and
                  Greg Taylor and
                  Andrew Simpson},
  editor       = {M. H. R. Khouzani and
                  Emmanouil A. Panaousis and
                  George Theodorakopoulos},
  title        = {When the Winning Move is Not to Play: Games of Deterrence in Cyber
                  Security},
  booktitle    = {Decision and Game Theory for Security - 6th International Conference,
                  GameSec 2015, London, UK, November 4-5, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9406},
  pages        = {250--269},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25594-1\_14},
  doi          = {10.1007/978-3-319-25594-1\_14},
  timestamp    = {Thu, 20 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/HeitzenraterTS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/HotaS15,
  author       = {Ashish Ranjan Hota and
                  Shreyas Sundaram},
  editor       = {M. H. R. Khouzani and
                  Emmanouil A. Panaousis and
                  George Theodorakopoulos},
  title        = {Interdependent Security Games Under Behavioral Probability Weighting},
  booktitle    = {Decision and Game Theory for Security - 6th International Conference,
                  GameSec 2015, London, UK, November 4-5, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9406},
  pages        = {150--169},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25594-1\_9},
  doi          = {10.1007/978-3-319-25594-1\_9},
  timestamp    = {Wed, 08 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/HotaS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/HuangSS15,
  author       = {Chong Huang and
                  Lalitha Sankar and
                  Anand D. Sarwate},
  editor       = {M. H. R. Khouzani and
                  Emmanouil A. Panaousis and
                  George Theodorakopoulos},
  title        = {Incentive Schemes for Privacy-Sensitive Consumers},
  booktitle    = {Decision and Game Theory for Security - 6th International Conference,
                  GameSec 2015, London, UK, November 4-5, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9406},
  pages        = {358--369},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25594-1\_21},
  doi          = {10.1007/978-3-319-25594-1\_21},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/HuangSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/JohnsonLG15,
  author       = {Benjamin Johnson and
                  Aron Laszka and
                  Jens Grossklags},
  editor       = {M. H. R. Khouzani and
                  Emmanouil A. Panaousis and
                  George Theodorakopoulos},
  title        = {Games of Timing for Security in Dynamic Environments},
  booktitle    = {Decision and Game Theory for Security - 6th International Conference,
                  GameSec 2015, London, UK, November 4-5, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9406},
  pages        = {57--73},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25594-1\_4},
  doi          = {10.1007/978-3-319-25594-1\_4},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/JohnsonLG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/KlimaLK15,
  author       = {Richard Kl{\'{\i}}ma and
                  Viliam Lis{\'{y}} and
                  Christopher Kiekintveld},
  editor       = {M. H. R. Khouzani and
                  Emmanouil A. Panaousis and
                  George Theodorakopoulos},
  title        = {Combining Online Learning and Equilibrium Computation in Security
                  Games},
  booktitle    = {Decision and Game Theory for Security - 6th International Conference,
                  GameSec 2015, London, UK, November 4-5, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9406},
  pages        = {130--149},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25594-1\_8},
  doi          = {10.1007/978-3-319-25594-1\_8},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/KlimaLK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/LeeCABP15,
  author       = {Phillip Lee and
                  Andrew Clark and
                  Basel Alomair and
                  Linda Bushnell and
                  Radha Poovendran},
  editor       = {M. H. R. Khouzani and
                  Emmanouil A. Panaousis and
                  George Theodorakopoulos},
  title        = {Passivity-Based Distributed Strategies for Stochastic Stackelberg
                  Security Games},
  booktitle    = {Decision and Game Theory for Security - 6th International Conference,
                  GameSec 2015, London, UK, November 4-5, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9406},
  pages        = {113--129},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25594-1\_7},
  doi          = {10.1007/978-3-319-25594-1\_7},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/LeeCABP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/LeninWC15,
  author       = {Aleksandr Lenin and
                  Jan Willemson and
                  Anton Charnamord},
  editor       = {M. H. R. Khouzani and
                  Emmanouil A. Panaousis and
                  George Theodorakopoulos},
  title        = {Genetic Approximations for the Failure-Free Security Games},
  booktitle    = {Decision and Game Theory for Security - 6th International Conference,
                  GameSec 2015, London, UK, November 4-5, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9406},
  pages        = {311--321},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25594-1\_17},
  doi          = {10.1007/978-3-319-25594-1\_17},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/LeninWC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/LeslieSS15,
  author       = {David S. Leslie and
                  Chris Sherfield and
                  Nigel P. Smart},
  editor       = {M. H. R. Khouzani and
                  Emmanouil A. Panaousis and
                  George Theodorakopoulos},
  title        = {Threshold FlipThem: When the Winner Does Not Need to Take All},
  booktitle    = {Decision and Game Theory for Security - 6th International Conference,
                  GameSec 2015, London, UK, November 4-5, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9406},
  pages        = {74--92},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25594-1\_5},
  doi          = {10.1007/978-3-319-25594-1\_5},
  timestamp    = {Tue, 06 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/LeslieSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/MerlevedeH15,
  author       = {Jonathan S. A. Merlevede and
                  Tom Holvoet},
  editor       = {M. H. R. Khouzani and
                  Emmanouil A. Panaousis and
                  George Theodorakopoulos},
  title        = {Game Theory and Security: Recent History and Future Directions},
  booktitle    = {Decision and Game Theory for Security - 6th International Conference,
                  GameSec 2015, London, UK, November 4-5, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9406},
  pages        = {334--345},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25594-1\_19},
  doi          = {10.1007/978-3-319-25594-1\_19},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/MerlevedeH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/MoghaddamMZ15,
  author       = {Monireh Mohebbi Moghaddam and
                  Mohammad Hossein Manshaei and
                  Quanyan Zhu},
  editor       = {M. H. R. Khouzani and
                  Emmanouil A. Panaousis and
                  George Theodorakopoulos},
  title        = {To Trust or Not: {A} Security Signaling Game Between Service Provider
                  and Client},
  booktitle    = {Decision and Game Theory for Security - 6th International Conference,
                  GameSec 2015, London, UK, November 4-5, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9406},
  pages        = {322--333},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25594-1\_18},
  doi          = {10.1007/978-3-319-25594-1\_18},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/MoghaddamMZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/NguyenFKLYTAPDW15,
  author       = {Thanh Hong Nguyen and
                  Francesco Maria Delle Fave and
                  Debarun Kar and
                  Aravind S. Lakshminarayanan and
                  Amulya Yadav and
                  Milind Tambe and
                  Noa Agmon and
                  Andrew J. Plumptre and
                  Margaret Driciru and
                  Fred Wanyama and
                  Aggrey Rwetsiba},
  editor       = {M. H. R. Khouzani and
                  Emmanouil A. Panaousis and
                  George Theodorakopoulos},
  title        = {Making the Most of Our Regrets: Regret-Based Solutions to Handle Payoff
                  Uncertainty and Elicitation in Green Security Games},
  booktitle    = {Decision and Game Theory for Security - 6th International Conference,
                  GameSec 2015, London, UK, November 4-5, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9406},
  pages        = {170--191},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25594-1\_10},
  doi          = {10.1007/978-3-319-25594-1\_10},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/NguyenFKLYTAPDW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/PawlickFZ15,
  author       = {Jeffrey Pawlick and
                  Sadegh Farhang and
                  Quanyan Zhu},
  editor       = {M. H. R. Khouzani and
                  Emmanouil A. Panaousis and
                  George Theodorakopoulos},
  title        = {Flip the Cloud: Cyber-Physical Signaling Games in the Presence of
                  Advanced Persistent Threats},
  booktitle    = {Decision and Game Theory for Security - 6th International Conference,
                  GameSec 2015, London, UK, November 4-5, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9406},
  pages        = {289--308},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25594-1\_16},
  doi          = {10.1007/978-3-319-25594-1\_16},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/PawlickFZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/RajtmajerGS15,
  author       = {Sarah Michele Rajtmajer and
                  Christopher Griffin and
                  Anna Cinzia Squicciarini},
  editor       = {M. H. R. Khouzani and
                  Emmanouil A. Panaousis and
                  George Theodorakopoulos},
  title        = {Determining a Discrete Set of Site-Constrained Privacy Options for
                  Users in Social Networks Through Stackelberg Games},
  booktitle    = {Decision and Game Theory for Security - 6th International Conference,
                  GameSec 2015, London, UK, November 4-5, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9406},
  pages        = {208--227},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25594-1\_12},
  doi          = {10.1007/978-3-319-25594-1\_12},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/RajtmajerGS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/RassKS15,
  author       = {Stefan Rass and
                  Sandra K{\"{o}}nig and
                  Stefan Schauer},
  editor       = {M. H. R. Khouzani and
                  Emmanouil A. Panaousis and
                  George Theodorakopoulos},
  title        = {Uncertainty in Games: Using Probability-Distributions as Payoffs},
  booktitle    = {Decision and Game Theory for Security - 6th International Conference,
                  GameSec 2015, London, UK, November 4-5, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9406},
  pages        = {346--357},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25594-1\_20},
  doi          = {10.1007/978-3-319-25594-1\_20},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/RassKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/ZhangZS15,
  author       = {Ming Zhang and
                  Zizhan Zheng and
                  Ness B. Shroff},
  editor       = {M. H. R. Khouzani and
                  Emmanouil A. Panaousis and
                  George Theodorakopoulos},
  title        = {A Game Theoretic Model for Defending Against Stealthy Attacks with
                  Limited Resources},
  booktitle    = {Decision and Game Theory for Security - 6th International Conference,
                  GameSec 2015, London, UK, November 4-5, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9406},
  pages        = {93--112},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25594-1\_6},
  doi          = {10.1007/978-3-319-25594-1\_6},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/ZhangZS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/gamesec/2015,
  editor       = {M. H. R. Khouzani and
                  Emmanouil A. Panaousis and
                  George Theodorakopoulos},
  title        = {Decision and Game Theory for Security - 6th International Conference,
                  GameSec 2015, London, UK, November 4-5, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9406},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25594-1},
  doi          = {10.1007/978-3-319-25594-1},
  isbn         = {978-3-319-25593-4},
  timestamp    = {Thu, 17 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/BhattacharyaBF14,
  author       = {Sourabh Bhattacharya and
                  Tamer Basar and
                  Maurizio Falcone},
  editor       = {Radha Poovendran and
                  Walid Saad},
  title        = {Surveillance for Security as a Pursuit-Evasion Game},
  booktitle    = {Decision and Game Theory for Security - 5th International Conference,
                  GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8840},
  pages        = {370--379},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12601-2\_23},
  doi          = {10.1007/978-3-319-12601-2\_23},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/BhattacharyaBF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/BrownHT14,
  author       = {Matthew Brown and
                  William B. Haskell and
                  Milind Tambe},
  editor       = {Radha Poovendran and
                  Walid Saad},
  title        = {Addressing Scalability and Robustness in Security Games with Multiple
                  Boundedly Rational Adversaries},
  booktitle    = {Decision and Game Theory for Security - 5th International Conference,
                  GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8840},
  pages        = {23--42},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12601-2\_2},
  doi          = {10.1007/978-3-319-12601-2\_2},
  timestamp    = {Mon, 30 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/BrownHT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/CuiJ14,
  author       = {Jinshu Cui and
                  Richard S. John},
  editor       = {Radha Poovendran and
                  Walid Saad},
  title        = {Empirical Comparisons of Descriptive Multi-objective Adversary Models
                  in Stackelberg Security Games},
  booktitle    = {Decision and Game Theory for Security - 5th International Conference,
                  GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8840},
  pages        = {309--318},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12601-2\_17},
  doi          = {10.1007/978-3-319-12601-2\_17},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/CuiJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/DjebailiKLC14,
  author       = {Brahim Djebaili and
                  Christophe Kiennert and
                  Jean Leneutre and
                  Lin Chen},
  editor       = {Radha Poovendran and
                  Walid Saad},
  title        = {Data Integrity and Availability Verification Game in Untrusted Cloud
                  Storage},
  booktitle    = {Decision and Game Theory for Security - 5th International Conference,
                  GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8840},
  pages        = {287--306},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12601-2\_16},
  doi          = {10.1007/978-3-319-12601-2\_16},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/DjebailiKLC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/FarhangMEZ14,
  author       = {Sadegh Farhang and
                  Mohammad Hossein Manshaei and
                  Milad Nasr Esfahani and
                  Quanyan Zhu},
  editor       = {Radha Poovendran and
                  Walid Saad},
  title        = {A Dynamic Bayesian Security Game Framework for Strategic Defense Mechanism
                  Design},
  booktitle    = {Decision and Game Theory for Security - 5th International Conference,
                  GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8840},
  pages        = {319--328},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12601-2\_18},
  doi          = {10.1007/978-3-319-12601-2\_18},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/FarhangMEZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/GuptaBS14,
  author       = {Abhishek Gupta and
                  Tamer Basar and
                  Galina A. Schwartz},
  editor       = {Radha Poovendran and
                  Walid Saad},
  title        = {A Three-Stage Colonel Blotto Game: When to Provide More Information
                  to an Adversary},
  booktitle    = {Decision and Game Theory for Security - 5th International Conference,
                  GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8840},
  pages        = {216--233},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12601-2\_12},
  doi          = {10.1007/978-3-319-12601-2\_12},
  timestamp    = {Wed, 25 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/GuptaBS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/KamhouaRK14,
  author       = {Charles A. Kamhoua and
                  Manuel Rodr{\'{\i}}guez and
                  Kevin A. Kwiat},
  editor       = {Radha Poovendran and
                  Walid Saad},
  title        = {Testing for Hardware Trojans: {A} Game-Theoretic Approach},
  booktitle    = {Decision and Game Theory for Security - 5th International Conference,
                  GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8840},
  pages        = {360--369},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12601-2\_22},
  doi          = {10.1007/978-3-319-12601-2\_22},
  timestamp    = {Thu, 29 Mar 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/KamhouaRK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/KhouzaniPC14,
  author       = {M. H. R. Khouzani and
                  Viet Pham and
                  Carlos Cid},
  editor       = {Radha Poovendran and
                  Walid Saad},
  title        = {Strategic Discovery and Sharing of Vulnerabilities in Competitive
                  Environments},
  booktitle    = {Decision and Game Theory for Security - 5th International Conference,
                  GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8840},
  pages        = {59--78},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12601-2\_4},
  doi          = {10.1007/978-3-319-12601-2\_4},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/KhouzaniPC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/KlimaKL14,
  author       = {Richard Kl{\'{\i}}ma and
                  Christopher Kiekintveld and
                  Viliam Lis{\'{y}}},
  editor       = {Radha Poovendran and
                  Walid Saad},
  title        = {Online Learning Methods for Border Patrol Resource Allocation},
  booktitle    = {Decision and Game Theory for Security - 5th International Conference,
                  GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8840},
  pages        = {340--349},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12601-2\_20},
  doi          = {10.1007/978-3-319-12601-2\_20},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/KlimaKL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/LaszkaHFB14,
  author       = {Aron Laszka and
                  G{\'{a}}bor Horv{\'{a}}th and
                  M{\'{a}}rk F{\'{e}}legyh{\'{a}}zi and
                  Levente Butty{\'{a}}n},
  editor       = {Radha Poovendran and
                  Walid Saad},
  title        = {FlipThem: Modeling Targeted Attacks with FlipIt for Multiple Resources},
  booktitle    = {Decision and Game Theory for Security - 5th International Conference,
                  GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8840},
  pages        = {175--194},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12601-2\_10},
  doi          = {10.1007/978-3-319-12601-2\_10},
  timestamp    = {Wed, 25 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/LaszkaHFB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/LeninB14,
  author       = {Aleksandr Lenin and
                  Ahto Buldas},
  editor       = {Radha Poovendran and
                  Walid Saad},
  title        = {Limiting Adversarial Budget in Quantitative Security Assessment},
  booktitle    = {Decision and Game Theory for Security - 5th International Conference,
                  GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8840},
  pages        = {155--174},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12601-2\_9},
  doi          = {10.1007/978-3-319-12601-2\_9},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/LeninB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/LiuB14,
  author       = {Ji Liu and
                  Tamer Basar},
  editor       = {Radha Poovendran and
                  Walid Saad},
  title        = {Toward Optimal Network Topology Design for Fast and Secure Distributed
                  Computation},
  booktitle    = {Decision and Game Theory for Security - 5th International Conference,
                  GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8840},
  pages        = {234--245},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12601-2\_13},
  doi          = {10.1007/978-3-319-12601-2\_13},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/LiuB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/PanaousisAFC14,
  author       = {Emmanouil A. Panaousis and
                  Tansu Alpcan and
                  Hossein Fereidooni and
                  Mauro Conti},
  editor       = {Radha Poovendran and
                  Walid Saad},
  title        = {Secure Message Delivery Games for Device-to-Device Communications},
  booktitle    = {Decision and Game Theory for Security - 5th International Conference,
                  GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8840},
  pages        = {195--215},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12601-2\_11},
  doi          = {10.1007/978-3-319-12601-2\_11},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/PanaousisAFC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/PanaousisFMHS14,
  author       = {Emmanouil A. Panaousis and
                  Andrew Fielder and
                  Pasquale Malacaria and
                  Chris Hankin and
                  Fabrizio Smeraldi},
  editor       = {Radha Poovendran and
                  Walid Saad},
  title        = {Cybersecurity Games and Investments: {A} Decision Support Approach},
  booktitle    = {Decision and Game Theory for Security - 5th International Conference,
                  GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8840},
  pages        = {266--286},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12601-2\_15},
  doi          = {10.1007/978-3-319-12601-2\_15},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/PanaousisFMHS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/PhamKC14,
  author       = {Viet Pham and
                  M. H. R. Khouzani and
                  Carlos Cid},
  editor       = {Radha Poovendran and
                  Walid Saad},
  title        = {Optimal Contracts for Outsourced Computation},
  booktitle    = {Decision and Game Theory for Security - 5th International Conference,
                  GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8840},
  pages        = {79--98},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12601-2\_5},
  doi          = {10.1007/978-3-319-12601-2\_5},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/PhamKC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/PuG14,
  author       = {Yu Pu and
                  Jens Grossklags},
  editor       = {Radha Poovendran and
                  Walid Saad},
  title        = {An Economic Model and Simulation Results of App Adoption Decisions
                  on Networks with Interdependent Privacy Consequences},
  booktitle    = {Decision and Game Theory for Security - 5th International Conference,
                  GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8840},
  pages        = {246--265},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12601-2\_14},
  doi          = {10.1007/978-3-319-12601-2\_14},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/PuG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/RasouliMT14,
  author       = {Mohammad Rasouli and
                  Erik Miehling and
                  Demosthenis Teneketzis},
  editor       = {Radha Poovendran and
                  Walid Saad},
  title        = {A Supervisory Control Approach to Dynamic Cyber-Security},
  booktitle    = {Decision and Game Theory for Security - 5th International Conference,
                  GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8840},
  pages        = {99--117},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12601-2\_6},
  doi          = {10.1007/978-3-319-12601-2\_6},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/RasouliMT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/RassR14,
  author       = {Stefan Rass and
                  Benjamin Rainer},
  editor       = {Radha Poovendran and
                  Walid Saad},
  title        = {Numerical Computation of Multi-goal Security Strategies},
  booktitle    = {Decision and Game Theory for Security - 5th International Conference,
                  GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8840},
  pages        = {118--133},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12601-2\_7},
  doi          = {10.1007/978-3-319-12601-2\_7},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/RassR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/SarabiNL14,
  author       = {Armin Sarabi and
                  Parinaz Naghizadeh and
                  Mingyan Liu},
  editor       = {Radha Poovendran and
                  Walid Saad},
  title        = {Can Less Be More? {A} Game-Theoretic Analysis of Filtering vs. Investment},
  booktitle    = {Decision and Game Theory for Security - 5th International Conference,
                  GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8840},
  pages        = {329--339},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12601-2\_19},
  doi          = {10.1007/978-3-319-12601-2\_19},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/SarabiNL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/WallrabensteinC14,
  author       = {John Ross Wallrabenstein and
                  Chris Clifton},
  editor       = {Radha Poovendran and
                  Walid Saad},
  title        = {Realizable Rational Multiparty Cryptographic Protocols},
  booktitle    = {Decision and Game Theory for Security - 5th International Conference,
                  GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8840},
  pages        = {134--154},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12601-2\_8},
  doi          = {10.1007/978-3-319-12601-2\_8},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/WallrabensteinC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/WellmanP14,
  author       = {Michael P. Wellman and
                  Achintya Prakash},
  editor       = {Radha Poovendran and
                  Walid Saad},
  title        = {Empirical Game-Theoretic Analysis of an Adaptive Cyber-Defense Scenario
                  (Preliminary Report)},
  booktitle    = {Decision and Game Theory for Security - 5th International Conference,
                  GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8840},
  pages        = {43--58},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12601-2\_3},
  doi          = {10.1007/978-3-319-12601-2\_3},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/WellmanP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/ZhangJCH14,
  author       = {Jianhua Zhang and
                  Prateek Jaipuria and
                  Aranya Chakrabortty and
                  Alefiya Hussain},
  editor       = {Radha Poovendran and
                  Walid Saad},
  title        = {A Distributed Optimization Algorithm for Attack-Resilient Wide-Area
                  Monitoring of Power Systems: Theoretical and Experimental Methods},
  booktitle    = {Decision and Game Theory for Security - 5th International Conference,
                  GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8840},
  pages        = {350--359},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12601-2\_21},
  doi          = {10.1007/978-3-319-12601-2\_21},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/ZhangJCH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/ZhangJSBT14,
  author       = {Chao Zhang and
                  Albert Xin Jiang and
                  Martin B. Short and
                  P. Jeffrey Brantingham and
                  Milind Tambe},
  editor       = {Radha Poovendran and
                  Walid Saad},
  title        = {Defending Against Opportunistic Criminals: New Game-Theoretic Frameworks
                  and Algorithms},
  booktitle    = {Decision and Game Theory for Security - 5th International Conference,
                  GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8840},
  pages        = {3--22},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12601-2\_1},
  doi          = {10.1007/978-3-319-12601-2\_1},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/ZhangJSBT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/gamesec/2014,
  editor       = {Radha Poovendran and
                  Walid Saad},
  title        = {Decision and Game Theory for Security - 5th International Conference,
                  GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8840},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12601-2},
  doi          = {10.1007/978-3-319-12601-2},
  isbn         = {978-3-319-12600-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/AkyolRB13,
  author       = {Emrah Akyol and
                  Kenneth Rose and
                  Tamer Basar},
  editor       = {Sajal K. Das and
                  Cristina Nita{-}Rotaru and
                  Murat Kantarcioglu},
  title        = {On Communication over Gaussian Sensor Networks with Adversaries: Further
                  Results},
  booktitle    = {Decision and Game Theory for Security - 4th International Conference,
                  GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8252},
  pages        = {1--9},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-02786-9\_1},
  doi          = {10.1007/978-3-319-02786-9\_1},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/AkyolRB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/AlimomeniSS13,
  author       = {Mohsen Alimomeni and
                  Reihaneh Safavi{-}Naini and
                  Setareh Sharifian},
  editor       = {Sajal K. Das and
                  Cristina Nita{-}Rotaru and
                  Murat Kantarcioglu},
  title        = {A True Random Generator Using Human Gameplay},
  booktitle    = {Decision and Game Theory for Security - 4th International Conference,
                  GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8252},
  pages        = {10--28},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-02786-9\_2},
  doi          = {10.1007/978-3-319-02786-9\_2},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/AlimomeniSS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/AnandAMN13,
  author       = {S. Anand and
                  Ofer Arazy and
                  Narayan B. Mandayam and
                  Oded Nov},
  editor       = {Sajal K. Das and
                  Cristina Nita{-}Rotaru and
                  Murat Kantarcioglu},
  title        = {A Game Theoretic Analysis of Collaboration in Wikipedia},
  booktitle    = {Decision and Game Theory for Security - 4th International Conference,
                  GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8252},
  pages        = {29--44},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-02786-9\_3},
  doi          = {10.1007/978-3-319-02786-9\_3},
  timestamp    = {Thu, 28 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/AnandAMN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/BarretoCQ13,
  author       = {Carlos A. Barreto and
                  Alvaro A. C{\'{a}}rdenas and
                  Nicanor Quijano},
  editor       = {Sajal K. Das and
                  Cristina Nita{-}Rotaru and
                  Murat Kantarcioglu},
  title        = {Controllability of Dynamical Systems: Threat Models and Reactive Security},
  booktitle    = {Decision and Game Theory for Security - 4th International Conference,
                  GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8252},
  pages        = {45--64},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-02786-9\_4},
  doi          = {10.1007/978-3-319-02786-9\_4},
  timestamp    = {Tue, 01 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/BarretoCQ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/BlockiCDS13,
  author       = {Jeremiah Blocki and
                  Nicolas Christin and
                  Anupam Datta and
                  Arunesh Sinha},
  editor       = {Sajal K. Das and
                  Cristina Nita{-}Rotaru and
                  Murat Kantarcioglu},
  title        = {Adaptive Regret Minimization in Bounded-Memory Games},
  booktitle    = {Decision and Game Theory for Security - 4th International Conference,
                  GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8252},
  pages        = {65--84},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-02786-9\_5},
  doi          = {10.1007/978-3-319-02786-9\_5},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/BlockiCDS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/BuldasL13,
  author       = {Ahto Buldas and
                  Aleksandr Lenin},
  editor       = {Sajal K. Das and
                  Cristina Nita{-}Rotaru and
                  Murat Kantarcioglu},
  title        = {New Efficient Utility Upper Bounds for the Fully Adaptive Model of
                  Attack Trees},
  booktitle    = {Decision and Game Theory for Security - 4th International Conference,
                  GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8252},
  pages        = {192--205},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-02786-9\_12},
  doi          = {10.1007/978-3-319-02786-9\_12},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/BuldasL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/EversBM13,
  author       = {Lanah Evers and
                  Ana Isabel Barros and
                  Herman Monsuur},
  editor       = {Sajal K. Das and
                  Cristina Nita{-}Rotaru and
                  Murat Kantarcioglu},
  title        = {The Cooperative Ballistic Missile Defence Game},
  booktitle    = {Decision and Game Theory for Security - 4th International Conference,
                  GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8252},
  pages        = {85--98},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-02786-9\_6},
  doi          = {10.1007/978-3-319-02786-9\_6},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/EversBM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/HanACL13,
  author       = {Yi Han and
                  Tansu Alpcan and
                  Jeffrey Chan and
                  Christopher Leckie},
  editor       = {Sajal K. Das and
                  Cristina Nita{-}Rotaru and
                  Murat Kantarcioglu},
  title        = {Security Games for Virtual Machine Allocation in Cloud Computing},
  booktitle    = {Decision and Game Theory for Security - 4th International Conference,
                  GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8252},
  pages        = {99--118},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-02786-9\_7},
  doi          = {10.1007/978-3-319-02786-9\_7},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/HanACL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/JiangNTP13,
  author       = {Albert Xin Jiang and
                  Thanh Hong Nguyen and
                  Milind Tambe and
                  Ariel D. Procaccia},
  editor       = {Sajal K. Das and
                  Cristina Nita{-}Rotaru and
                  Murat Kantarcioglu},
  title        = {Monotonic Maximin: {A} Robust Stackelberg Solution against Boundedly
                  Rational Followers},
  booktitle    = {Decision and Game Theory for Security - 4th International Conference,
                  GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8252},
  pages        = {119--139},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-02786-9\_8},
  doi          = {10.1007/978-3-319-02786-9\_8},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/JiangNTP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/Kurve0K13,
  author       = {Aditya Kurve and
                  David J. Miller and
                  George Kesidis},
  editor       = {Sajal K. Das and
                  Cristina Nita{-}Rotaru and
                  Murat Kantarcioglu},
  title        = {Defeating Tyranny of the Masses in Crowdsourcing: Accounting for Low-Skilled
                  and Adversarial Workers},
  booktitle    = {Decision and Game Theory for Security - 4th International Conference,
                  GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8252},
  pages        = {140--153},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-02786-9\_9},
  doi          = {10.1007/978-3-319-02786-9\_9},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/Kurve0K13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/LaszkaG13,
  author       = {Aron Laszka and
                  Assane Gueye},
  editor       = {Sajal K. Das and
                  Cristina Nita{-}Rotaru and
                  Murat Kantarcioglu},
  title        = {Quantifying Network Topology Robustness under Budget Constraints:
                  General Model and Computational Complexity},
  booktitle    = {Decision and Game Theory for Security - 4th International Conference,
                  GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8252},
  pages        = {154--174},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-02786-9\_10},
  doi          = {10.1007/978-3-319-02786-9\_10},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/LaszkaG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/LaszkaJG13,
  author       = {Aron Laszka and
                  Benjamin Johnson and
                  Jens Grossklags},
  editor       = {Sajal K. Das and
                  Cristina Nita{-}Rotaru and
                  Murat Kantarcioglu},
  title        = {Mitigation of Targeted and Non-targeted Covert Attacks as a Timing
                  Game},
  booktitle    = {Decision and Game Theory for Security - 4th International Conference,
                  GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8252},
  pages        = {175--191},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-02786-9\_11},
  doi          = {10.1007/978-3-319-02786-9\_11},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/LaszkaJG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/LuXY13,
  author       = {Wenlian Lu and
                  Shouhuai Xu and
                  Xinlei Yi},
  editor       = {Sajal K. Das and
                  Cristina Nita{-}Rotaru and
                  Murat Kantarcioglu},
  title        = {Optimizing Active Cyber Defense},
  booktitle    = {Decision and Game Theory for Security - 4th International Conference,
                  GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8252},
  pages        = {206--225},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-02786-9\_13},
  doi          = {10.1007/978-3-319-02786-9\_13},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/LuXY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/WallrabensteinC13,
  author       = {John Ross Wallrabenstein and
                  Chris Clifton},
  editor       = {Sajal K. Das and
                  Cristina Nita{-}Rotaru and
                  Murat Kantarcioglu},
  title        = {Equilibrium Concepts for Rational Multiparty Computation},
  booktitle    = {Decision and Game Theory for Security - 4th International Conference,
                  GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8252},
  pages        = {226--245},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-02786-9\_14},
  doi          = {10.1007/978-3-319-02786-9\_14},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/WallrabensteinC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/ZhuB13,
  author       = {Quanyan Zhu and
                  Tamer Basar},
  editor       = {Sajal K. Das and
                  Cristina Nita{-}Rotaru and
                  Murat Kantarcioglu},
  title        = {Game-Theoretic Approach to Feedback-Driven Multi-stage Moving Target
                  Defense},
  booktitle    = {Decision and Game Theory for Security - 4th International Conference,
                  GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8252},
  pages        = {246--263},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-02786-9\_15},
  doi          = {10.1007/978-3-319-02786-9\_15},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/ZhuB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/gamesec/2013,
  editor       = {Sajal K. Das and
                  Cristina Nita{-}Rotaru and
                  Murat Kantarcioglu},
  title        = {Decision and Game Theory for Security - 4th International Conference,
                  GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8252},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-02786-9},
  doi          = {10.1007/978-3-319-02786-9},
  isbn         = {978-3-319-02785-2},
  timestamp    = {Tue, 10 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/AminST12,
  author       = {Saurabh Amin and
                  Galina A. Schwartz and
                  Hamidou Tembine},
  editor       = {Jens Grossklags and
                  Jean C. Walrand},
  title        = {Incentives and Security in Electricity Distribution Networks},
  booktitle    = {Decision and Game Theory for Security - Third International Conference,
                  GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7638},
  pages        = {264--280},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34266-0\_16},
  doi          = {10.1007/978-3-642-34266-0\_16},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/AminST12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/BlockiCDS12,
  author       = {Jeremiah Blocki and
                  Nicolas Christin and
                  Anupam Datta and
                  Arunesh Sinha},
  editor       = {Jens Grossklags and
                  Jean C. Walrand},
  title        = {Audit Mechanisms for Provable Risk Management and Accountable Data
                  Governance},
  booktitle    = {Decision and Game Theory for Security - Third International Conference,
                  GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7638},
  pages        = {38--59},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34266-0\_3},
  doi          = {10.1007/978-3-642-34266-0\_3},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/BlockiCDS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/BowersDGJORT12,
  author       = {Kevin D. Bowers and
                  Marten van Dijk and
                  Robert Griffin and
                  Ari Juels and
                  Alina Oprea and
                  Ronald L. Rivest and
                  Nikos Triandopoulos},
  editor       = {Jens Grossklags and
                  Jean C. Walrand},
  title        = {Defending against the Unknown Enemy: Applying FlipIt to System Security},
  booktitle    = {Decision and Game Theory for Security - Third International Conference,
                  GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7638},
  pages        = {248--263},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34266-0\_15},
  doi          = {10.1007/978-3-642-34266-0\_15},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/BowersDGJORT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/BuldasS12,
  author       = {Ahto Buldas and
                  Roman Stepanenko},
  editor       = {Jens Grossklags and
                  Jean C. Walrand},
  title        = {Upper Bounds for Adversaries' Utility in Attack Trees},
  booktitle    = {Decision and Game Theory for Security - Third International Conference,
                  GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7638},
  pages        = {98--117},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34266-0\_6},
  doi          = {10.1007/978-3-642-34266-0\_6},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/BuldasS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/ClarkZPB12,
  author       = {Andrew Clark and
                  Quanyan Zhu and
                  Radha Poovendran and
                  Tamer Basar},
  editor       = {Jens Grossklags and
                  Jean C. Walrand},
  title        = {Deceptive Routing in Relay Networks},
  booktitle    = {Decision and Game Theory for Security - Third International Conference,
                  GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7638},
  pages        = {171--185},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34266-0\_10},
  doi          = {10.1007/978-3-642-34266-0\_10},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/ClarkZPB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/Collins12,
  author       = {M. Patrick Collins},
  editor       = {Jens Grossklags and
                  Jean C. Walrand},
  title        = {A Cost-Based Mechanism for Evaluating the Effectiveness of Moving
                  Target Defenses},
  booktitle    = {Decision and Game Theory for Security - Third International Conference,
                  GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7638},
  pages        = {221--233},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34266-0\_13},
  doi          = {10.1007/978-3-642-34266-0\_13},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/Collins12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/DritsoulaLM12,
  author       = {Lemonia Dritsoula and
                  Patrick Loiseau and
                  John Musacchio},
  editor       = {Jens Grossklags and
                  Jean C. Walrand},
  title        = {Computing the Nash Equilibria of Intruder Classification Games},
  booktitle    = {Decision and Game Theory for Security - Third International Conference,
                  GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7638},
  pages        = {78--97},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34266-0\_5},
  doi          = {10.1007/978-3-642-34266-0\_5},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/DritsoulaLM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/GueyeM12,
  author       = {Assane Gueye and
                  Vladimir Marbukh},
  editor       = {Jens Grossklags and
                  Jean C. Walrand},
  title        = {A Game-Theoretic Framework for Network Security Vulnerability Assessment
                  and Mitigation},
  booktitle    = {Decision and Game Theory for Security - Third International Conference,
                  GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7638},
  pages        = {186--200},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34266-0\_11},
  doi          = {10.1007/978-3-642-34266-0\_11},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/GueyeM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/HoeKB12,
  author       = {SingRu Celine Hoe and
                  Murat Kantarcioglu and
                  Alain Bensoussan},
  editor       = {Jens Grossklags and
                  Jean C. Walrand},
  title        = {A Game Theoretical Analysis of Lemonizing Cybercriminal Black Markets},
  booktitle    = {Decision and Game Theory for Security - Third International Conference,
                  GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7638},
  pages        = {60--77},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34266-0\_4},
  doi          = {10.1007/978-3-642-34266-0\_4},
  timestamp    = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/HoeKB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/JohnsonSB12,
  author       = {Benjamin Johnson and
                  Pascal Sch{\"{o}}ttle and
                  Rainer B{\"{o}}hme},
  editor       = {Jens Grossklags and
                  Jean C. Walrand},
  title        = {Where to Hide the Bits ?},
  booktitle    = {Decision and Game Theory for Security - Third International Conference,
                  GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7638},
  pages        = {1--17},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34266-0\_1},
  doi          = {10.1007/978-3-642-34266-0\_1},
  timestamp    = {Mon, 18 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/JohnsonSB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/LaszkaSB12,
  author       = {Aron Laszka and
                  D{\'{a}}vid Szeszl{\'{e}}r and
                  Levente Butty{\'{a}}n},
  editor       = {Jens Grossklags and
                  Jean C. Walrand},
  title        = {Linear Loss Function for the Network Blocking Game: An Efficient Model
                  for Measuring Network Robustness and Link Criticality},
  booktitle    = {Decision and Game Theory for Security - Third International Conference,
                  GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7638},
  pages        = {152--170},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34266-0\_9},
  doi          = {10.1007/978-3-642-34266-0\_9},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/LaszkaSB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/LawAPD12,
  author       = {Yee Wei Law and
                  Tansu Alpcan and
                  Marimuthu Palaniswami and
                  Subhrakanti Dey},
  editor       = {Jens Grossklags and
                  Jean C. Walrand},
  title        = {Security Games and Risk Minimization for Automatic Generation Control
                  in Smart Grid},
  booktitle    = {Decision and Game Theory for Security - Third International Conference,
                  GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7638},
  pages        = {281--295},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34266-0\_17},
  doi          = {10.1007/978-3-642-34266-0\_17},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/LawAPD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/LinLJ12,
  author       = {Jingqiang Lin and
                  Peng Liu and
                  Jiwu Jing},
  editor       = {Jens Grossklags and
                  Jean C. Walrand},
  title        = {Using Signaling Games to Model the Multi-step Attack-Defense Scenarios
                  on Confidentiality},
  booktitle    = {Decision and Game Theory for Security - Third International Conference,
                  GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7638},
  pages        = {118--137},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34266-0\_7},
  doi          = {10.1007/978-3-642-34266-0\_7},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/LinLJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/NixK12,
  author       = {Robert Nix and
                  Murat Kantarcioglu},
  editor       = {Jens Grossklags and
                  Jean C. Walrand},
  title        = {Contractual Agreement Design for Enforcing Honesty in Cloud Outsourcing},
  booktitle    = {Decision and Game Theory for Security - Third International Conference,
                  GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7638},
  pages        = {296--308},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34266-0\_18},
  doi          = {10.1007/978-3-642-34266-0\_18},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/NixK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/NochensonH12,
  author       = {Alan Nochenson and
                  C. F. Larry Heimann},
  editor       = {Jens Grossklags and
                  Jean C. Walrand},
  title        = {Simulation and Game-Theoretic Analysis of an Attacker-Defender Game},
  booktitle    = {Decision and Game Theory for Security - Third International Conference,
                  GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7638},
  pages        = {138--151},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34266-0\_8},
  doi          = {10.1007/978-3-642-34266-0\_8},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/NochensonH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/NojoumianS12,
  author       = {Mehrdad Nojoumian and
                  Douglas R. Stinson},
  editor       = {Jens Grossklags and
                  Jean C. Walrand},
  title        = {Socio-Rational Secret Sharing as a New Direction in Rational Cryptography},
  booktitle    = {Decision and Game Theory for Security - Third International Conference,
                  GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7638},
  pages        = {18--37},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34266-0\_2},
  doi          = {10.1007/978-3-642-34266-0\_2},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/NojoumianS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/PhamC12,
  author       = {Viet Pham and
                  Carlos Cid},
  editor       = {Jens Grossklags and
                  Jean C. Walrand},
  title        = {Are We Compromised? Modelling Security Assessment Games},
  booktitle    = {Decision and Game Theory for Security - Third International Conference,
                  GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7638},
  pages        = {234--247},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34266-0\_14},
  doi          = {10.1007/978-3-642-34266-0\_14},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/PhamC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/PibilLKBP12,
  author       = {Radek P{\'{\i}}bil and
                  Viliam Lis{\'{y}} and
                  Christopher Kiekintveld and
                  Branislav Bosansk{\'{y}} and
                  Michal Pechoucek},
  editor       = {Jens Grossklags and
                  Jean C. Walrand},
  title        = {Game Theoretic Model of Strategic Honeypot Selection in Computer Networks},
  booktitle    = {Decision and Game Theory for Security - Third International Conference,
                  GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7638},
  pages        = {201--220},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34266-0\_12},
  doi          = {10.1007/978-3-642-34266-0\_12},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/PibilLKBP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/gamesec/2012,
  editor       = {Jens Grossklags and
                  Jean C. Walrand},
  title        = {Decision and Game Theory for Security - Third International Conference,
                  GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7638},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34266-0},
  doi          = {10.1007/978-3-642-34266-0},
  isbn         = {978-3-642-34265-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/AlpcanLS11,
  author       = {Tansu Alpcan and
                  Albert Levi and
                  Erkay Savas},
  editor       = {John S. Baras and
                  Jonathan Katz and
                  Eitan Altman},
  title        = {Digital Trust Games: An Experimental Study},
  booktitle    = {Decision and Game Theory for Security - Second International Conference,
                  GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7037},
  pages        = {182--200},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25280-8\_15},
  doi          = {10.1007/978-3-642-25280-8\_15},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/AlpcanLS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/BonaciB11,
  author       = {Tamara Bonaci and
                  Linda Bushnell},
  editor       = {John S. Baras and
                  Jonathan Katz and
                  Eitan Altman},
  title        = {Node Capture Games: {A} Game Theoretic Approach to Modeling and Mitigating
                  Node Capture Attacks},
  booktitle    = {Decision and Game Theory for Security - Second International Conference,
                  GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7037},
  pages        = {44--55},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25280-8\_6},
  doi          = {10.1007/978-3-642-25280-8\_6},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/BonaciB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/ChiaC11,
  author       = {Pern Hui Chia and
                  John Chuang},
  editor       = {John S. Baras and
                  Jonathan Katz and
                  Eitan Altman},
  title        = {Colonel Blotto in the Phishing War},
  booktitle    = {Decision and Game Theory for Security - Second International Conference,
                  GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7037},
  pages        = {201--218},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25280-8\_16},
  doi          = {10.1007/978-3-642-25280-8\_16},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/ChiaC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/Christin11,
  author       = {Nicolas Christin},
  editor       = {John S. Baras and
                  Jonathan Katz and
                  Eitan Altman},
  title        = {Network Security Games: Combining Game Theory, Behavioral Economics,
                  and Network Measurements},
  booktitle    = {Decision and Game Theory for Security - Second International Conference,
                  GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7037},
  pages        = {4--6},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25280-8\_2},
  doi          = {10.1007/978-3-642-25280-8\_2},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/Christin11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/ClarkP11,
  author       = {Andrew Clark and
                  Radha Poovendran},
  editor       = {John S. Baras and
                  Jonathan Katz and
                  Eitan Altman},
  title        = {Maximizing Influence in Competitive Environments: {A} Game-Theoretic
                  Approach},
  booktitle    = {Decision and Game Theory for Security - Second International Conference,
                  GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7037},
  pages        = {151--162},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25280-8\_13},
  doi          = {10.1007/978-3-642-25280-8\_13},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/ClarkP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/FokkinkS11,
  author       = {Robbert Fokkink and
                  Misha Stassen},
  editor       = {John S. Baras and
                  Jonathan Katz and
                  Eitan Altman},
  title        = {An Asymptotic Solution of Dresher's Guessing Game},
  booktitle    = {Decision and Game Theory for Security - Second International Conference,
                  GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7037},
  pages        = {104--116},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25280-8\_10},
  doi          = {10.1007/978-3-642-25280-8\_10},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/FokkinkS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/GhaniT11,
  author       = {Ahmad Termimi Ab Ghani and
                  Kazuyuki Tanaka},
  editor       = {John S. Baras and
                  Jonathan Katz and
                  Eitan Altman},
  title        = {Network Games with and without Synchroneity},
  booktitle    = {Decision and Game Theory for Security - Second International Conference,
                  GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7037},
  pages        = {87--103},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25280-8\_9},
  doi          = {10.1007/978-3-642-25280-8\_9},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/GhaniT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/Halpern11,
  author       = {Joseph Y. Halpern},
  editor       = {John S. Baras and
                  Jonathan Katz and
                  Eitan Altman},
  title        = {Beyond Nash Equilibrium: Solution Concepts for the 21st Century},
  booktitle    = {Decision and Game Theory for Security - Second International Conference,
                  GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7037},
  pages        = {1--3},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25280-8\_1},
  doi          = {10.1007/978-3-642-25280-8\_1},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/Halpern11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/JohnsonBG11,
  author       = {Benjamin Johnson and
                  Rainer B{\"{o}}hme and
                  Jens Grossklags},
  editor       = {John S. Baras and
                  Jonathan Katz and
                  Eitan Altman},
  title        = {Security Games with Market Insurance},
  booktitle    = {Decision and Game Theory for Security - Second International Conference,
                  GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7037},
  pages        = {117--130},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25280-8\_11},
  doi          = {10.1007/978-3-642-25280-8\_11},
  timestamp    = {Mon, 18 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/JohnsonBG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/KantarciogluBH11,
  author       = {Murat Kantarcioglu and
                  Alain Bensoussan and
                  SingRu Celine Hoe},
  editor       = {John S. Baras and
                  Jonathan Katz and
                  Eitan Altman},
  title        = {Investment in Privacy-Preserving Technologies under Uncertainty},
  booktitle    = {Decision and Game Theory for Security - Second International Conference,
                  GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7037},
  pages        = {219--238},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25280-8\_17},
  doi          = {10.1007/978-3-642-25280-8\_17},
  timestamp    = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/KantarciogluBH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/MailleRT11,
  author       = {Patrick Maill{\'{e}} and
                  Peter Reichl and
                  Bruno Tuffin},
  editor       = {John S. Baras and
                  Jonathan Katz and
                  Eitan Altman},
  title        = {Interplay between Security Providers, Consumers, and Attackers: {A}
                  Weighted Congestion Game Approach},
  booktitle    = {Decision and Game Theory for Security - Second International Conference,
                  GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7037},
  pages        = {67--86},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25280-8\_8},
  doi          = {10.1007/978-3-642-25280-8\_8},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/MailleRT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/PalGP11,
  author       = {Ranjan Pal and
                  Leana Golubchik and
                  Konstantinos Psounis},
  editor       = {John S. Baras and
                  Jonathan Katz and
                  Eitan Altman},
  title        = {Aegis {A} Novel Cyber-Insurance Model},
  booktitle    = {Decision and Game Theory for Security - Second International Conference,
                  GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7037},
  pages        = {131--150},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25280-8\_12},
  doi          = {10.1007/978-3-642-25280-8\_12},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/PalGP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/PalH11,
  author       = {Ranjan Pal and
                  Pan Hui},
  editor       = {John S. Baras and
                  Jonathan Katz and
                  Eitan Altman},
  title        = {Modeling Internet Security Investments: Tackling Topological Information
                  Uncertainty},
  booktitle    = {Decision and Game Theory for Security - Second International Conference,
                  GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7037},
  pages        = {239--257},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25280-8\_18},
  doi          = {10.1007/978-3-642-25280-8\_18},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/PalH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/SantosHSH11,
  author       = {Francisco Santos and
                  Mathias Humbert and
                  Reza Shokri and
                  Jean{-}Pierre Hubaux},
  editor       = {John S. Baras and
                  Jonathan Katz and
                  Eitan Altman},
  title        = {Collaborative Location Privacy with Rational Users},
  booktitle    = {Decision and Game Theory for Security - Second International Conference,
                  GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7037},
  pages        = {163--181},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25280-8\_14},
  doi          = {10.1007/978-3-642-25280-8\_14},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/SantosHSH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/SodagariC11,
  author       = {Shabnam Sodagari and
                  T. Charles Clancy},
  editor       = {John S. Baras and
                  Jonathan Katz and
                  Eitan Altman},
  title        = {An Anti-jamming Strategy for Channel Access in Cognitive Radio Networks},
  booktitle    = {Decision and Game Theory for Security - Second International Conference,
                  GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7037},
  pages        = {34--43},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25280-8\_5},
  doi          = {10.1007/978-3-642-25280-8\_5},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/SodagariC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/StoccoC11,
  author       = {Gabriel Fortunato Stocco and
                  George Cybenko},
  editor       = {John S. Baras and
                  Jonathan Katz and
                  Eitan Altman},
  title        = {Exploiting Adversary's Risk Profiles in Imperfect Information Security
                  Games},
  booktitle    = {Decision and Game Theory for Security - Second International Conference,
                  GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7037},
  pages        = {22--33},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25280-8\_4},
  doi          = {10.1007/978-3-642-25280-8\_4},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/StoccoC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/Szajowski11,
  author       = {Krzysztof Szajowski},
  editor       = {John S. Baras and
                  Jonathan Katz and
                  Eitan Altman},
  title        = {Multi-variate Quickest Detection of Significant Change Process},
  booktitle    = {Decision and Game Theory for Security - Second International Conference,
                  GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7037},
  pages        = {56--66},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25280-8\_7},
  doi          = {10.1007/978-3-642-25280-8\_7},
  timestamp    = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/Szajowski11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/ZhuB11,
  author       = {Quanyan Zhu and
                  Tamer Basar},
  editor       = {John S. Baras and
                  Jonathan Katz and
                  Eitan Altman},
  title        = {Indices of Power in Optimal {IDS} Default Configuration: Theory and
                  Examples},
  booktitle    = {Decision and Game Theory for Security - Second International Conference,
                  GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7037},
  pages        = {7--21},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25280-8\_3},
  doi          = {10.1007/978-3-642-25280-8\_3},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/ZhuB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/gamesec/2011,
  editor       = {John S. Baras and
                  Jonathan Katz and
                  Eitan Altman},
  title        = {Decision and Game Theory for Security - Second International Conference,
                  GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7037},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25280-8},
  doi          = {10.1007/978-3-642-25280-8},
  isbn         = {978-3-642-25279-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/AlpernFKL10,
  author       = {Steve Alpern and
                  Robbert Fokkink and
                  Joram op den Kelder and
                  Tom Lidbetter},
  editor       = {Tansu Alpcan and
                  Levente Butty{\'{a}}n and
                  John S. Baras},
  title        = {Disperse or Unite? {A} Mathematical Model of Coordinated Attack},
  booktitle    = {Decision and Game Theory for Security - First International Conference,
                  GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6442},
  pages        = {220--233},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17197-0\_15},
  doi          = {10.1007/978-3-642-17197-0\_15},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/AlpernFKL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/AltmanABTS10,
  author       = {Eitan Altman and
                  Alireza Aram and
                  Tamer Basar and
                  Corinne Touati and
                  Saswati Sarkar},
  editor       = {Tansu Alpcan and
                  Levente Butty{\'{a}}n and
                  John S. Baras},
  title        = {Robust Control in Sparse Mobile Ad-Hoc Networks},
  booktitle    = {Decision and Game Theory for Security - First International Conference,
                  GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6442},
  pages        = {123--134},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17197-0\_8},
  doi          = {10.1007/978-3-642-17197-0\_8},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/AltmanABTS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/AltmanBK10,
  author       = {Eitan Altman and
                  Tamer Basar and
                  Veeraruna Kavitha},
  editor       = {Tansu Alpcan and
                  Levente Butty{\'{a}}n and
                  John S. Baras},
  title        = {Adversarial Control in a Delay Tolerant Network},
  booktitle    = {Decision and Game Theory for Security - First International Conference,
                  GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6442},
  pages        = {87--106},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17197-0\_6},
  doi          = {10.1007/978-3-642-17197-0\_6},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/AltmanBK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/AminSS10,
  author       = {Saurabh Amin and
                  Galina A. Schwartz and
                  S. Shankar Sastry},
  editor       = {Tansu Alpcan and
                  Levente Butty{\'{a}}n and
                  John S. Baras},
  title        = {Security Interdependencies for Networked Control Systems with Identical
                  Agents},
  booktitle    = {Decision and Game Theory for Security - First International Conference,
                  GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6442},
  pages        = {107--122},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17197-0\_7},
  doi          = {10.1007/978-3-642-17197-0\_7},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/AminSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/BensoussanKH10,
  author       = {Alain Bensoussan and
                  Murat Kantarcioglu and
                  SingRu Celine Hoe},
  editor       = {Tansu Alpcan and
                  Levente Butty{\'{a}}n and
                  John S. Baras},
  title        = {A Game-Theoretical Approach for Finding Optimal Strategies in a Botnet
                  Defense Model},
  booktitle    = {Decision and Game Theory for Security - First International Conference,
                  GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6442},
  pages        = {135--148},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17197-0\_9},
  doi          = {10.1007/978-3-642-17197-0\_9},
  timestamp    = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/BensoussanKH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/BohmeF10,
  author       = {Rainer B{\"{o}}hme and
                  M{\'{a}}rk F{\'{e}}legyh{\'{a}}zi},
  editor       = {Tansu Alpcan and
                  Levente Butty{\'{a}}n and
                  John S. Baras},
  title        = {Optimal Information Security Investment with Penetration Testing},
  booktitle    = {Decision and Game Theory for Security - First International Conference,
                  GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6442},
  pages        = {21--37},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17197-0\_2},
  doi          = {10.1007/978-3-642-17197-0\_2},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/BohmeF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/GattiMS10,
  author       = {Nicola Gatti and
                  Mattia Monga and
                  Sabrina Sicari},
  editor       = {Tansu Alpcan and
                  Levente Butty{\'{a}}n and
                  John S. Baras},
  title        = {A Localization Game in Wireless Sensor Networks},
  booktitle    = {Decision and Game Theory for Security - First International Conference,
                  GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6442},
  pages        = {168--179},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17197-0\_11},
  doi          = {10.1007/978-3-642-17197-0\_11},
  timestamp    = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/GattiMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/GueyeWA10,
  author       = {Assane Gueye and
                  Jean C. Walrand and
                  Venkat Anantharam},
  editor       = {Tansu Alpcan and
                  Levente Butty{\'{a}}n and
                  John S. Baras},
  title        = {Design of Network Topology in an Adversarial Environment},
  booktitle    = {Decision and Game Theory for Security - First International Conference,
                  GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6442},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17197-0\_1},
  doi          = {10.1007/978-3-642-17197-0\_1},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/GueyeWA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/HumbertMFH10,
  author       = {Mathias Humbert and
                  Mohammad Hossein Manshaei and
                  Julien Freudiger and
                  Jean{-}Pierre Hubaux},
  editor       = {Tansu Alpcan and
                  Levente Butty{\'{a}}n and
                  John S. Baras},
  title        = {Tracking Games in Mobile Networks},
  booktitle    = {Decision and Game Theory for Security - First International Conference,
                  GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6442},
  pages        = {38--57},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17197-0\_3},
  doi          = {10.1007/978-3-642-17197-0\_3},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/HumbertMFH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/JohnsonGCC10,
  author       = {Benjamin Johnson and
                  Jens Grossklags and
                  Nicolas Christin and
                  John Chuang},
  editor       = {Tansu Alpcan and
                  Levente Butty{\'{a}}n and
                  John S. Baras},
  title        = {Uncertainty in Interdependent Security Games},
  booktitle    = {Decision and Game Theory for Security - First International Conference,
                  GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6442},
  pages        = {234--244},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17197-0\_16},
  doi          = {10.1007/978-3-642-17197-0\_16},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/JohnsonGCC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/KantarciogluBH10,
  author       = {Murat Kantarcioglu and
                  Alain Bensoussan and
                  SingRu Celine Hoe},
  editor       = {Tansu Alpcan and
                  Levente Butty{\'{a}}n and
                  John S. Baras},
  title        = {When Do Firms Invest in Privacy-Preserving Technologies?},
  booktitle    = {Decision and Game Theory for Security - First International Conference,
                  GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6442},
  pages        = {72--86},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17197-0\_5},
  doi          = {10.1007/978-3-642-17197-0\_5},
  timestamp    = {Tue, 05 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/KantarciogluBH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/KiekintveldMT10,
  author       = {Christopher Kiekintveld and
                  Janusz Marecki and
                  Milind Tambe},
  editor       = {Tansu Alpcan and
                  Levente Butty{\'{a}}n and
                  John S. Baras},
  title        = {Methods and Algorithms for Infinite Bayesian Stackelberg Security
                  Games - (Extended Abstract)},
  booktitle    = {Decision and Game Theory for Security - First International Conference,
                  GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6442},
  pages        = {257--265},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17197-0\_18},
  doi          = {10.1007/978-3-642-17197-0\_18},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/KiekintveldMT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/KordyMMS10,
  author       = {Barbara Kordy and
                  Sjouke Mauw and
                  Matthijs Melissen and
                  Patrick Schweitzer},
  editor       = {Tansu Alpcan and
                  Levente Butty{\'{a}}n and
                  John S. Baras},
  title        = {Attack-Defense Trees and Two-Player Binary Zero-Sum Extensive Form
                  Games Are Equivalent},
  booktitle    = {Decision and Game Theory for Security - First International Conference,
                  GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6442},
  pages        = {245--256},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17197-0\_17},
  doi          = {10.1007/978-3-642-17197-0\_17},
  timestamp    = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/KordyMMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/PreibuschB10,
  author       = {S{\"{o}}ren Preibusch and
                  Joseph Bonneau},
  editor       = {Tansu Alpcan and
                  Levente Butty{\'{a}}n and
                  John S. Baras},
  title        = {The Password Game: Negative Externalities from Weak Password Practices},
  booktitle    = {Decision and Game Theory for Security - First International Conference,
                  GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6442},
  pages        = {192--207},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17197-0\_13},
  doi          = {10.1007/978-3-642-17197-0\_13},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/PreibuschB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/SalimRDD10,
  author       = {Farzad Salim and
                  Jason Reid and
                  Uwe Dulleck and
                  Ed Dawson},
  editor       = {Tansu Alpcan and
                  Levente Butty{\'{a}}n and
                  John S. Baras},
  title        = {Towards a Game Theoretic Authorisation Model},
  booktitle    = {Decision and Game Theory for Security - First International Conference,
                  GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6442},
  pages        = {208--219},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17197-0\_14},
  doi          = {10.1007/978-3-642-17197-0\_14},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/SalimRDD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/VolpattoMZ10,
  author       = {Alberto Volpatto and
                  Federico Maggi and
                  Stefano Zanero},
  editor       = {Tansu Alpcan and
                  Levente Butty{\'{a}}n and
                  John S. Baras},
  title        = {Effective Multimodel Anomaly Detection Using Cooperative Negotiation},
  booktitle    = {Decision and Game Theory for Security - First International Conference,
                  GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6442},
  pages        = {180--191},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17197-0\_12},
  doi          = {10.1007/978-3-642-17197-0\_12},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/VolpattoMZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/VratonjicMRH10,
  author       = {Nevena Vratonjic and
                  Mohammad Hossein Manshaei and
                  Maxim Raya and
                  Jean{-}Pierre Hubaux},
  editor       = {Tansu Alpcan and
                  Levente Butty{\'{a}}n and
                  John S. Baras},
  title        = {ISPs and Ad Networks Against Botnet Ad Fraud},
  booktitle    = {Decision and Game Theory for Security - First International Conference,
                  GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6442},
  pages        = {149--167},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17197-0\_10},
  doi          = {10.1007/978-3-642-17197-0\_10},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/VratonjicMRH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/ZhangYFD10,
  author       = {Nan Zhang and
                  Wei Yu and
                  Xinwen Fu and
                  Sajal K. Das},
  editor       = {Tansu Alpcan and
                  Levente Butty{\'{a}}n and
                  John S. Baras},
  title        = {gPath: {A} Game-Theoretic Path Selection Algorithm to Protect Tor's
                  Anonymity},
  booktitle    = {Decision and Game Theory for Security - First International Conference,
                  GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6442},
  pages        = {58--71},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17197-0\_4},
  doi          = {10.1007/978-3-642-17197-0\_4},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/ZhangYFD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/gamesec/2010,
  editor       = {Tansu Alpcan and
                  Levente Butty{\'{a}}n and
                  John S. Baras},
  title        = {Decision and Game Theory for Security - First International Conference,
                  GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6442},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17197-0},
  doi          = {10.1007/978-3-642-17197-0},
  isbn         = {978-3-642-17196-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}