default search action
Search dblp for Publications
export results for "stream:conf/gamesec:"
@proceedings{DBLP:conf/gamesec/2024, editor = {Arunesh Sinha and Jie Fu and Quanyan Zhu and Tao Zhang}, title = {Decision and Game Theory for Security - 15th International Conference, GameSec 2024, New York City, NY, USA, October 16-18, 2024, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14908}, publisher = {Springer}, year = {2025}, url = {https://doi.org/10.1007/978-3-031-74835-6}, doi = {10.1007/978-3-031-74835-6}, isbn = {978-3-031-74834-9}, timestamp = {Thu, 17 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/2024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/BanikBH24, author = {Sandeep Banik and Shaunak D. Bopardikar and Naira Hovakimyan}, editor = {Arunesh Sinha and Jie Fu and Quanyan Zhu and Tao Zhang}, title = {FlipDyn in Graphs: Resource Takeover Games in Graphs}, booktitle = {Decision and Game Theory for Security - 15th International Conference, GameSec 2024, New York City, NY, USA, October 16-18, 2024, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14908}, pages = {220--239}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-74835-6\_11}, doi = {10.1007/978-3-031-74835-6\_11}, timestamp = {Tue, 22 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/BanikBH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/CernyLCZFKI24, author = {Jakub Cern{\'{y}} and Chun Kai Ling and Darshan Chakrabarti and Jingwen Zhang and Gabriele Farina and Christian Kroer and Garud Iyengar}, editor = {Arunesh Sinha and Jie Fu and Quanyan Zhu and Tao Zhang}, title = {Contested Logistics: {A} Game-Theoretic Approach}, booktitle = {Decision and Game Theory for Security - 15th International Conference, GameSec 2024, New York City, NY, USA, October 16-18, 2024, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14908}, pages = {124--146}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-74835-6\_7}, doi = {10.1007/978-3-031-74835-6\_7}, timestamp = {Wed, 16 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/CernyLCZFKI24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/EbrahimiN24, author = {Raman Ebrahimi and Parinaz Naghizadeh}, editor = {Arunesh Sinha and Jie Fu and Quanyan Zhu and Tao Zhang}, title = {Extended Horizons: Multi-hop Awareness in Network Games}, booktitle = {Decision and Game Theory for Security - 15th International Conference, GameSec 2024, New York City, NY, USA, October 16-18, 2024, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14908}, pages = {201--219}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-74835-6\_10}, doi = {10.1007/978-3-031-74835-6\_10}, timestamp = {Wed, 16 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/EbrahimiN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/FrankPB24, author = {Marcell Frank and Bal{\'{a}}zs Pej{\'{o}} and Gergely Bicz{\'{o}}k}, editor = {Arunesh Sinha and Jie Fu and Quanyan Zhu and Tao Zhang}, title = {Effective Anonymous Messaging: The Role of Altruism}, booktitle = {Decision and Game Theory for Security - 15th International Conference, GameSec 2024, New York City, NY, USA, October 16-18, 2024, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14908}, pages = {240--259}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-74835-6\_12}, doi = {10.1007/978-3-031-74835-6\_12}, timestamp = {Wed, 16 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/FrankPB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/GalinkinPM24, author = {Erick Galinkin and Emmanouil Pountourakis and Spiros Mancoridis}, editor = {Arunesh Sinha and Jie Fu and Quanyan Zhu and Tao Zhang}, title = {The Price of Pessimism for Automated Defense}, booktitle = {Decision and Game Theory for Security - 15th International Conference, GameSec 2024, New York City, NY, USA, October 16-18, 2024, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14908}, pages = {45--64}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-74835-6\_3}, doi = {10.1007/978-3-031-74835-6\_3}, timestamp = {Tue, 22 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/GalinkinPM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/Ganzfried24, author = {Sam Ganzfried}, editor = {Arunesh Sinha and Jie Fu and Quanyan Zhu and Tao Zhang}, title = {Fast Complete Algorithm for Multiplayer Nash Equilibrium}, booktitle = {Decision and Game Theory for Security - 15th International Conference, GameSec 2024, New York City, NY, USA, October 16-18, 2024, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14908}, pages = {109--123}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-74835-6\_6}, doi = {10.1007/978-3-031-74835-6\_6}, timestamp = {Wed, 16 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/Ganzfried24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/GeZ24, author = {Yunfei Ge and Quanyan Zhu}, editor = {Arunesh Sinha and Jie Fu and Quanyan Zhu and Tao Zhang}, title = {{MEGA-PT:} {A} Meta-game Framework for Agile Penetration Testing}, booktitle = {Decision and Game Theory for Security - 15th International Conference, GameSec 2024, New York City, NY, USA, October 16-18, 2024, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14908}, pages = {24--44}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-74835-6\_2}, doi = {10.1007/978-3-031-74835-6\_2}, timestamp = {Wed, 16 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/GeZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/HammarS24, author = {Kim Hammar and Rolf Stadler}, editor = {Arunesh Sinha and Jie Fu and Quanyan Zhu and Tao Zhang}, title = {Intrusion Tolerance as a Two-Level Game}, booktitle = {Decision and Game Theory for Security - 15th International Conference, GameSec 2024, New York City, NY, USA, October 16-18, 2024, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14908}, pages = {3--23}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-74835-6\_1}, doi = {10.1007/978-3-031-74835-6\_1}, timestamp = {Tue, 22 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/HammarS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/KumariJJM24, author = {Kavita Kumari and Murtuza Jadliwala and Sumit Kumar Jha and Anindya Maiti}, editor = {Arunesh Sinha and Jie Fu and Quanyan Zhu and Tao Zhang}, title = {Towards a Game-Theoretic Understanding of Explanation-Based Membership Inference Attacks}, booktitle = {Decision and Game Theory for Security - 15th International Conference, GameSec 2024, New York City, NY, USA, October 16-18, 2024, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14908}, pages = {263--283}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-74835-6\_13}, doi = {10.1007/978-3-031-74835-6\_13}, timestamp = {Wed, 16 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/KumariJJM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/LiL24, author = {Zhen Li and Qi Liao}, editor = {Arunesh Sinha and Jie Fu and Quanyan Zhu and Tao Zhang}, title = {How Much Should {I} Double Spend My Bitcoin? Game Theory of Quantum Mining}, booktitle = {Decision and Game Theory for Security - 15th International Conference, GameSec 2024, New York City, NY, USA, October 16-18, 2024, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14908}, pages = {87--106}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-74835-6\_5}, doi = {10.1007/978-3-031-74835-6\_5}, timestamp = {Wed, 16 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/LiL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/NeupaneBNRDMENC24, author = {Roshan Lal Neupane and Bishnu Bhusal and Kiran Neupane and Preyea Regmi and Tam Dinh and Lilliana Marrero and Sayed M. Saghaian N. E. and Venkata Sriram Siddhardh Nadendla and Prasad Calyam}, editor = {Arunesh Sinha and Jie Fu and Quanyan Zhu and Tao Zhang}, title = {On Countering Ransomware Attacks Using Strategic Deception}, booktitle = {Decision and Game Theory for Security - 15th International Conference, GameSec 2024, New York City, NY, USA, October 16-18, 2024, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14908}, pages = {149--176}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-74835-6\_8}, doi = {10.1007/978-3-031-74835-6\_8}, timestamp = {Wed, 06 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/NeupaneBNRDMENC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/NooraniPZMGB24, author = {Mahshid Noorani and Tharun V. Puthanveettil and Asim Zoulkarni and Jack Mirenzi and Charles D. Grody and John S. Baras}, editor = {Arunesh Sinha and Jie Fu and Quanyan Zhu and Tao Zhang}, title = {Multimodal Anomaly Detection for Autonomous Cyber-Physical Systems Empowering Real-World Evaluation}, booktitle = {Decision and Game Theory for Security - 15th International Conference, GameSec 2024, New York City, NY, USA, October 16-18, 2024, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14908}, pages = {306--325}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-74835-6\_15}, doi = {10.1007/978-3-031-74835-6\_15}, timestamp = {Wed, 16 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/NooraniPZMGB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/PflugelR24, author = {Eckhard Pfl{\"{u}}gel and Stefan Rass}, editor = {Arunesh Sinha and Jie Fu and Quanyan Zhu and Tao Zhang}, title = {Ransom Roulette: Learning the Games Behind Cyber Extortion}, booktitle = {Decision and Game Theory for Security - 15th International Conference, GameSec 2024, New York City, NY, USA, October 16-18, 2024, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14908}, pages = {67--86}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-74835-6\_4}, doi = {10.1007/978-3-031-74835-6\_4}, timestamp = {Tue, 22 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/PflugelR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/ProbineKT24, author = {Caleb Probine and Mustafa O. Karabag and Ufuk Topcu}, editor = {Arunesh Sinha and Jie Fu and Quanyan Zhu and Tao Zhang}, title = {A Decentralized Shotgun Approach for Team Deception}, booktitle = {Decision and Game Theory for Security - 15th International Conference, GameSec 2024, New York City, NY, USA, October 16-18, 2024, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14908}, pages = {177--197}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-74835-6\_9}, doi = {10.1007/978-3-031-74835-6\_9}, timestamp = {Wed, 16 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/ProbineKT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/ZoulkarniDKB24, author = {Asim Zoulkarni and Sai Sandeep Damera and M. S. Praveen Kumar and John S. Baras}, editor = {Arunesh Sinha and Jie Fu and Quanyan Zhu and Tao Zhang}, title = {Defending Against {APT} Attacks in Robots: {A} Multi-phase Game-Theoretical Approach}, booktitle = {Decision and Game Theory for Security - 15th International Conference, GameSec 2024, New York City, NY, USA, October 16-18, 2024, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14908}, pages = {287--305}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-74835-6\_14}, doi = {10.1007/978-3-031-74835-6\_14}, timestamp = {Wed, 16 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/ZoulkarniDKB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/AdamsCA23, author = {Takuma Adams and Andrew C. Cullen and Tansu Alpcan}, editor = {Jie Fu and Tom{\'{a}}s Kroupa and Yezekael Hayel}, title = {Quantisation Effects in Adversarial Cyber-Physical Games}, booktitle = {Decision and Game Theory for Security: 14th International Conference, GameSec 2023, Avignon, France, October 18-20, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14167}, pages = {153--171}, publisher = {Springe}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-50670-3\_8}, doi = {10.1007/978-3-031-50670-3\_8}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/AdamsCA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/CrompBGS23, author = {Sonia Cromp and Mark Bilinski and Ryan Gabrys and Frederic Sala}, editor = {Jie Fu and Tom{\'{a}}s Kroupa and Yezekael Hayel}, title = {The Credential is Not Enough: Deception with Honeypots and Fake Credentials}, booktitle = {Decision and Game Theory for Security: 14th International Conference, GameSec 2023, Avignon, France, October 18-20, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14167}, pages = {234--254}, publisher = {Springe}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-50670-3\_12}, doi = {10.1007/978-3-031-50670-3\_12}, timestamp = {Tue, 22 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/CrompBGS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/Ganzfried23, author = {Sam Ganzfried}, editor = {Jie Fu and Tom{\'{a}}s Kroupa and Yezekael Hayel}, title = {Observable Perfect Equilibrium}, booktitle = {Decision and Game Theory for Security: 14th International Conference, GameSec 2023, Avignon, France, October 18-20, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14167}, pages = {3--22}, publisher = {Springe}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-50670-3\_1}, doi = {10.1007/978-3-031-50670-3\_1}, timestamp = {Wed, 02 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/Ganzfried23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/HammarS23, author = {Kim Hammar and Rolf Stadler}, editor = {Jie Fu and Tom{\'{a}}s Kroupa and Yezekael Hayel}, title = {Scalable Learning of Intrusion Response Through Recursive Decomposition}, booktitle = {Decision and Game Theory for Security: 14th International Conference, GameSec 2023, Avignon, France, October 18-20, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14167}, pages = {172--192}, publisher = {Springe}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-50670-3\_9}, doi = {10.1007/978-3-031-50670-3\_9}, timestamp = {Wed, 02 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/HammarS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/HenaffC23, author = {Jean Le H{\'{e}}naff and H{\'{e}}l{\`{e}}ne Le Cadre}, editor = {Jie Fu and Tom{\'{a}}s Kroupa and Yezekael Hayel}, title = {Modeling and Analysis of a Nonlinear Security Game with Mixed Armament}, booktitle = {Decision and Game Theory for Security: 14th International Conference, GameSec 2023, Avignon, France, October 18-20, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14167}, pages = {369--388}, publisher = {Springe}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-50670-3\_19}, doi = {10.1007/978-3-031-50670-3\_19}, timestamp = {Wed, 02 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/HenaffC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/JohnsonYuFWVSTT23, author = {Sonja Johnson{-}Yu and Jessie Finocchiaro and Kai Wang and Yevgeniy Vorobeychik and Arunesh Sinha and Aparna Taneja and Milind Tambe}, editor = {Jie Fu and Tom{\'{a}}s Kroupa and Yezekael Hayel}, title = {Characterizing and Improving the Robustness of Predict-Then-Optimize Frameworks}, booktitle = {Decision and Game Theory for Security: 14th International Conference, GameSec 2023, Avignon, France, October 18-20, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14167}, pages = {133--152}, publisher = {Springe}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-50670-3\_7}, doi = {10.1007/978-3-031-50670-3\_7}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/JohnsonYuFWVSTT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/KouamHDTK23, author = {Willie Kouam and Yezekael Hayel and Gabriel Deugoue and Olivier Tsemogne and Charles A. Kamhoua}, editor = {Jie Fu and Tom{\'{a}}s Kroupa and Yezekael Hayel}, title = {Asymmetric Centrality Game Against Network Epidemic Propagation}, booktitle = {Decision and Game Theory for Security: 14th International Conference, GameSec 2023, Avignon, France, October 18-20, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14167}, pages = {86--109}, publisher = {Springe}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-50670-3\_5}, doi = {10.1007/978-3-031-50670-3\_5}, timestamp = {Tue, 22 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/KouamHDTK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/LiL23, author = {Zhen Li and Qi Liao}, editor = {Jie Fu and Tom{\'{a}}s Kroupa and Yezekael Hayel}, title = {Does Cyber-Insurance Benefit the Insured or the Attacker? - {A} Game of Cyber-Insurance}, booktitle = {Decision and Game Theory for Security: 14th International Conference, GameSec 2023, Avignon, France, October 18-20, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14167}, pages = {23--42}, publisher = {Springe}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-50670-3\_2}, doi = {10.1007/978-3-031-50670-3\_2}, timestamp = {Wed, 02 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/LiL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/MaHKF23, author = {Haoxiang Ma and Shuo Han and Charles A. Kamhoua and Jie Fu}, editor = {Jie Fu and Tom{\'{a}}s Kroupa and Yezekael Hayel}, title = {Optimal Resource Allocation for Proactive Defense with Deception in Probabilistic Attack Graphs}, booktitle = {Decision and Game Theory for Security: 14th International Conference, GameSec 2023, Avignon, France, October 18-20, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14167}, pages = {215--233}, publisher = {Springe}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-50670-3\_11}, doi = {10.1007/978-3-031-50670-3\_11}, timestamp = {Tue, 22 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/MaHKF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/MaheshBDT23, author = {Shivakumar Mahesh and Nicholas Bishop and Le Cong Dinh and Long Tran{-}Thanh}, editor = {Jie Fu and Tom{\'{a}}s Kroupa and Yezekael Hayel}, title = {Playing Repeated Coopetitive Polymatrix Games with Small Manipulation Cost}, booktitle = {Decision and Game Theory for Security: 14th International Conference, GameSec 2023, Avignon, France, October 18-20, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14167}, pages = {257--276}, publisher = {Springe}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-50670-3\_13}, doi = {10.1007/978-3-031-50670-3\_13}, timestamp = {Wed, 02 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/MaheshBDT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/MeursCC23, author = {Tom Meurs and Edward J. Cartwright and Anna Cartwright}, editor = {Jie Fu and Tom{\'{a}}s Kroupa and Yezekael Hayel}, title = {Double-Sided Information Asymmetry in Double Extortion Ransomware}, booktitle = {Decision and Game Theory for Security: 14th International Conference, GameSec 2023, Avignon, France, October 18-20, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14167}, pages = {311--328}, publisher = {Springe}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-50670-3\_16}, doi = {10.1007/978-3-031-50670-3\_16}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/MeursCC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/MvahTDATK23, author = {Fabrice Mvah and Vianney Kengne Tchendji and Cl{\'{e}}mentin Tayou Djam{\'{e}}gni and Ahmed H. Anwar and Deepak K. Tosh and Charles A. Kamhoua}, editor = {Jie Fu and Tom{\'{a}}s Kroupa and Yezekael Hayel}, title = {FlipPath Game to Counter Stealthy Attacks in SDN-Based Tactical Networks}, booktitle = {Decision and Game Theory for Security: 14th International Conference, GameSec 2023, Avignon, France, October 18-20, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14167}, pages = {294--308}, publisher = {Springe}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-50670-3\_15}, doi = {10.1007/978-3-031-50670-3\_15}, timestamp = {Tue, 22 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/MvahTDATK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/Pflugel23, author = {Eckhard Pfl{\"{u}}gel}, editor = {Jie Fu and Tom{\'{a}}s Kroupa and Yezekael Hayel}, title = {Shades of Grey: Strategic Bimatrix Stopping Games for Modelling (Un)Ethical Hacking Roles}, booktitle = {Decision and Game Theory for Security: 14th International Conference, GameSec 2023, Avignon, France, October 18-20, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14167}, pages = {110--129}, publisher = {Springe}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-50670-3\_6}, doi = {10.1007/978-3-031-50670-3\_6}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/Pflugel23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/SayedAKK23, author = {Md. Abu Sayed and Ahmed H. Anwar and Christopher Kiekintveld and Charles A. Kamhoua}, editor = {Jie Fu and Tom{\'{a}}s Kroupa and Yezekael Hayel}, title = {Honeypot Allocation for Cyber Deception in Dynamic Tactical Networks: {A} Game Theoretic Approach}, booktitle = {Decision and Game Theory for Security: 14th International Conference, GameSec 2023, Avignon, France, October 18-20, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14167}, pages = {195--214}, publisher = {Springe}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-50670-3\_10}, doi = {10.1007/978-3-031-50670-3\_10}, timestamp = {Tue, 22 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/SayedAKK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/SongLF23, author = {Zimeng Song and Chun Kai Ling and Fei Fang}, editor = {Jie Fu and Tom{\'{a}}s Kroupa and Yezekael Hayel}, title = {Multi-defender Security Games with Schedules}, booktitle = {Decision and Game Theory for Security: 14th International Conference, GameSec 2023, Avignon, France, October 18-20, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14167}, pages = {65--85}, publisher = {Springe}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-50670-3\_4}, doi = {10.1007/978-3-031-50670-3\_4}, timestamp = {Wed, 02 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/SongLF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/SychrovskyDL23, author = {David Sychrovsky and Sameer Desai and Martin Loebl}, editor = {Jie Fu and Tom{\'{a}}s Kroupa and Yezekael Hayel}, title = {Rule Enforcing Through Ordering}, booktitle = {Decision and Game Theory for Security: 14th International Conference, GameSec 2023, Avignon, France, October 18-20, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14167}, pages = {43--62}, publisher = {Springe}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-50670-3\_3}, doi = {10.1007/978-3-031-50670-3\_3}, timestamp = {Tue, 22 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/SychrovskyDL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/UdupaRF23, author = {Sumukha Udupa and Hazhar Rahmani and Jie Fu}, editor = {Jie Fu and Tom{\'{a}}s Kroupa and Yezekael Hayel}, title = {Opacity-Enforcing Active Perception and Control Against Eavesdropping Attacks}, booktitle = {Decision and Game Theory for Security: 14th International Conference, GameSec 2023, Avignon, France, October 18-20, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14167}, pages = {329--348}, publisher = {Springe}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-50670-3\_17}, doi = {10.1007/978-3-031-50670-3\_17}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/UdupaRF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/YamashitaY23, author = {Keigo Yamashita and Kenji Yasunaga}, editor = {Jie Fu and Tom{\'{a}}s Kroupa and Yezekael Hayel}, title = {Rational Broadcast Protocols Against Timid Adversaries}, booktitle = {Decision and Game Theory for Security: 14th International Conference, GameSec 2023, Avignon, France, October 18-20, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14167}, pages = {277--293}, publisher = {Springe}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-50670-3\_14}, doi = {10.1007/978-3-031-50670-3\_14}, timestamp = {Wed, 02 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/YamashitaY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/YangZZ23, author = {Ya{-}Ting Yang and Tao Zhang and Quanyan Zhu}, editor = {Jie Fu and Tom{\'{a}}s Kroupa and Yezekael Hayel}, title = {A Game-Theoretic Analysis of Auditing Differentially Private Algorithms with Epistemically Disparate Herd}, booktitle = {Decision and Game Theory for Security: 14th International Conference, GameSec 2023, Avignon, France, October 18-20, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14167}, pages = {349--368}, publisher = {Springe}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-50670-3\_18}, doi = {10.1007/978-3-031-50670-3\_18}, timestamp = {Mon, 07 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/YangZZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/gamesec/2022, editor = {Fei Fang and Haifeng Xu and Yezekael Hayel}, title = {Decision and Game Theory for Security - 13th International Conference, GameSec 2022, Pittsburgh, PA, USA, October 26-28, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13727}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-26369-9}, doi = {10.1007/978-3-031-26369-9}, isbn = {978-3-031-26368-2}, timestamp = {Wed, 07 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/gamesec/2023, editor = {Jie Fu and Tom{\'{a}}s Kroupa and Yezekael Hayel}, title = {Decision and Game Theory for Security: 14th International Conference, GameSec 2023, Avignon, France, October 18-20, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14167}, publisher = {Springe}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-50670-3}, doi = {10.1007/978-3-031-50670-3}, isbn = {978-3-031-50669-7}, timestamp = {Wed, 02 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/BajajB22, author = {Shivam Bajaj and Shaunak D. Bopardikar}, editor = {Fei Fang and Haifeng Xu and Yezekael Hayel}, title = {Optimal Pursuit of Surveilling Agents Near a High Value Target}, booktitle = {Decision and Game Theory for Security - 13th International Conference, GameSec 2022, Pittsburgh, PA, USA, October 26-28, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13727}, pages = {168--187}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-26369-9\_9}, doi = {10.1007/978-3-031-26369-9\_9}, timestamp = {Wed, 07 Feb 2024 17:23:12 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/BajajB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/BhambriCADK22, author = {Siddhant Bhambri and Purv Chauhan and Frederico Araujo and Adam Doup{\'{e}} and Subbarao Kambhampati}, editor = {Fei Fang and Haifeng Xu and Yezekael Hayel}, title = {Using Deception in Markov Game to Understand Adversarial Behaviors Through a Capture-The-Flag Environment}, booktitle = {Decision and Game Theory for Security - 13th International Conference, GameSec 2022, Pittsburgh, PA, USA, October 26-28, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13727}, pages = {87--106}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-26369-9\_5}, doi = {10.1007/978-3-031-26369-9\_5}, timestamp = {Tue, 14 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/BhambriCADK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/BhattacherjeeS22, author = {Sanjay Bhattacherjee and Palash Sarkar}, editor = {Fei Fang and Haifeng Xu and Yezekael Hayel}, title = {Voting Games to Model Protocol Stability and Security of Proof-of-Work Cryptocurrencies}, booktitle = {Decision and Game Theory for Security - 13th International Conference, GameSec 2022, Pittsburgh, PA, USA, October 26-28, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13727}, pages = {297--318}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-26369-9\_15}, doi = {10.1007/978-3-031-26369-9\_15}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/BhattacherjeeS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/Fu22, author = {Jie Fu}, editor = {Fei Fang and Haifeng Xu and Yezekael Hayel}, title = {On Almost-Sure Intention Deception Planning that Exploits Imperfect Observers}, booktitle = {Decision and Game Theory for Security - 13th International Conference, GameSec 2022, Pittsburgh, PA, USA, October 26-28, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13727}, pages = {67--86}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-26369-9\_4}, doi = {10.1007/978-3-031-26369-9\_4}, timestamp = {Fri, 20 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/Fu22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/GabrysBMSF22, author = {Ryan Gabrys and Mark Bilinski and Justin Mauger and Daniel Silva and Sunny Fugate}, editor = {Fei Fang and Haifeng Xu and Yezekael Hayel}, title = {Casino Rationale: Countering Attacker Deception in Zero-Sum Stackelberg Security Games of Bounded Rationality}, booktitle = {Decision and Game Theory for Security - 13th International Conference, GameSec 2022, Pittsburgh, PA, USA, October 26-28, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13727}, pages = {23--43}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-26369-9\_2}, doi = {10.1007/978-3-031-26369-9\_2}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/GabrysBMSF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/KinseyTSN22, author = {Sarah Eve Kinsey and Wong Wai Tuck and Arunesh Sinha and Thanh Hong Nguyen}, editor = {Fei Fang and Haifeng Xu and Yezekael Hayel}, title = {An Exploration of Poisoning Attacks on Data-Based Decision Making}, booktitle = {Decision and Game Theory for Security - 13th International Conference, GameSec 2022, Pittsburgh, PA, USA, October 26-28, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13727}, pages = {231--252}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-26369-9\_12}, doi = {10.1007/978-3-031-26369-9\_12}, timestamp = {Tue, 14 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/KinseyTSN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/KroupaV22, author = {Tom{\'{a}}s Kroupa and Tom{\'{a}}s Votroubek}, editor = {Fei Fang and Haifeng Xu and Yezekael Hayel}, title = {Multiple Oracle Algorithm to Solve Continuous Games}, booktitle = {Decision and Game Theory for Security - 13th International Conference, GameSec 2022, Pittsburgh, PA, USA, October 26-28, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13727}, pages = {149--167}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-26369-9\_8}, doi = {10.1007/978-3-031-26369-9\_8}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/KroupaV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/LiZ22, author = {Henger Li and Zizhan Zheng}, editor = {Fei Fang and Haifeng Xu and Yezekael Hayel}, title = {Robust Moving Target Defense Against Unknown Attacks: {A} Meta-reinforcement Learning Approach}, booktitle = {Decision and Game Theory for Security - 13th International Conference, GameSec 2022, Pittsburgh, PA, USA, October 26-28, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13727}, pages = {107--126}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-26369-9\_6}, doi = {10.1007/978-3-031-26369-9\_6}, timestamp = {Tue, 14 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/LiZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/NguyenY22, author = {Thanh Hong Nguyen and Amulya Yadav}, editor = {Fei Fang and Haifeng Xu and Yezekael Hayel}, title = {The Risk of Attacker Behavioral Learning: Can Attacker Fool Defender Under Uncertainty?}, booktitle = {Decision and Game Theory for Security - 13th International Conference, GameSec 2022, Pittsburgh, PA, USA, October 26-28, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13727}, pages = {3--22}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-26369-9\_1}, doi = {10.1007/978-3-031-26369-9\_1}, timestamp = {Tue, 14 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/NguyenY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/PanZ22, author = {Yunian Pan and Quanyan Zhu}, editor = {Fei Fang and Haifeng Xu and Yezekael Hayel}, title = {On Poisoned Wardrop Equilibrium in Congestion Games}, booktitle = {Decision and Game Theory for Security - 13th International Conference, GameSec 2022, Pittsburgh, PA, USA, October 26-28, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13727}, pages = {191--211}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-26369-9\_10}, doi = {10.1007/978-3-031-26369-9\_10}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/PanZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/RassK22, author = {Stefan Rass and Sandra K{\"{o}}nig}, editor = {Fei Fang and Haifeng Xu and Yezekael Hayel}, title = {Synchronization in Security Games}, booktitle = {Decision and Game Theory for Security - 13th International Conference, GameSec 2022, Pittsburgh, PA, USA, October 26-28, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13727}, pages = {129--148}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-26369-9\_7}, doi = {10.1007/978-3-031-26369-9\_7}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/RassK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/SarkarFVGZ22, author = {Anindya Sarkar and Jiarui Feng and Yevgeniy Vorobeychik and Christopher D. Gill and Ning Zhang}, editor = {Fei Fang and Haifeng Xu and Yezekael Hayel}, title = {Reward Delay Attacks on Deep Reinforcement Learning}, booktitle = {Decision and Game Theory for Security - 13th International Conference, GameSec 2022, Pittsburgh, PA, USA, October 26-28, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13727}, pages = {212--230}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-26369-9\_11}, doi = {10.1007/978-3-031-26369-9\_11}, timestamp = {Tue, 14 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/SarkarFVGZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/SayedAKBK22, author = {Md. Abu Sayed and Ahmed H. Anwar and Christopher Kiekintveld and Branislav Bosansk{\'{y}} and Charles A. Kamhoua}, editor = {Fei Fang and Haifeng Xu and Yezekael Hayel}, title = {Cyber Deception Against Zero-Day Attacks: {A} Game Theoretic Approach}, booktitle = {Decision and Game Theory for Security - 13th International Conference, GameSec 2022, Pittsburgh, PA, USA, October 26-28, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13727}, pages = {44--63}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-26369-9\_3}, doi = {10.1007/978-3-031-26369-9\_3}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/SayedAKBK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/TsemogneHKD22, author = {Olivier Tsemogne and Yezekael Hayel and Charles A. Kamhoua and Gabriel Deugoue}, editor = {Fei Fang and Haifeng Xu and Yezekael Hayel}, title = {Optimizing Intrusion Detection Systems Placement Against Network Virus Spreading Using a Partially Observable Stochastic Minimum-Threat Path Game}, booktitle = {Decision and Game Theory for Security - 13th International Conference, GameSec 2022, Pittsburgh, PA, USA, October 26-28, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13727}, pages = {274--296}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-26369-9\_14}, doi = {10.1007/978-3-031-26369-9\_14}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/TsemogneHKD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/TsemogneKAHKD22, author = {Olivier Tsemogne and Willie Kouam and Ahmed H. Anwar and Yezekael Hayel and Charles A. Kamhoua and Gabriel Deugoue}, editor = {Fei Fang and Haifeng Xu and Yezekael Hayel}, title = {A Network Centrality Game for Epidemic Control}, booktitle = {Decision and Game Theory for Security - 13th International Conference, GameSec 2022, Pittsburgh, PA, USA, October 26-28, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13727}, pages = {255--273}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-26369-9\_13}, doi = {10.1007/978-3-031-26369-9\_13}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/TsemogneKAHKD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/BaiBH21, author = {Wenjie Bai and Jeremiah Blocki and Benjamin Harsha}, editor = {Branislav Bosansk{\'{y}} and Cleotilde Gonzalez and Stefan Rass and Arunesh Sinha}, title = {Password Strength Signaling: {A} Counter-Intuitive Defense Against Password Cracking}, booktitle = {Decision and Game Theory for Security - 12th International Conference, GameSec 2021, Virtual Event, October 25-27, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13061}, pages = {334--353}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90370-1\_18}, doi = {10.1007/978-3-030-90370-1\_18}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/BaiBH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/BilinskiDFFGMS21, author = {Mark Bilinski and Joseph DiVita and Kimberly Ferguson{-}Walter and Sunny Fugate and Ryan Gabrys and Justin Mauger and Brian Souza}, editor = {Branislav Bosansk{\'{y}} and Cleotilde Gonzalez and Stefan Rass and Arunesh Sinha}, title = {No Time to Lie: Bounds on the Learning Rate of a Defender for Inferring Attacker Target Preferences}, booktitle = {Decision and Game Theory for Security - 12th International Conference, GameSec 2021, Virtual Event, October 25-27, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13061}, pages = {138--157}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90370-1\_8}, doi = {10.1007/978-3-030-90370-1\_8}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/BilinskiDFFGMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/BrahmaNN21, author = {Swastik Brahma and Laurent Njilla and Satyaki Nan}, editor = {Branislav Bosansk{\'{y}} and Cleotilde Gonzalez and Stefan Rass and Arunesh Sinha}, title = {Game Theoretic Hardware Trojan Testing Under Cost Considerations}, booktitle = {Decision and Game Theory for Security - 12th International Conference, GameSec 2021, Virtual Event, October 25-27, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13061}, pages = {251--270}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90370-1\_14}, doi = {10.1007/978-3-030-90370-1\_14}, timestamp = {Fri, 05 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/BrahmaNN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/ButlerNS21, author = {Andrew R. Butler and Thanh Hong Nguyen and Arunesh Sinha}, editor = {Branislav Bosansk{\'{y}} and Cleotilde Gonzalez and Stefan Rass and Arunesh Sinha}, title = {Countering Attacker Data Manipulation in Security Games}, booktitle = {Decision and Game Theory for Security - 12th International Conference, GameSec 2021, Virtual Event, October 25-27, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13061}, pages = {59--79}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90370-1\_4}, doi = {10.1007/978-3-030-90370-1\_4}, timestamp = {Fri, 03 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/ButlerNS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/CollinsXB21, author = {Brandon C. Collins and Shouhuai Xu and Philip N. Brown}, editor = {Branislav Bosansk{\'{y}} and Cleotilde Gonzalez and Stefan Rass and Arunesh Sinha}, title = {Paying Firms to Share Cyber Threat Intelligence}, booktitle = {Decision and Game Theory for Security - 12th International Conference, GameSec 2021, Virtual Event, October 25-27, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13061}, pages = {365--377}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90370-1\_20}, doi = {10.1007/978-3-030-90370-1\_20}, timestamp = {Fri, 05 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/CollinsXB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/Galinkin21, author = {Erick Galinkin}, editor = {Branislav Bosansk{\'{y}} and Cleotilde Gonzalez and Stefan Rass and Arunesh Sinha}, title = {Winning the Ransomware Lottery - {A} Game-Theoretic Approach to Preventing Ransomware Attacks}, booktitle = {Decision and Game Theory for Security - 12th International Conference, GameSec 2021, Virtual Event, October 25-27, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13061}, pages = {195--207}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90370-1\_11}, doi = {10.1007/978-3-030-90370-1\_11}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/Galinkin21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/GalinkinCM21, author = {Erick Galinkin and John Carter and Spiros Mancoridis}, editor = {Branislav Bosansk{\'{y}} and Cleotilde Gonzalez and Stefan Rass and Arunesh Sinha}, title = {Evaluating Attacker Risk Behavior in an Internet of Things Ecosystem}, booktitle = {Decision and Game Theory for Security - 12th International Conference, GameSec 2021, Virtual Event, October 25-27, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13061}, pages = {354--364}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90370-1\_19}, doi = {10.1007/978-3-030-90370-1\_19}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/GalinkinCM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/Ganzfried21, author = {Sam Ganzfried}, editor = {Branislav Bosansk{\'{y}} and Cleotilde Gonzalez and Stefan Rass and Arunesh Sinha}, title = {Computing Nash Equilibria in Multiplayer DAG-Structured Stochastic Games with Persistent Imperfect Information}, booktitle = {Decision and Game Theory for Security - 12th International Conference, GameSec 2021, Virtual Event, October 25-27, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13061}, pages = {3--16}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90370-1\_1}, doi = {10.1007/978-3-030-90370-1\_1}, timestamp = {Fri, 05 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/Ganzfried21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/HuangZ21, author = {Linan Huang and Quanyan Zhu}, editor = {Branislav Bosansk{\'{y}} and Cleotilde Gonzalez and Stefan Rass and Arunesh Sinha}, title = {Combating Informational Denial-of-Service (IDoS) Attacks: Modeling and Mitigation of Attentional Human Vulnerability}, booktitle = {Decision and Game Theory for Security - 12th International Conference, GameSec 2021, Virtual Event, October 25-27, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13061}, pages = {314--333}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90370-1\_17}, doi = {10.1007/978-3-030-90370-1\_17}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/HuangZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/JinYKL21, author = {Kun Jin and Tongxin Yin and Charles A. Kamhoua and Mingyan Liu}, editor = {Branislav Bosansk{\'{y}} and Cleotilde Gonzalez and Stefan Rass and Arunesh Sinha}, title = {Network Games with Strategic Machine Learning}, booktitle = {Decision and Game Theory for Security - 12th International Conference, GameSec 2021, Virtual Event, October 25-27, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13061}, pages = {118--137}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90370-1\_7}, doi = {10.1007/978-3-030-90370-1\_7}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/JinYKL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/KroupaVV21, author = {Tom{\'{a}}s Kroupa and Sara Vannucci and Tom{\'{a}}s Votroubek}, editor = {Branislav Bosansk{\'{y}} and Cleotilde Gonzalez and Stefan Rass and Arunesh Sinha}, title = {Separable Network Games with Compact Strategy Sets}, booktitle = {Decision and Game Theory for Security - 12th International Conference, GameSec 2021, Virtual Event, October 25-27, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13061}, pages = {37--56}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90370-1\_3}, doi = {10.1007/978-3-030-90370-1\_3}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/KroupaVV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/MotaqyABY21, author = {Zahra Motaqy and Ghada Almashaqbeh and Behnam Bahrak and Naser Yazdani}, editor = {Branislav Bosansk{\'{y}} and Cleotilde Gonzalez and Stefan Rass and Arunesh Sinha}, title = {Bet and Attack: Incentive Compatible Collaborative Attacks Using Smart Contracts}, booktitle = {Decision and Game Theory for Security - 12th International Conference, GameSec 2021, Virtual Event, October 25-27, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13061}, pages = {293--313}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90370-1\_16}, doi = {10.1007/978-3-030-90370-1\_16}, timestamp = {Fri, 05 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/MotaqyABY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/NiuSCP21, author = {Luyao Niu and Dinuka Sahabandu and Andrew Clark and Radha Poovendran}, editor = {Branislav Bosansk{\'{y}} and Cleotilde Gonzalez and Stefan Rass and Arunesh Sinha}, title = {A Game-Theoretic Framework for Controlled Islanding in the Presence of Adversaries}, booktitle = {Decision and Game Theory for Security - 12th International Conference, GameSec 2021, Virtual Event, October 25-27, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13061}, pages = {231--250}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90370-1\_13}, doi = {10.1007/978-3-030-90370-1\_13}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/NiuSCP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/PiHG21, author = {Jianzong Pi and Joseph L. Heyman and Abhishek Gupta}, editor = {Branislav Bosansk{\'{y}} and Cleotilde Gonzalez and Stefan Rass and Arunesh Sinha}, title = {Two Algorithms for Computing Exact and Approximate Nash Equilibria in Bimatrix Games}, booktitle = {Decision and Game Theory for Security - 12th International Conference, GameSec 2021, Virtual Event, October 25-27, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13061}, pages = {17--36}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90370-1\_2}, doi = {10.1007/978-3-030-90370-1\_2}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/PiHG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/RoussillonL21, author = {Benjamin Roussillon and Patrick Loiseau}, editor = {Branislav Bosansk{\'{y}} and Cleotilde Gonzalez and Stefan Rass and Arunesh Sinha}, title = {Scalable Optimal Classifiers for Adversarial Settings Under Uncertainty}, booktitle = {Decision and Game Theory for Security - 12th International Conference, GameSec 2021, Virtual Event, October 25-27, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13061}, pages = {80--97}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90370-1\_5}, doi = {10.1007/978-3-030-90370-1\_5}, timestamp = {Fri, 05 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/RoussillonL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/RoyKVL21, author = {Shanto Roy and Salah Uddin Kadir and Yevgeniy Vorobeychik and Aron Laszka}, editor = {Branislav Bosansk{\'{y}} and Cleotilde Gonzalez and Stefan Rass and Arunesh Sinha}, title = {Strategic Remote Attestation: Testbed for Internet-of-Things Devices and Stackelberg Security Game for Optimal Strategies}, booktitle = {Decision and Game Theory for Security - 12th International Conference, GameSec 2021, Virtual Event, October 25-27, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13061}, pages = {271--290}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90370-1\_15}, doi = {10.1007/978-3-030-90370-1\_15}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/RoyKVL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/SamsingerMSP21, author = {Maximilian Samsinger and Florian Merkle and Pascal Sch{\"{o}}ttle and Tom{\'{a}}s Pevn{\'{y}}}, editor = {Branislav Bosansk{\'{y}} and Cleotilde Gonzalez and Stefan Rass and Arunesh Sinha}, title = {When Should You Defend Your Classifier? - - {A} Game-Theoretical Analysis of Countermeasures Against Adversarial Examples}, booktitle = {Decision and Game Theory for Security - 12th International Conference, GameSec 2021, Virtual Event, October 25-27, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13061}, pages = {158--177}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90370-1\_9}, doi = {10.1007/978-3-030-90370-1\_9}, timestamp = {Fri, 05 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/SamsingerMSP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/VakiliniaKL21, author = {Iman Vakilinia and Mohammad Mahdi Khalili and Ming Li}, editor = {Branislav Bosansk{\'{y}} and Cleotilde Gonzalez and Stefan Rass and Arunesh Sinha}, title = {A Mechanism Design Approach to Solve Ransomware Dilemmas}, booktitle = {Decision and Game Theory for Security - 12th International Conference, GameSec 2021, Virtual Event, October 25-27, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13061}, pages = {181--194}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90370-1\_10}, doi = {10.1007/978-3-030-90370-1\_10}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/VakiliniaKL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/WuKKV21, author = {Junlin Wu and Charles A. Kamhoua and Murat Kantarcioglu and Yevgeniy Vorobeychik}, editor = {Branislav Bosansk{\'{y}} and Cleotilde Gonzalez and Stefan Rass and Arunesh Sinha}, title = {Learning Generative Deception Strategies in Combinatorial Masking Games}, booktitle = {Decision and Game Theory for Security - 12th International Conference, GameSec 2021, Virtual Event, October 25-27, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13061}, pages = {98--117}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90370-1\_6}, doi = {10.1007/978-3-030-90370-1\_6}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/WuKKV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/ZhaoGZ21, author = {Yuhan Zhao and Yunfei Ge and Quanyan Zhu}, editor = {Branislav Bosansk{\'{y}} and Cleotilde Gonzalez and Stefan Rass and Arunesh Sinha}, title = {Combating Ransomware in Internet of Things: {A} Games-in-Games Approach for Cross-Layer Cyber Defense and Security Investment}, booktitle = {Decision and Game Theory for Security - 12th International Conference, GameSec 2021, Virtual Event, October 25-27, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13061}, pages = {208--228}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90370-1\_12}, doi = {10.1007/978-3-030-90370-1\_12}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/ZhaoGZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/gamesec/2021, editor = {Branislav Bosansk{\'{y}} and Cleotilde Gonzalez and Stefan Rass and Arunesh Sinha}, title = {Decision and Game Theory for Security - 12th International Conference, GameSec 2021, Virtual Event, October 25-27, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13061}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90370-1}, doi = {10.1007/978-3-030-90370-1}, isbn = {978-3-030-90369-5}, timestamp = {Fri, 05 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/AnwarK20, author = {Ahmed H. Anwar and Charles A. Kamhoua}, editor = {Quanyan Zhu and John S. Baras and Radha Poovendran and Juntao Chen}, title = {Game Theory on Attack Graph for Cyber Deception}, booktitle = {Decision and Game Theory for Security - 11th International Conference, GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12513}, pages = {445--456}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64793-3\_24}, doi = {10.1007/978-3-030-64793-3\_24}, timestamp = {Sat, 09 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/AnwarK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/AnwarLKK20, author = {Ahmed H. Anwar and Nandi O. Leslie and Charles A. Kamhoua and Christopher Kiekintveld}, editor = {Quanyan Zhu and John S. Baras and Radha Poovendran and Juntao Chen}, title = {A Game Theoretic Framework for Software Diversity for Network Security}, booktitle = {Decision and Game Theory for Security - 11th International Conference, GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12513}, pages = {297--311}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64793-3\_16}, doi = {10.1007/978-3-030-64793-3\_16}, timestamp = {Sat, 09 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/AnwarLKK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/BelavadiZKT20, author = {Vibha Belavadi and Yan Zhou and Murat Kantarcioglu and Bhavani Thuraisingham}, editor = {Quanyan Zhu and John S. Baras and Radha Poovendran and Juntao Chen}, title = {Attacking Machine Learning Models for Social Good}, booktitle = {Decision and Game Theory for Security - 11th International Conference, GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12513}, pages = {457--471}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64793-3\_25}, doi = {10.1007/978-3-030-64793-3\_25}, timestamp = {Wed, 29 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/BelavadiZKT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/BilinskidFFGMS20, author = {Mark Bilinski and Joe DiVita and Kimberly Ferguson{-}Walter and Sunny Fugate and Ryan Gabrys and Justin Mauger and Brian Souza}, editor = {Quanyan Zhu and John S. Baras and Radha Poovendran and Juntao Chen}, title = {Lie Another Day: Demonstrating Bias in a Multi-round Cyber Deception Game of Questionable Veracity}, booktitle = {Decision and Game Theory for Security - 11th International Conference, GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12513}, pages = {80--100}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64793-3\_5}, doi = {10.1007/978-3-030-64793-3\_5}, timestamp = {Mon, 20 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/BilinskidFFGMS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/Cansever20, author = {Derya Cansever}, editor = {Quanyan Zhu and John S. Baras and Radha Poovendran and Juntao Chen}, title = {Security Games with Insider Threats}, booktitle = {Decision and Game Theory for Security - 11th International Conference, GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12513}, pages = {502--505}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64793-3\_28}, doi = {10.1007/978-3-030-64793-3\_28}, timestamp = {Tue, 05 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/Cansever20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/EghtesadVL20, author = {Taha Eghtesad and Yevgeniy Vorobeychik and Aron Laszka}, editor = {Quanyan Zhu and John S. Baras and Radha Poovendran and Juntao Chen}, title = {Adversarial Deep Reinforcement Learning Based Adaptive Moving Target Defense}, booktitle = {Decision and Game Theory for Security - 11th International Conference, GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12513}, pages = {58--79}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64793-3\_4}, doi = {10.1007/978-3-030-64793-3\_4}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/EghtesadVL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/EmadiB20, author = {Hamid Emadi and Sourabh Bhattacharya}, editor = {Quanyan Zhu and John S. Baras and Radha Poovendran and Juntao Chen}, title = {On the Characterization of Saddle Point Equilibrium for Security Games with Additive Utility}, booktitle = {Decision and Game Theory for Security - 11th International Conference, GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12513}, pages = {349--364}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64793-3\_19}, doi = {10.1007/978-3-030-64793-3\_19}, timestamp = {Sat, 09 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/EmadiB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/GranadosMOK20, author = {Alonso Granados and Mohammad Sujan Miah and Anthony Ortiz and Christopher Kiekintveld}, editor = {Quanyan Zhu and John S. Baras and Radha Poovendran and Juntao Chen}, title = {A Realistic Approach for Network Traffic Obfuscation Using Adversarial Machine Learning}, booktitle = {Decision and Game Theory for Security - 11th International Conference, GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12513}, pages = {45--57}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64793-3\_3}, doi = {10.1007/978-3-030-64793-3\_3}, timestamp = {Tue, 05 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/GranadosMOK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/HuangZ20, author = {Linan Huang and Quanyan Zhu}, editor = {Quanyan Zhu and John S. Baras and Radha Poovendran and Juntao Chen}, title = {Farsighted Risk Mitigation of Lateral Movement Using Dynamic Cognitive Honeypots}, booktitle = {Decision and Game Theory for Security - 11th International Conference, GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12513}, pages = {125--146}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64793-3\_7}, doi = {10.1007/978-3-030-64793-3\_7}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/HuangZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/JiaZKV20, author = {Feiran Jia and Kai Zhou and Charles A. Kamhoua and Yevgeniy Vorobeychik}, editor = {Quanyan Zhu and John S. Baras and Radha Poovendran and Juntao Chen}, title = {Blocking Adversarial Influence in Social Networks}, booktitle = {Decision and Game Theory for Security - 11th International Conference, GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12513}, pages = {257--276}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64793-3\_14}, doi = {10.1007/978-3-030-64793-3\_14}, timestamp = {Mon, 22 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/JiaZKV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/KatzefCALK20, author = {Marc Katzef and Andrew C. Cullen and Tansu Alpcan and Christopher Leckie and Justin Kopacz}, editor = {Quanyan Zhu and John S. Baras and Radha Poovendran and Juntao Chen}, title = {Distributed Generative Adversarial Networks for Anomaly Detection}, booktitle = {Decision and Game Theory for Security - 11th International Conference, GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12513}, pages = {3--22}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64793-3\_1}, doi = {10.1007/978-3-030-64793-3\_1}, timestamp = {Sat, 09 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/KatzefCALK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/KulkarniFLKL20, author = {Abhishek Ninad Kulkarni and Jie Fu and Huan Luo and Charles A. Kamhoua and Nandi O. Leslie}, editor = {Quanyan Zhu and John S. Baras and Radha Poovendran and Juntao Chen}, title = {Decoy Allocation Games on Graphs with Temporal Logic Objectives}, booktitle = {Decision and Game Theory for Security - 11th International Conference, GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12513}, pages = {168--187}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64793-3\_9}, doi = {10.1007/978-3-030-64793-3\_9}, timestamp = {Fri, 20 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/KulkarniFLKL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/MaGK20, author = {Xiaobai Ma and Jayesh K. Gupta and Mykel J. Kochenderfer}, editor = {Quanyan Zhu and John S. Baras and Radha Poovendran and Juntao Chen}, title = {Normalizing Flow Policies for Multi-agent Systems}, booktitle = {Decision and Game Theory for Security - 11th International Conference, GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12513}, pages = {277--296}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64793-3\_15}, doi = {10.1007/978-3-030-64793-3\_15}, timestamp = {Sat, 09 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/MaGK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/MavridisSB20, author = {Christos N. Mavridis and Nilesh Suriyarachchi and John S. Baras}, editor = {Quanyan Zhu and John S. Baras and Radha Poovendran and Juntao Chen}, title = {Detection of Dynamically Changing Leaders in Complex Swarms from Observed Dynamic Data}, booktitle = {Decision and Game Theory for Security - 11th International Conference, GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12513}, pages = {223--240}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64793-3\_12}, doi = {10.1007/978-3-030-64793-3\_12}, timestamp = {Tue, 05 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/MavridisSB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/MilaniSCVLKF20, author = {Stephanie Milani and Weiran Shen and Kevin S. Chan and Sridhar Venkatesan and Nandi O. Leslie and Charles A. Kamhoua and Fei Fang}, editor = {Quanyan Zhu and John S. Baras and Radha Poovendran and Juntao Chen}, title = {Harnessing the Power of Deception in Attack Graph-Based Security Games}, booktitle = {Decision and Game Theory for Security - 11th International Conference, GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12513}, pages = {147--167}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64793-3\_8}, doi = {10.1007/978-3-030-64793-3\_8}, timestamp = {Wed, 07 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/MilaniSCVLKF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/PanPCZ20, author = {Yunian Pan and Guanze Peng and Juntao Chen and Quanyan Zhu}, editor = {Quanyan Zhu and John S. Baras and Radha Poovendran and Juntao Chen}, title = {{MASAGE:} Model-Agnostic Sequential and Adaptive Game Estimation}, booktitle = {Decision and Game Theory for Security - 11th International Conference, GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12513}, pages = {365--384}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64793-3\_20}, doi = {10.1007/978-3-030-64793-3\_20}, timestamp = {Sat, 09 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/PanPCZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/PengZZ20, author = {Guanze Peng and Tao Zhang and Quanyan Zhu}, editor = {Quanyan Zhu and John S. Baras and Radha Poovendran and Juntao Chen}, title = {A Data-Driven Distributionally Robust Game Using Wasserstein Distance}, booktitle = {Decision and Game Theory for Security - 11th International Conference, GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12513}, pages = {405--421}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64793-3\_22}, doi = {10.1007/978-3-030-64793-3\_22}, timestamp = {Sat, 09 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/PengZZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/Qu20, author = {Gang Qu}, editor = {Quanyan Zhu and John S. Baras and Radha Poovendran and Juntao Chen}, title = {Hardware Security and Trust: {A} New Battlefield of Information}, booktitle = {Decision and Game Theory for Security - 11th International Conference, GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12513}, pages = {486--501}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64793-3\_27}, doi = {10.1007/978-3-030-64793-3\_27}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/Qu20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/RassWK20, author = {Stefan Rass and Angelika Wiegele and Sandra K{\"{o}}nig}, editor = {Quanyan Zhu and John S. Baras and Radha Poovendran and Juntao Chen}, title = {Security Games over Lexicographic Orders}, booktitle = {Decision and Game Theory for Security - 11th International Conference, GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12513}, pages = {422--441}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64793-3\_23}, doi = {10.1007/978-3-030-64793-3\_23}, timestamp = {Sat, 09 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/RassWK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/SenZMN20, author = {Ayon Sen and Xiaojin Zhu and Erin Marshall and Robert D. Nowak}, editor = {Quanyan Zhu and John S. Baras and Radha Poovendran and Juntao Chen}, title = {Popular Imperceptibility Measures in Visual Adversarial Attacks are Far from Human Perception}, booktitle = {Decision and Game Theory for Security - 11th International Conference, GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12513}, pages = {188--199}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64793-3\_10}, doi = {10.1007/978-3-030-64793-3\_10}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/SenZMN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/SenguptaBSK20, author = {Sailik Sengupta and Kaustav Basu and Arunabha Sen and Subbarao Kambhampati}, editor = {Quanyan Zhu and John S. Baras and Radha Poovendran and Juntao Chen}, title = {Moving Target Defense for Robust Monitoring of Electric Grid Transformers in Adversarial Environments}, booktitle = {Decision and Game Theory for Security - 11th International Conference, GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12513}, pages = {241--253}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64793-3\_13}, doi = {10.1007/978-3-030-64793-3\_13}, timestamp = {Tue, 05 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/SenguptaBSK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/ShiPCVBLKF20, author = {Zheyuan Ryan Shi and Ariel D. Procaccia and Kevin S. Chan and Sridhar Venkatesan and Noam Ben{-}Asher and Nandi O. Leslie and Charles A. Kamhoua and Fei Fang}, editor = {Quanyan Zhu and John S. Baras and Radha Poovendran and Juntao Chen}, title = {Learning and Planning in the Feature Deception Problem}, booktitle = {Decision and Game Theory for Security - 11th International Conference, GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12513}, pages = {23--44}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64793-3\_2}, doi = {10.1007/978-3-030-64793-3\_2}, timestamp = {Wed, 07 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/ShiPCVBLKF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/ShishikaK20, author = {Daigo Shishika and Vijay Kumar}, editor = {Quanyan Zhu and John S. Baras and Radha Poovendran and Juntao Chen}, title = {A Review of Multi Agent Perimeter Defense Games}, booktitle = {Decision and Game Theory for Security - 11th International Conference, GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12513}, pages = {472--485}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64793-3\_26}, doi = {10.1007/978-3-030-64793-3\_26}, timestamp = {Sat, 09 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/ShishikaK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/Sprintson20, author = {Alex Sprintson}, editor = {Quanyan Zhu and John S. Baras and Radha Poovendran and Juntao Chen}, title = {Securing Next-Generation Wireless Networks: Challenges and Opportunities (Extended Abstract)}, booktitle = {Decision and Game Theory for Security - 11th International Conference, GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12513}, pages = {506--510}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64793-3\_29}, doi = {10.1007/978-3-030-64793-3\_29}, timestamp = {Sat, 09 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/Sprintson20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/ThakoorJAGTV20, author = {Omkar Thakoor and Shahin Jabbari and Palvi Aggarwal and Cleotilde Gonzalez and Milind Tambe and Phebe Vayanos}, editor = {Quanyan Zhu and John S. Baras and Radha Poovendran and Juntao Chen}, title = {Exploiting Bounded Rationality in Risk-Based Cyber Camouflage Games}, booktitle = {Decision and Game Theory for Security - 11th International Conference, GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12513}, pages = {103--124}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64793-3\_6}, doi = {10.1007/978-3-030-64793-3\_6}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/ThakoorJAGTV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/TomasekBN20, author = {Petr Tom{\'{a}}sek and Branislav Bosansk{\'{y}} and Thanh Hong Nguyen}, editor = {Quanyan Zhu and John S. Baras and Radha Poovendran and Juntao Chen}, title = {Using One-Sided Partially Observable Stochastic Games for Solving Zero-Sum Security Games with Sequential Attacks}, booktitle = {Decision and Game Theory for Security - 11th International Conference, GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12513}, pages = {385--404}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64793-3\_21}, doi = {10.1007/978-3-030-64793-3\_21}, timestamp = {Tue, 05 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/TomasekBN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/TsemogneHKD20, author = {Olivier Tsemogne and Yezekael Hayel and Charles A. Kamhoua and Gabriel Deugoue}, editor = {Quanyan Zhu and John S. Baras and Radha Poovendran and Juntao Chen}, title = {Partially Observable Stochastic Games for Cyber Deception Against Network Epidemic}, booktitle = {Decision and Game Theory for Security - 11th International Conference, GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12513}, pages = {312--325}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64793-3\_17}, doi = {10.1007/978-3-030-64793-3\_17}, timestamp = {Tue, 05 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/TsemogneHKD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/ZamanBB20, author = {Muhammad Aneeq uz Zaman and Sujay Bhatt and Tamer Basar}, editor = {Quanyan Zhu and John S. Baras and Radha Poovendran and Juntao Chen}, title = {Secure Discrete-Time Linear-Quadratic Mean-Field Games}, booktitle = {Decision and Game Theory for Security - 11th International Conference, GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12513}, pages = {203--222}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64793-3\_11}, doi = {10.1007/978-3-030-64793-3\_11}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/ZamanBB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/ZhaoZ20, author = {Yuhan Zhao and Quanyan Zhu}, editor = {Quanyan Zhu and John S. Baras and Radha Poovendran and Juntao Chen}, title = {Combating Online Counterfeits: {A} Game-Theoretic Analysis of Cyber Supply Chain Ecosystem}, booktitle = {Decision and Game Theory for Security - 11th International Conference, GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12513}, pages = {326--345}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64793-3\_18}, doi = {10.1007/978-3-030-64793-3\_18}, timestamp = {Tue, 05 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/ZhaoZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/gamesec/2020, editor = {Quanyan Zhu and John S. Baras and Radha Poovendran and Juntao Chen}, title = {Decision and Game Theory for Security - 11th International Conference, GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12513}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64793-3}, doi = {10.1007/978-3-030-64793-3}, isbn = {978-3-030-64792-6}, timestamp = {Tue, 05 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/0001RUS19, author = {Christopher Griffin and Sarah Michele Rajtmajer and Prasanna Umar and Anna Cinzia Squicciarini}, editor = {Tansu Alpcan and Yevgeniy Vorobeychik and John S. Baras and Gy{\"{o}}rgy D{\'{a}}n}, title = {Power Law Public Goods Game for Personal Information Sharing in News Commentaries}, booktitle = {Decision and Game Theory for Security - 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11836}, pages = {184--195}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32430-8\_12}, doi = {10.1007/978-3-030-32430-8\_12}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/0001RUS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/BarretoK19, author = {Carlos A. Barreto and Xenofon D. Koutsoukos}, editor = {Tansu Alpcan and Yevgeniy Vorobeychik and John S. Baras and Gy{\"{o}}rgy D{\'{a}}n}, title = {Design of Load Forecast Systems Resilient Against Cyber-Attacks}, booktitle = {Decision and Game Theory for Security - 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11836}, pages = {1--20}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32430-8\_1}, doi = {10.1007/978-3-030-32430-8\_1}, timestamp = {Wed, 23 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/BarretoK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/BasakKVGAK19, author = {Anjon Basak and Charles A. Kamhoua and Sridhar Venkatesan and Marcus Gutierrez and Ahmed H. Anwar and Christopher Kiekintveld}, editor = {Tansu Alpcan and Yevgeniy Vorobeychik and John S. Baras and Gy{\"{o}}rgy D{\'{a}}n}, title = {Identifying Stealthy Attackers in a Game Theoretic Framework Using Deception}, booktitle = {Decision and Game Theory for Security - 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11836}, pages = {21--32}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32430-8\_2}, doi = {10.1007/978-3-030-32430-8\_2}, timestamp = {Sat, 27 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/BasakKVGAK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/BhargavaC19, author = {Radhika Bhargava and Chris Clifton}, editor = {Tansu Alpcan and Yevgeniy Vorobeychik and John S. Baras and Gy{\"{o}}rgy D{\'{a}}n}, title = {When Is a Semi-honest Secure Multiparty Computation Valuable?}, booktitle = {Decision and Game Theory for Security - 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11836}, pages = {45--64}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32430-8\_4}, doi = {10.1007/978-3-030-32430-8\_4}, timestamp = {Wed, 23 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/BhargavaC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/BilinskiFFGMS19, author = {Mark Bilinski and Kimberly Ferguson{-}Walter and Sunny Fugate and Ryan Gabrys and Justin Mauger and Brian Souza}, editor = {Tansu Alpcan and Yevgeniy Vorobeychik and John S. Baras and Gy{\"{o}}rgy D{\'{a}}n}, title = {You only Lie Twice: {A} Multi-round Cyber Deception Game of Questionable Veracity}, booktitle = {Decision and Game Theory for Security - 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11836}, pages = {65--84}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32430-8\_5}, doi = {10.1007/978-3-030-32430-8\_5}, timestamp = {Thu, 07 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/BilinskiFFGMS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/BoumkheldPRP19, author = {Nadia Boumkheld and Sakshyam Panda and Stefan Rass and Emmanouil Panaousis}, editor = {Tansu Alpcan and Yevgeniy Vorobeychik and John S. Baras and Gy{\"{o}}rgy D{\'{a}}n}, title = {Honeypot Type Selection Games for Smart Grid Networks}, booktitle = {Decision and Game Theory for Security - 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11836}, pages = {85--96}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32430-8\_6}, doi = {10.1007/978-3-030-32430-8\_6}, timestamp = {Thu, 07 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/BoumkheldPRP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/BucareyL19, author = {Victor Bucarey and Martine Labb{\'{e}}}, editor = {Tansu Alpcan and Yevgeniy Vorobeychik and John S. Baras and Gy{\"{o}}rgy D{\'{a}}n}, title = {Discussion of Fairness and Implementability in Stackelberg Security Games}, booktitle = {Decision and Game Theory for Security - 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11836}, pages = {97--117}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32430-8\_7}, doi = {10.1007/978-3-030-32430-8\_7}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/BucareyL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/Canann19, author = {Taylor J. Canann}, editor = {Tansu Alpcan and Yevgeniy Vorobeychik and John S. Baras and Gy{\"{o}}rgy D{\'{a}}n}, title = {Toward a Theory of Vulnerability Disclosure Policy: {A} Hacker's Game}, booktitle = {Decision and Game Theory for Security - 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11836}, pages = {118--134}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32430-8\_8}, doi = {10.1007/978-3-030-32430-8\_8}, timestamp = {Wed, 23 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/Canann19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/CartwrightCX19, author = {Anna Cartwright and Edward J. Cartwright and Lian Xue}, editor = {Tansu Alpcan and Yevgeniy Vorobeychik and John S. Baras and Gy{\"{o}}rgy D{\'{a}}n}, title = {Investing in Prevention or Paying for Recovery - Attitudes to Cyber Risk}, booktitle = {Decision and Game Theory for Security - 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11836}, pages = {135--151}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32430-8\_9}, doi = {10.1007/978-3-030-32430-8\_9}, timestamp = {Thu, 20 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/CartwrightCX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/DesmedtS19, author = {Yvo Desmedt and Arkadii Slinko}, editor = {Tansu Alpcan and Yevgeniy Vorobeychik and John S. Baras and Gy{\"{o}}rgy D{\'{a}}n}, title = {Realistic versus Rational Secret Sharing}, booktitle = {Decision and Game Theory for Security - 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11836}, pages = {152--163}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32430-8\_10}, doi = {10.1007/978-3-030-32430-8\_10}, timestamp = {Wed, 23 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/DesmedtS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/DunstatterTGT19, author = {Noah Dunstatter and Alireza Tahsini and Mina Guirguis and Jelena Tesic}, editor = {Tansu Alpcan and Yevgeniy Vorobeychik and John S. Baras and Gy{\"{o}}rgy D{\'{a}}n}, title = {Solving Cyber Alert Allocation Markov Games with Deep Reinforcement Learning}, booktitle = {Decision and Game Theory for Security - 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11836}, pages = {164--183}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32430-8\_11}, doi = {10.1007/978-3-030-32430-8\_11}, timestamp = {Thu, 07 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/DunstatterTGT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/Huang19, author = {Wen Huang}, editor = {Tansu Alpcan and Yevgeniy Vorobeychik and John S. Baras and Gy{\"{o}}rgy D{\'{a}}n}, title = {Exploring players' user experience in a high-embodied virtual reality game}, booktitle = {Decision and Game Theory for Security - 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11836}, pages = {1--8}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1109/GEM.2019.8902148}, doi = {10.1109/GEM.2019.8902148}, timestamp = {Thu, 05 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/Huang19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/HuangZ19, author = {Linan Huang and Quanyan Zhu}, editor = {Tansu Alpcan and Yevgeniy Vorobeychik and John S. Baras and Gy{\"{o}}rgy D{\'{a}}n}, title = {Adaptive Honeypot Engagement Through Reinforcement Learning of Semi-Markov Decision Processes}, booktitle = {Decision and Game Theory for Security - 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11836}, pages = {196--216}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32430-8\_13}, doi = {10.1007/978-3-030-32430-8\_13}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/HuangZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/HuangZ19a, author = {Yunhan Huang and Quanyan Zhu}, editor = {Tansu Alpcan and Yevgeniy Vorobeychik and John S. Baras and Gy{\"{o}}rgy D{\'{a}}n}, title = {Deceptive Reinforcement Learning Under Adversarial Manipulations on Cost Signals}, booktitle = {Decision and Game Theory for Security - 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11836}, pages = {217--237}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32430-8\_14}, doi = {10.1007/978-3-030-32430-8\_14}, timestamp = {Thu, 07 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/HuangZ19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/KamraGWF0T19, author = {Nitin Kamra and Umang Gupta and Kai Wang and Fei Fang and Yan Liu and Milind Tambe}, editor = {Tansu Alpcan and Yevgeniy Vorobeychik and John S. Baras and Gy{\"{o}}rgy D{\'{a}}n}, title = {DeepFP for Finding Nash Equilibrium in Continuous Action Spaces}, booktitle = {Decision and Game Theory for Security - 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11836}, pages = {238--258}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32430-8\_15}, doi = {10.1007/978-3-030-32430-8\_15}, timestamp = {Wed, 07 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/KamraGWF0T19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/KhaliliZL19, author = {Mohammad Mahdi Khalili and Xueru Zhang and Mingyan Liu}, editor = {Tansu Alpcan and Yevgeniy Vorobeychik and John S. Baras and Gy{\"{o}}rgy D{\'{a}}n}, title = {Effective Premium Discrimination for Designing Cyber Insurance Policies with Rare Losses}, booktitle = {Decision and Game Theory for Security - 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11836}, pages = {259--275}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32430-8\_16}, doi = {10.1007/978-3-030-32430-8\_16}, timestamp = {Wed, 23 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/KhaliliZL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/KumariJMM19, author = {Kavita Kumari and Murtuza Jadliwala and Anindya Maiti and Mohammad Hossein Manshaei}, editor = {Tansu Alpcan and Yevgeniy Vorobeychik and John S. Baras and Gy{\"{o}}rgy D{\'{a}}n}, title = {Analyzing Defense Strategies Against Mobile Information Leakages: {A} Game-Theoretic Approach}, booktitle = {Decision and Game Theory for Security - 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11836}, pages = {276--296}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32430-8\_17}, doi = {10.1007/978-3-030-32430-8\_17}, timestamp = {Thu, 07 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/KumariJMM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/LiD19, author = {Zuxing Li and Gy{\"{o}}rgy D{\'{a}}n}, editor = {Tansu Alpcan and Yevgeniy Vorobeychik and John S. Baras and Gy{\"{o}}rgy D{\'{a}}n}, title = {Dynamic Cheap Talk for Robust Adversarial Learning}, booktitle = {Decision and Game Theory for Security - 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11836}, pages = {297--309}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32430-8\_18}, doi = {10.1007/978-3-030-32430-8\_18}, timestamp = {Thu, 07 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/LiD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/Merlevede0GH19, author = {Jonathan S. A. Merlevede and Benjamin Johnson and Jens Grossklags and Tom Holvoet}, editor = {Tansu Alpcan and Yevgeniy Vorobeychik and John S. Baras and Gy{\"{o}}rgy D{\'{a}}n}, title = {Time-Dependent Strategies in Games of Timing}, booktitle = {Decision and Game Theory for Security - 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11836}, pages = {310--330}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32430-8\_19}, doi = {10.1007/978-3-030-32430-8\_19}, timestamp = {Thu, 07 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/Merlevede0GH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/NguyenYBL19, author = {Thanh Hong Nguyen and Amulya Yadav and Branislav Bosansk{\'{y}} and Yu Liang}, editor = {Tansu Alpcan and Yevgeniy Vorobeychik and John S. Baras and Gy{\"{o}}rgy D{\'{a}}n}, title = {Tackling Sequential Attacks in Security Games}, booktitle = {Decision and Game Theory for Security - 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11836}, pages = {331--351}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32430-8\_20}, doi = {10.1007/978-3-030-32430-8\_20}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/NguyenYBL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/NiuC19, author = {Luyao Niu and Andrew Clark}, editor = {Tansu Alpcan and Yevgeniy Vorobeychik and John S. Baras and Gy{\"{o}}rgy D{\'{a}}n}, title = {A Framework for Joint Attack Detection and Control Under False Data Injection}, booktitle = {Decision and Game Theory for Security - 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11836}, pages = {352--363}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32430-8\_21}, doi = {10.1007/978-3-030-32430-8\_21}, timestamp = {Tue, 06 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/NiuC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/OakleyO19, author = {Lisa Oakley and Alina Oprea}, editor = {Tansu Alpcan and Yevgeniy Vorobeychik and John S. Baras and Gy{\"{o}}rgy D{\'{a}}n}, title = {{\textbackslash}mathsf QFlip : An Adaptive Reinforcement Learning Strategy for the {\textbackslash}mathsf FlipIt Security Game}, booktitle = {Decision and Game Theory for Security - 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11836}, pages = {364--384}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32430-8\_22}, doi = {10.1007/978-3-030-32430-8\_22}, timestamp = {Wed, 23 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/OakleyO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/Ramasubramanian19, author = {Bhaskar Ramasubramanian and Luyao Niu and Andrew Clark and Linda Bushnell and Radha Poovendran}, editor = {Tansu Alpcan and Yevgeniy Vorobeychik and John S. Baras and Gy{\"{o}}rgy D{\'{a}}n}, title = {Linear Temporal Logic Satisfaction in Adversarial Environments Using Secure Control Barrier Certificates}, booktitle = {Decision and Game Theory for Security - 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11836}, pages = {385--403}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32430-8\_23}, doi = {10.1007/978-3-030-32430-8\_23}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/Ramasubramanian19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/RassKP19, author = {Stefan Rass and Sandra K{\"{o}}nig and Emmanouil Panaousis}, editor = {Tansu Alpcan and Yevgeniy Vorobeychik and John S. Baras and Gy{\"{o}}rgy D{\'{a}}n}, title = {Cut-The-Rope: {A} Game of Stealthy Intrusion}, booktitle = {Decision and Game Theory for Security - 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11836}, pages = {404--416}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32430-8\_24}, doi = {10.1007/978-3-030-32430-8\_24}, timestamp = {Thu, 07 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/RassKP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/RuizK19, author = {Kathleen Ruiz and Krystyna Kornecki}, editor = {Tansu Alpcan and Yevgeniy Vorobeychik and John S. Baras and Gy{\"{o}}rgy D{\'{a}}n}, title = {Eco-resilience: Games, art, science}, booktitle = {Decision and Game Theory for Security - 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11836}, pages = {1--11}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1109/GEM.2019.8901974}, doi = {10.1109/GEM.2019.8901974}, timestamp = {Thu, 05 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/RuizK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/SahabanduMABLP19, author = {Dinuka Sahabandu and Shana Moothedath and Joey Allen and Linda Bushnell and Wenke Lee and Radha Poovendran}, editor = {Tansu Alpcan and Yevgeniy Vorobeychik and John S. Baras and Gy{\"{o}}rgy D{\'{a}}n}, title = {Stochastic Dynamic Information Flow Tracking Game with Reinforcement Learning}, booktitle = {Decision and Game Theory for Security - 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11836}, pages = {417--438}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32430-8\_25}, doi = {10.1007/978-3-030-32430-8\_25}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/SahabanduMABLP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/SaritasSSD19, author = {Serkan Saritas and Ezzeldin Shereen and Henrik Sandberg and Gy{\"{o}}rgy D{\'{a}}n}, editor = {Tansu Alpcan and Yevgeniy Vorobeychik and John S. Baras and Gy{\"{o}}rgy D{\'{a}}n}, title = {Adversarial Attacks on Continuous Authentication Security: {A} Dynamic Game Approach}, booktitle = {Decision and Game Theory for Security - 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11836}, pages = {439--458}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32430-8\_26}, doi = {10.1007/978-3-030-32430-8\_26}, timestamp = {Thu, 07 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/SaritasSSD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/SayinB19, author = {Muhammed O. Sayin and Tamer Basar}, editor = {Tansu Alpcan and Yevgeniy Vorobeychik and John S. Baras and Gy{\"{o}}rgy D{\'{a}}n}, title = {On the Optimality of Linear Signaling to Deceive Kalman Filters over Finite/Infinite Horizons}, booktitle = {Decision and Game Theory for Security - 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11836}, pages = {459--478}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32430-8\_27}, doi = {10.1007/978-3-030-32430-8\_27}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/SayinB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/ScavarelliAT19, author = {Anthony Scavarelli and Ali Arya and Robert J. Teather}, editor = {Tansu Alpcan and Yevgeniy Vorobeychik and John S. Baras and Gy{\"{o}}rgy D{\'{a}}n}, title = {Circles: exploring multi-platform accessible, socially scalable {VR} in the classroom}, booktitle = {Decision and Game Theory for Security - 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11836}, pages = {1--4}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1109/GEM.2019.8897532}, doi = {10.1109/GEM.2019.8897532}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/ScavarelliAT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/SenguptaCHK19, author = {Sailik Sengupta and Ankur Chowdhary and Dijiang Huang and Subbarao Kambhampati}, editor = {Tansu Alpcan and Yevgeniy Vorobeychik and John S. Baras and Gy{\"{o}}rgy D{\'{a}}n}, title = {General Sum Markov Games for Strategic Detection of Advanced Persistent Threats Using Moving Target Defense in Cloud Networks}, booktitle = {Decision and Game Theory for Security - 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11836}, pages = {492--512}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32430-8\_29}, doi = {10.1007/978-3-030-32430-8\_29}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/SenguptaCHK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/SenguptaCK19, author = {Sailik Sengupta and Tathagata Chakraborti and Subbarao Kambhampati}, editor = {Tansu Alpcan and Yevgeniy Vorobeychik and John S. Baras and Gy{\"{o}}rgy D{\'{a}}n}, title = {MTDeep: Boosting the Security of Deep Neural Nets Against Adversarial Attacks with Moving Target Defense}, booktitle = {Decision and Game Theory for Security - 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11836}, pages = {479--491}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32430-8\_28}, doi = {10.1007/978-3-030-32430-8\_28}, timestamp = {Wed, 23 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/SenguptaCK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/Slinko19, author = {Arkadii Slinko}, editor = {Tansu Alpcan and Yevgeniy Vorobeychik and John S. Baras and Gy{\"{o}}rgy D{\'{a}}n}, title = {Operations over Linear Secret Sharing Schemes}, booktitle = {Decision and Game Theory for Security - 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11836}, pages = {513--524}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32430-8\_30}, doi = {10.1007/978-3-030-32430-8\_30}, timestamp = {Wed, 23 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/Slinko19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/ThakoorTVXKF19, author = {Omkar Thakoor and Milind Tambe and Phebe Vayanos and Haifeng Xu and Christopher Kiekintveld and Fei Fang}, editor = {Tansu Alpcan and Yevgeniy Vorobeychik and John S. Baras and Gy{\"{o}}rgy D{\'{a}}n}, title = {Cyber Camouflage Games for Strategic Deception}, booktitle = {Decision and Game Theory for Security - 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11836}, pages = {525--541}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32430-8\_31}, doi = {10.1007/978-3-030-32430-8\_31}, timestamp = {Wed, 07 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/ThakoorTVXKF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/WangTBA19, author = {Xinrun Wang and Milind Tambe and Branislav Bosansk{\'{y}} and Bo An}, editor = {Tansu Alpcan and Yevgeniy Vorobeychik and John S. Baras and Gy{\"{o}}rgy D{\'{a}}n}, title = {When Players Affect Target Values: Modeling and Solving Dynamic Partially Observable Security Games}, booktitle = {Decision and Game Theory for Security - 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11836}, pages = {542--562}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32430-8\_32}, doi = {10.1007/978-3-030-32430-8\_32}, timestamp = {Wed, 06 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/WangTBA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/Warren19, author = {Jonah Warren}, editor = {Tansu Alpcan and Yevgeniy Vorobeychik and John S. Baras and Gy{\"{o}}rgy D{\'{a}}n}, title = {Tiny online game engines}, booktitle = {Decision and Game Theory for Security - 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11836}, pages = {1--7}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1109/GEM.2019.8901975}, doi = {10.1109/GEM.2019.8901975}, timestamp = {Thu, 05 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/Warren19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/YaakovWMA19, author = {Yoav Ben Yaakov and Xinrun Wang and Joachim Meyer and Bo An}, editor = {Tansu Alpcan and Yevgeniy Vorobeychik and John S. Baras and Gy{\"{o}}rgy D{\'{a}}n}, title = {Choosing Protection: User Investments in Security Measures for Cyber Risk Management}, booktitle = {Decision and Game Theory for Security - 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11836}, pages = {33--44}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32430-8\_3}, doi = {10.1007/978-3-030-32430-8\_3}, timestamp = {Fri, 11 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/YaakovWMA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/YasunagaK19, author = {Kenji Yasunaga and Takeshi Koshiba}, editor = {Tansu Alpcan and Yevgeniy Vorobeychik and John S. Baras and Gy{\"{o}}rgy D{\'{a}}n}, title = {Perfectly Secure Message Transmission Against Independent Rational Adversaries}, booktitle = {Decision and Game Theory for Security - 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11836}, pages = {563--582}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32430-8\_33}, doi = {10.1007/978-3-030-32430-8\_33}, timestamp = {Thu, 07 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/YasunagaK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/gamesec/2019, editor = {Tansu Alpcan and Yevgeniy Vorobeychik and John S. Baras and Gy{\"{o}}rgy D{\'{a}}n}, title = {Decision and Game Theory for Security - 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11836}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32430-8}, doi = {10.1007/978-3-030-32430-8}, isbn = {978-3-030-32429-2}, timestamp = {Wed, 23 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/0003RAAVEHLM18, author = {Yi Han and Benjamin I. P. Rubinstein and Tamas Abraham and Tansu Alpcan and Olivier Y. de Vel and Sarah M. Erfani and David Hubczenko and Christopher Leckie and Paul Montague}, editor = {Linda Bushnell and Radha Poovendran and Tamer Basar}, title = {Reinforcement Learning for Autonomous Defence in Software-Defined Networking}, booktitle = {Decision and Game Theory for Security - 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11199}, pages = {145--165}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01554-1\_9}, doi = {10.1007/978-3-030-01554-1\_9}, timestamp = {Tue, 07 May 2024 20:08:32 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/0003RAAVEHLM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/0011Z18, author = {Tao Zhang and Quanyan Zhu}, editor = {Linda Bushnell and Radha Poovendran and Tamer Basar}, title = {Hypothesis Testing Game for Cyber Deception}, booktitle = {Decision and Game Theory for Security - 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11199}, pages = {540--555}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01554-1\_31}, doi = {10.1007/978-3-030-01554-1\_31}, timestamp = {Wed, 24 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/0011Z18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/AlzahraniB18, author = {Naif Alzahrani and Nirupama Bulusu}, editor = {Linda Bushnell and Radha Poovendran and Tamer Basar}, title = {Towards True Decentralization: {A} Blockchain Consensus Protocol Based on Game Theory and Randomness}, booktitle = {Decision and Game Theory for Security - 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11199}, pages = {465--485}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01554-1\_27}, doi = {10.1007/978-3-030-01554-1\_27}, timestamp = {Wed, 24 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/AlzahraniB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/BasakCGCKJBK18, author = {Anjon Basak and Jakub Cern{\'{y}} and Marcus Gutierrez and Shelby R. Curtis and Charles A. Kamhoua and Daniel Jones and Branislav Bosansk{\'{y}} and Christopher Kiekintveld}, editor = {Linda Bushnell and Radha Poovendran and Tamer Basar}, title = {An Initial Study of Targeted Personality Models in the FlipIt Game}, booktitle = {Decision and Game Theory for Security - 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11199}, pages = {623--636}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01554-1\_36}, doi = {10.1007/978-3-030-01554-1\_36}, timestamp = {Fri, 05 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/BasakCGCKJBK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/BasakGK18, author = {Anjon Basak and Marcus Gutierrez and Christopher Kiekintveld}, editor = {Linda Bushnell and Radha Poovendran and Tamer Basar}, title = {Algorithms for Subgame Abstraction with Applications to Cyber Defense}, booktitle = {Decision and Game Theory for Security - 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11199}, pages = {556--568}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01554-1\_32}, doi = {10.1007/978-3-030-01554-1\_32}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/BasakGK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/BilinskiGM18, author = {Mark Bilinski and Ryan Gabrys and Justin Mauger}, editor = {Linda Bushnell and Radha Poovendran and Tamer Basar}, title = {Optimal Placement of Honeypots for Network Defense}, booktitle = {Decision and Game Theory for Security - 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11199}, pages = {115--126}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01554-1\_7}, doi = {10.1007/978-3-030-01554-1\_7}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/BilinskiGM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/ChenHBJ18, author = {Jundong Chen and Md. Shafaeat Hossain and Matthias R. Brust and Naomi Johnson}, editor = {Linda Bushnell and Radha Poovendran and Tamer Basar}, title = {A Game Theoretic Analysis of the Twitter Follow-Unfollow Mechanism}, booktitle = {Decision and Game Theory for Security - 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11199}, pages = {265--276}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01554-1\_15}, doi = {10.1007/978-3-030-01554-1\_15}, timestamp = {Thu, 14 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/ChenHBJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/ClouseB18, author = {Daniel Clouse and David Burke}, editor = {Linda Bushnell and Radha Poovendran and Tamer Basar}, title = {Approximating Power Indices to Assess Cybersecurity Criticality}, booktitle = {Decision and Game Theory for Security - 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11199}, pages = {346--365}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01554-1\_20}, doi = {10.1007/978-3-030-01554-1\_20}, timestamp = {Wed, 24 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/ClouseB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/DemazyKA18, author = {Antonin Demazy and Alexander C. Kalloniatis and Tansu Alpcan}, editor = {Linda Bushnell and Radha Poovendran and Tamer Basar}, title = {A Game-Theoretic Analysis of the Adversarial Boyd-Kuramoto Model}, booktitle = {Decision and Game Theory for Security - 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11199}, pages = {248--264}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01554-1\_14}, doi = {10.1007/978-3-030-01554-1\_14}, timestamp = {Wed, 02 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/DemazyKA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/FeldmanFG18, author = {Moran Feldman and Gonen Frim and Rica Gonen}, editor = {Linda Bushnell and Radha Poovendran and Tamer Basar}, title = {Multi-sided Advertising Markets: Dynamic Mechanisms and Incremental User Compensations}, booktitle = {Decision and Game Theory for Security - 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11199}, pages = {227--247}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01554-1\_13}, doi = {10.1007/978-3-030-01554-1\_13}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/FeldmanFG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/FujitaYK18, author = {Maiki Fujita and Kenji Yasunaga and Takeshi Koshiba}, editor = {Linda Bushnell and Radha Poovendran and Tamer Basar}, title = {Perfectly Secure Message Transmission Against Rational Timid Adversaries}, booktitle = {Decision and Game Theory for Security - 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11199}, pages = {127--144}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01554-1\_8}, doi = {10.1007/978-3-030-01554-1\_8}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/FujitaYK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/HeymanG18, author = {Joseph L. Heyman and Abhishek Gupta}, editor = {Linda Bushnell and Radha Poovendran and Tamer Basar}, title = {Colonel Blotto Game with Coalition Formation for Sharing Resources}, booktitle = {Decision and Game Theory for Security - 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11199}, pages = {166--185}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01554-1\_10}, doi = {10.1007/978-3-030-01554-1\_10}, timestamp = {Sat, 03 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/HeymanG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/HuangS18, author = {Chong Huang and Lalitha Sankar}, editor = {Linda Bushnell and Radha Poovendran and Tamer Basar}, title = {Impact of Privacy on Free Online Service Markets}, booktitle = {Decision and Game Theory for Security - 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11199}, pages = {1--21}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01554-1\_1}, doi = {10.1007/978-3-030-01554-1\_1}, timestamp = {Wed, 24 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/HuangS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/HuangZ18, author = {Linan Huang and Quanyan Zhu}, editor = {Linda Bushnell and Radha Poovendran and Tamer Basar}, title = {Analysis and Computation of Adaptive Defense Strategies Against Advanced Persistent Threats for Cyber-Physical Systems}, booktitle = {Decision and Game Theory for Security - 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11199}, pages = {205--226}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01554-1\_12}, doi = {10.1007/978-3-030-01554-1\_12}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/HuangZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/KiumarsiB18, author = {Bahare Kiumarsi and Tamer Basar}, editor = {Linda Bushnell and Radha Poovendran and Tamer Basar}, title = {Distributed Aggregative Games on Graphs in Adversarial Environments}, booktitle = {Decision and Game Theory for Security - 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11199}, pages = {296--313}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01554-1\_17}, doi = {10.1007/978-3-030-01554-1\_17}, timestamp = {Wed, 24 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/KiumarsiB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/KrawecM18, author = {Walter O. Krawec and Fei Miao}, editor = {Linda Bushnell and Radha Poovendran and Tamer Basar}, title = {Game Theoretic Security Framework for Quantum Key Distribution}, booktitle = {Decision and Game Theory for Security - 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11199}, pages = {38--58}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01554-1\_3}, doi = {10.1007/978-3-030-01554-1\_3}, timestamp = {Wed, 24 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/KrawecM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/LaszkaPG18, author = {Aron Laszka and Emmanouil Panaousis and Jens Grossklags}, editor = {Linda Bushnell and Radha Poovendran and Tamer Basar}, title = {Cyber-Insurance as a Signaling Game: Self-reporting and External Security Audits}, booktitle = {Decision and Game Theory for Security - 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11199}, pages = {508--520}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01554-1\_29}, doi = {10.1007/978-3-030-01554-1\_29}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/LaszkaPG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/LiuCC18, author = {Yongshuai Liu and Jiyu Chen and Hao Chen}, editor = {Linda Bushnell and Radha Poovendran and Tamer Basar}, title = {Less is More: Culling the Training Set to Improve Robustness of Deep Neural Networks}, booktitle = {Decision and Game Theory for Security - 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11199}, pages = {102--114}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01554-1\_6}, doi = {10.1007/978-3-030-01554-1\_6}, timestamp = {Wed, 20 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/LiuCC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/MaJ0018, author = {Yuzhe Ma and Kwang{-}Sung Jun and Lihong Li and Xiaojin Zhu}, editor = {Linda Bushnell and Radha Poovendran and Tamer Basar}, title = {Data Poisoning Attacks in Contextual Bandits}, booktitle = {Decision and Game Theory for Security - 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11199}, pages = {186--204}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01554-1\_11}, doi = {10.1007/978-3-030-01554-1\_11}, timestamp = {Wed, 24 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/MaJ0018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/MiehlingXPB18, author = {Erik Miehling and Baicen Xiao and Radha Poovendran and Tamer Basar}, editor = {Linda Bushnell and Radha Poovendran and Tamer Basar}, title = {A Bayesian Multi-armed Bandit Approach for Identifying Human Vulnerabilities}, booktitle = {Decision and Game Theory for Security - 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11199}, pages = {521--539}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01554-1\_30}, doi = {10.1007/978-3-030-01554-1\_30}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/MiehlingXPB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/MoothedathSC0LP18, author = {Shana Moothedath and Dinuka Sahabandu and Andrew Clark and Sangho Lee and Wenke Lee and Radha Poovendran}, editor = {Linda Bushnell and Radha Poovendran and Tamer Basar}, title = {Multi-stage Dynamic Information Flow Tracking Game}, booktitle = {Decision and Game Theory for Security - 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11199}, pages = {80--101}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01554-1\_5}, doi = {10.1007/978-3-030-01554-1\_5}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/MoothedathSC0LP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/NguyenWS18, author = {Linh Nguyen and Sky Wang and Arunesh Sinha}, editor = {Linda Bushnell and Radha Poovendran and Tamer Basar}, title = {A Learning and Masking Approach to Secure Learning}, booktitle = {Decision and Game Theory for Security - 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11199}, pages = {453--464}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01554-1\_26}, doi = {10.1007/978-3-030-01554-1\_26}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/NguyenWS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/NiuC18, author = {Luyao Niu and Andrew Clark}, editor = {Linda Bushnell and Radha Poovendran and Tamer Basar}, title = {A Differentially Private and Truthful Incentive Mechanism for Traffic Offload to Public Transportation}, booktitle = {Decision and Game Theory for Security - 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11199}, pages = {366--385}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01554-1\_21}, doi = {10.1007/978-3-030-01554-1\_21}, timestamp = {Tue, 06 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/NiuC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/Nojoumian18, author = {Mehrdad Nojoumian}, editor = {Linda Bushnell and Radha Poovendran and Tamer Basar}, title = {Rational Trust Modeling}, booktitle = {Decision and Game Theory for Security - 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11199}, pages = {418--431}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01554-1\_24}, doi = {10.1007/978-3-030-01554-1\_24}, timestamp = {Wed, 24 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/Nojoumian18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/OuTDV18, author = {Han{-}Ching Ou and Milind Tambe and Bistra Dilkina and Phebe Vayanos}, editor = {Linda Bushnell and Radha Poovendran and Tamer Basar}, title = {Imbalanced Collusive Security Games}, booktitle = {Decision and Game Theory for Security - 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11199}, pages = {583--602}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01554-1\_34}, doi = {10.1007/978-3-030-01554-1\_34}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/OuTDV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/PlewtongD18, author = {Nick Plewtong and Bruce DeBruhl}, editor = {Linda Bushnell and Radha Poovendran and Tamer Basar}, title = {Game Theoretic Analysis of a Byzantine Attacker in Vehicular Mix-Zones}, booktitle = {Decision and Game Theory for Security - 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11199}, pages = {277--295}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01554-1\_16}, doi = {10.1007/978-3-030-01554-1\_16}, timestamp = {Wed, 24 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/PlewtongD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/RahmattalabiVT18, author = {Aida Rahmattalabi and Phebe Vayanos and Milind Tambe}, editor = {Linda Bushnell and Radha Poovendran and Tamer Basar}, title = {A Robust Optimization Approach to Designing Near-Optimal Strategies for Constant-Sum Monitoring Games}, booktitle = {Decision and Game Theory for Security - 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11199}, pages = {603--622}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01554-1\_35}, doi = {10.1007/978-3-030-01554-1\_35}, timestamp = {Wed, 24 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/RahmattalabiVT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/SayinHPB18, author = {Muhammed O. Sayin and Hossein Hosseini and Radha Poovendran and Tamer Basar}, editor = {Linda Bushnell and Radha Poovendran and Tamer Basar}, title = {A Game Theoretical Framework for Inter-process Adversarial Intervention Detection}, booktitle = {Decision and Game Theory for Security - 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11199}, pages = {486--507}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01554-1\_28}, doi = {10.1007/978-3-030-01554-1\_28}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/SayinHPB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/SenAZVM018, author = {Ayon Sen and Scott Alfeld and Xuezhou Zhang and Ara Vartanian and Yuzhe Ma and Xiaojin Zhu}, editor = {Linda Bushnell and Radha Poovendran and Tamer Basar}, title = {Training Set Camouflage}, booktitle = {Decision and Game Theory for Security - 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11199}, pages = {59--79}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01554-1\_4}, doi = {10.1007/978-3-030-01554-1\_4}, timestamp = {Wed, 24 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/SenAZVM018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/SenguptaCHK18, author = {Sailik Sengupta and Ankur Chowdhary and Dijiang Huang and Subbarao Kambhampati}, editor = {Linda Bushnell and Radha Poovendran and Tamer Basar}, title = {Moving Target Defense for the Placement of Intrusion Detection Systems in the Cloud}, booktitle = {Decision and Game Theory for Security - 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11199}, pages = {326--345}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01554-1\_19}, doi = {10.1007/978-3-030-01554-1\_19}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/SenguptaCHK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/SinhaSDT18, author = {Arunesh Sinha and Aaron Schlenker and Donnabell Dmello and Milind Tambe}, editor = {Linda Bushnell and Radha Poovendran and Tamer Basar}, title = {Scaling-Up Stackelberg Security Games Applications Using Approximations}, booktitle = {Decision and Game Theory for Security - 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11199}, pages = {432--452}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01554-1\_25}, doi = {10.1007/978-3-030-01554-1\_25}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/SinhaSDT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/SpringP18, author = {Jonathan M. Spring and David J. Pym}, editor = {Linda Bushnell and Radha Poovendran and Tamer Basar}, title = {Towards Scientific Incident Response}, booktitle = {Decision and Game Theory for Security - 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11199}, pages = {398--417}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01554-1\_23}, doi = {10.1007/978-3-030-01554-1\_23}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/SpringP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/WachterRKS18, author = {Jasmin Wachter and Stefan Rass and Sandra K{\"{o}}nig and Stefan Schauer}, editor = {Linda Bushnell and Radha Poovendran and Tamer Basar}, title = {Disappointment-Aversion in Security Games}, booktitle = {Decision and Game Theory for Security - 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11199}, pages = {314--325}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01554-1\_18}, doi = {10.1007/978-3-030-01554-1\_18}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/WachterRKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/WangZ18, author = {Wei Wang and Bo Zeng}, editor = {Linda Bushnell and Radha Poovendran and Tamer Basar}, title = {A Two-Stage Deception Game for Network Defense}, booktitle = {Decision and Game Theory for Security - 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11199}, pages = {569--582}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01554-1\_33}, doi = {10.1007/978-3-030-01554-1\_33}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/WangZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/WeerasingheAELP18, author = {Sandamal Weerasinghe and Tansu Alpcan and Sarah M. Erfani and Christopher Leckie and Peyam Pourbeik and Jack Riddle}, editor = {Linda Bushnell and Radha Poovendran and Tamer Basar}, title = {Deep Learning Based Game-Theoretical Approach to Evade Jamming Attacks}, booktitle = {Decision and Game Theory for Security - 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11199}, pages = {386--397}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01554-1\_22}, doi = {10.1007/978-3-030-01554-1\_22}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/WeerasingheAELP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/WoodsS18, author = {Daniel W. Woods and Andrew C. Simpson}, editor = {Linda Bushnell and Radha Poovendran and Tamer Basar}, title = {Cyber-Warranties as a Quality Signal for Information Security Products}, booktitle = {Decision and Game Theory for Security - 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11199}, pages = {22--37}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01554-1\_2}, doi = {10.1007/978-3-030-01554-1\_2}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/WoodsS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/gamesec/2018, editor = {Linda Bushnell and Radha Poovendran and Tamer Basar}, title = {Decision and Game Theory for Security - 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11199}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01554-1}, doi = {10.1007/978-3-030-01554-1}, isbn = {978-3-030-01553-4}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/AiBCMS17, author = {Yun Ai and Manav R. Bhatnagar and Michael Cheffena and Aashish Mathur and Artem A. Sedakov}, editor = {Stefan Rass and Bo An and Christopher Kiekintveld and Fei Fang and Stefan Schauer}, title = {Game-Theoretical Analysis of {PLC} System Performance in the Presence of Jamming Attacks}, booktitle = {Decision and Game Theory for Security - 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10575}, pages = {74--90}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68711-7\_5}, doi = {10.1007/978-3-319-68711-7\_5}, timestamp = {Wed, 07 Feb 2024 17:23:12 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/AiBCMS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/Alvim00P17, author = {M{\'{a}}rio S. Alvim and Konstantinos Chatzikokolakis and Yusuke Kawamoto and Catuscia Palamidessi}, editor = {Stefan Rass and Bo An and Christopher Kiekintveld and Fei Fang and Stefan Schauer}, title = {Information Leakage Games}, booktitle = {Decision and Game Theory for Security - 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10575}, pages = {437--457}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68711-7\_23}, doi = {10.1007/978-3-319-68711-7\_23}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/Alvim00P17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/AngCJY17, author = {Samuel Ang and Hau Chan and Albert Xin Jiang and William Yeoh}, editor = {Stefan Rass and Bo An and Christopher Kiekintveld and Fei Fang and Stefan Schauer}, title = {Game-Theoretic Goal Recognition Models with Applications to Security Domains}, booktitle = {Decision and Game Theory for Security - 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10575}, pages = {256--272}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68711-7\_14}, doi = {10.1007/978-3-319-68711-7\_14}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/AngCJY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/BahamondesCMO17, author = {Basti{\'{a}}n Bahamondes and Jos{\'{e}} Correa and Jannik Matuschke and Gianpaolo Oriolo}, editor = {Stefan Rass and Bo An and Christopher Kiekintveld and Fei Fang and Stefan Schauer}, title = {Adaptivity in Network Interdiction}, booktitle = {Decision and Game Theory for Security - 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10575}, pages = {40--52}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68711-7\_3}, doi = {10.1007/978-3-319-68711-7\_3}, timestamp = {Wed, 03 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/BahamondesCMO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/BondiFKNDTIH17, author = {Elizabeth Bondi and Fei Fang and Debarun Kar and Venil Loyd Noronha and Donnabell Dmello and Milind Tambe and Arvind Iyer and Robert Hannaford}, editor = {Stefan Rass and Bo An and Christopher Kiekintveld and Fei Fang and Stefan Schauer}, title = {{VIOLA:} Video Labeling Application for Security Domains}, booktitle = {Decision and Game Theory for Security - 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10575}, pages = {377--396}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68711-7\_20}, doi = {10.1007/978-3-319-68711-7\_20}, timestamp = {Wed, 07 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/BondiFKNDTIH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/BucareyCFRNO17, author = {Victor Bucarey and Carlos Casorr{\'{a}}n and {\'{O}}scar Figueroa and Karla Rosas and Hugo F. Navarrete and Fernando Ord{\'{o}}{\~{n}}ez}, editor = {Stefan Rass and Bo An and Christopher Kiekintveld and Fei Fang and Stefan Schauer}, title = {Building Real Stackelberg Security Games for Border Patrols}, booktitle = {Decision and Game Theory for Security - 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10575}, pages = {193--212}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68711-7\_11}, doi = {10.1007/978-3-319-68711-7\_11}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/BucareyCFRNO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/CampanelliG17, author = {Matteo Campanelli and Rosario Gennaro}, editor = {Stefan Rass and Bo An and Christopher Kiekintveld and Fei Fang and Stefan Schauer}, title = {Efficient Rational Proofs for Space Bounded Computations}, booktitle = {Decision and Game Theory for Security - 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10575}, pages = {53--73}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68711-7\_4}, doi = {10.1007/978-3-319-68711-7\_4}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/CampanelliG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/CaulfieldIP17, author = {Tristan Caulfield and Christos Ioannidis and David J. Pym}, editor = {Stefan Rass and Bo An and Christopher Kiekintveld and Fei Fang and Stefan Schauer}, title = {The {U.S.} Vulnerabilities Equities Process: An Economic Perspective}, booktitle = {Decision and Game Theory for Security - 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10575}, pages = {131--150}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68711-7\_8}, doi = {10.1007/978-3-319-68711-7\_8}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/CaulfieldIP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/CuiRJ17, author = {Jinshu Cui and Heather Rosoff and Richard S. John}, editor = {Stefan Rass and Bo An and Christopher Kiekintveld and Fei Fang and Stefan Schauer}, title = {Deterrence of Cyber Attackers in a Three-Player Behavioral Game}, booktitle = {Decision and Game Theory for Security - 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10575}, pages = {418--436}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68711-7\_22}, doi = {10.1007/978-3-319-68711-7\_22}, timestamp = {Wed, 18 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/CuiRJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/DurkotaLKHBP17, author = {Karel Durkota and Viliam Lis{\'{y}} and Christopher Kiekintveld and Karel Hor{\'{a}}k and Branislav Bosansk{\'{y}} and Tom{\'{a}}s Pevn{\'{y}}}, editor = {Stefan Rass and Bo An and Christopher Kiekintveld and Fei Fang and Stefan Schauer}, title = {Optimal Strategies for Detecting Data Exfiltration by Internal and External Attackers}, booktitle = {Decision and Game Theory for Security - 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10575}, pages = {171--192}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68711-7\_10}, doi = {10.1007/978-3-319-68711-7\_10}, timestamp = {Tue, 19 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/DurkotaLKHBP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/FengZMC17, author = {Xiaotao Feng and Zizhan Zheng and Prasant Mohapatra and Derya Cansever}, editor = {Stefan Rass and Bo An and Christopher Kiekintveld and Fei Fang and Stefan Schauer}, title = {A Stackelberg Game and Markov Modeling of Moving Target Defense}, booktitle = {Decision and Game Theory for Security - 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10575}, pages = {315--335}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68711-7\_17}, doi = {10.1007/978-3-319-68711-7\_17}, timestamp = {Wed, 18 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/FengZMC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/HayelZ17, author = {Yezekael Hayel and Quanyan Zhu}, editor = {Stefan Rass and Bo An and Christopher Kiekintveld and Fei Fang and Stefan Schauer}, title = {Dynamics of Strategic Protection Against Virus Propagation in Heterogeneous Complex Networks}, booktitle = {Decision and Game Theory for Security - 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10575}, pages = {506--518}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68711-7\_27}, doi = {10.1007/978-3-319-68711-7\_27}, timestamp = {Wed, 18 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/HayelZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/HeM17, author = {Xiaobing He and Hermann de Meer}, editor = {Stefan Rass and Bo An and Christopher Kiekintveld and Fei Fang and Stefan Schauer}, title = {A Stochastic Game-Theoretic Model for Smart Grid Communication Networks}, booktitle = {Decision and Game Theory for Security - 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10575}, pages = {295--314}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68711-7\_16}, doi = {10.1007/978-3-319-68711-7\_16}, timestamp = {Wed, 18 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/HeM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/HorakZB17, author = {Karel Hor{\'{a}}k and Quanyan Zhu and Branislav Bosansk{\'{y}}}, editor = {Stefan Rass and Bo An and Christopher Kiekintveld and Fei Fang and Stefan Schauer}, title = {Manipulating Adversary's Belief: {A} Dynamic Game Approach to Deception by Design for Proactive Network Security}, booktitle = {Decision and Game Theory for Security - 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10575}, pages = {273--294}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68711-7\_15}, doi = {10.1007/978-3-319-68711-7\_15}, timestamp = {Tue, 19 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/HorakZB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/HuangCZ17, author = {Linan Huang and Juntao Chen and Quanyan Zhu}, editor = {Stefan Rass and Bo An and Christopher Kiekintveld and Fei Fang and Stefan Schauer}, title = {A Large-Scale Markov Game Approach to Dynamic Protection of Interdependent Infrastructure Networks}, booktitle = {Decision and Game Theory for Security - 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10575}, pages = {357--376}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68711-7\_19}, doi = {10.1007/978-3-319-68711-7\_19}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/HuangCZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/IsmailKL017, author = {Ziad Ismail and Christophe Kiennert and Jean Leneutre and Lin Chen}, editor = {Stefan Rass and Bo An and Christopher Kiekintveld and Fei Fang and Stefan Schauer}, title = {A Game Theoretical Model for Optimal Distribution of Network Security Resources}, booktitle = {Decision and Game Theory for Security - 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10575}, pages = {234--255}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68711-7\_13}, doi = {10.1007/978-3-319-68711-7\_13}, timestamp = {Wed, 18 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/IsmailKL017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/LaanBBM17, author = {Corine M. Laan and Ana Isabel Barros and Richard J. Boucherie and Herman Monsuur}, editor = {Stefan Rass and Bo An and Christopher Kiekintveld and Fei Fang and Stefan Schauer}, title = {Security Games with Probabilistic Constraints on the Agent's Strategy}, booktitle = {Decision and Game Theory for Security - 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10575}, pages = {481--493}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68711-7\_25}, doi = {10.1007/978-3-319-68711-7\_25}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/LaanBBM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/LaszkaFG17, author = {Aron Laszka and Sadegh Farhang and Jens Grossklags}, editor = {Stefan Rass and Bo An and Christopher Kiekintveld and Fei Fang and Stefan Schauer}, title = {On the Economics of Ransomware}, booktitle = {Decision and Game Theory for Security - 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10575}, pages = {397--417}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68711-7\_21}, doi = {10.1007/978-3-319-68711-7\_21}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/LaszkaFG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/NguyenWS17, author = {Thanh Hong Nguyen and Michael P. Wellman and Satinder Singh}, editor = {Stefan Rass and Bo An and Christopher Kiekintveld and Fei Fang and Stefan Schauer}, title = {A Stackelberg Game Model for Botnet Data Exfiltration}, booktitle = {Decision and Game Theory for Security - 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10575}, pages = {151--170}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68711-7\_9}, doi = {10.1007/978-3-319-68711-7\_9}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/NguyenWS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/PawlickZ17, author = {Jeffrey Pawlick and Quanyan Zhu}, editor = {Stefan Rass and Bo An and Christopher Kiekintveld and Fei Fang and Stefan Schauer}, title = {Proactive Defense Against Physical Denial of Service Attacks Using Poisson Signaling Games}, booktitle = {Decision and Game Theory for Security - 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10575}, pages = {336--356}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68711-7\_18}, doi = {10.1007/978-3-319-68711-7\_18}, timestamp = {Wed, 18 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/PawlickZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/RajtmajerSSSB17, author = {Sarah Michele Rajtmajer and Anna Cinzia Squicciarini and Jose M. Such and Justin Semonsen and Andrew Belmonte}, editor = {Stefan Rass and Bo An and Christopher Kiekintveld and Fei Fang and Stefan Schauer}, title = {An Ultimatum Game Model for the Evolution of Privacy in Jointly Managed Content}, booktitle = {Decision and Game Theory for Security - 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10575}, pages = {112--130}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68711-7\_7}, doi = {10.1007/978-3-319-68711-7\_7}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/RajtmajerSSSB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/RassKS17, author = {Stefan Rass and Sandra K{\"{o}}nig and Stefan Schauer}, editor = {Stefan Rass and Bo An and Christopher Kiekintveld and Fei Fang and Stefan Schauer}, title = {On the Cost of Game Playing: How to Control the Expenses in Mixed Strategies}, booktitle = {Decision and Game Theory for Security - 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10575}, pages = {494--505}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68711-7\_26}, doi = {10.1007/978-3-319-68711-7\_26}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/RassKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/RosenfeldMK17, author = {Ariel Rosenfeld and Oleg Maksimov and Sarit Kraus}, editor = {Stefan Rass and Bo An and Christopher Kiekintveld and Fei Fang and Stefan Schauer}, title = {Optimizing Traffic Enforcement: From the Lab to the Roads}, booktitle = {Decision and Game Theory for Security - 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10575}, pages = {3--20}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68711-7\_1}, doi = {10.1007/978-3-319-68711-7\_1}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/RosenfeldMK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/SayinB17, author = {Muhammed O. Sayin and Tamer Basar}, editor = {Stefan Rass and Bo An and Christopher Kiekintveld and Fei Fang and Stefan Schauer}, title = {Secure Sensor Design for Cyber-Physical Systems Against Advanced Persistent Threats}, booktitle = {Decision and Game Theory for Security - 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10575}, pages = {91--111}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68711-7\_6}, doi = {10.1007/978-3-319-68711-7\_6}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/SayinB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/ToshVSSKNK17, author = {Deepak K. Tosh and Iman Vakilinia and Sachin Shetty and Shamik Sengupta and Charles A. Kamhoua and Laurent Njilla and Kevin A. Kwiat}, editor = {Stefan Rass and Bo An and Christopher Kiekintveld and Fei Fang and Stefan Schauer}, title = {Three Layer Game Theoretic Decision Framework for Cyber-Investment and Cyber-Insurance}, booktitle = {Decision and Game Theory for Security - 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10575}, pages = {519--532}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68711-7\_28}, doi = {10.1007/978-3-319-68711-7\_28}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/ToshVSSKNK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/XuFFDPTDWRNM17, author = {Haifeng Xu and Benjamin J. Ford and Fei Fang and Bistra Dilkina and Andrew J. Plumptre and Milind Tambe and Margaret Driciru and Fred Wanyama and Aggrey Rwetsiba and Mustapha Nsubaga and Joshua Mabonga}, editor = {Stefan Rass and Bo An and Christopher Kiekintveld and Fei Fang and Stefan Schauer}, title = {Optimal Patrol Planning for Green Security Games with Black-Box Attackers}, booktitle = {Decision and Game Theory for Security - 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10575}, pages = {458--477}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68711-7\_24}, doi = {10.1007/978-3-319-68711-7\_24}, timestamp = {Wed, 07 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/XuFFDPTDWRNM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/ZhangZ17, author = {Tao Zhang and Quanyan Zhu}, editor = {Stefan Rass and Bo An and Christopher Kiekintveld and Fei Fang and Stefan Schauer}, title = {Strategic Defense Against Deceptive Civilian {GPS} Spoofing of Unmanned Aerial Vehicles}, booktitle = {Decision and Game Theory for Security - 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10575}, pages = {213--233}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68711-7\_12}, doi = {10.1007/978-3-319-68711-7\_12}, timestamp = {Thu, 19 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/ZhangZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/ZolotavkinGR17, author = {Yevhen Zolotavkin and Juli{\'{a}}n Garc{\'{\i}}a and Carsten Rudolph}, editor = {Stefan Rass and Bo An and Christopher Kiekintveld and Fei Fang and Stefan Schauer}, title = {Incentive Compatibility of Pay Per Last {N} Shares in Bitcoin Mining Pools}, booktitle = {Decision and Game Theory for Security - 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10575}, pages = {21--39}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68711-7\_2}, doi = {10.1007/978-3-319-68711-7\_2}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/ZolotavkinGR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/gamesec/2017, editor = {Stefan Rass and Bo An and Christopher Kiekintveld and Fei Fang and Stefan Schauer}, title = {Decision and Game Theory for Security - 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10575}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68711-7}, doi = {10.1007/978-3-319-68711-7}, isbn = {978-3-319-68710-0}, timestamp = {Wed, 07 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/AlpernLM016, author = {Steve Alpern and Thomas Lidbetter and Alec Morton and Katerina Papadaki}, editor = {Quanyan Zhu and Tansu Alpcan and Emmanouil A. Panaousis and Milind Tambe and William Casey}, title = {Patrolling a Pipeline}, booktitle = {Decision and Game Theory for Security - 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9996}, pages = {129--138}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47413-7\_8}, doi = {10.1007/978-3-319-47413-7\_8}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/AlpernLM016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/AltmanSTL16, author = {Eitan Altman and Aniruddha Singhal and Corinne Touati and Jie Li}, editor = {Quanyan Zhu and Tansu Alpcan and Emmanouil A. Panaousis and Milind Tambe and William Casey}, title = {Resilience of Routing in Parallel Link Networks}, booktitle = {Decision and Game Theory for Security - 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9996}, pages = {3--17}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47413-7\_1}, doi = {10.1007/978-3-319-47413-7\_1}, timestamp = {Tue, 19 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/AltmanSTL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/AndersonMP16, author = {Gabrielle Anderson and Guy McCusker and David J. Pym}, editor = {Quanyan Zhu and Tansu Alpcan and Emmanouil A. Panaousis and Milind Tambe and William Casey}, title = {A Logic for the Compliance Budget}, booktitle = {Decision and Game Theory for Security - 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9996}, pages = {370--381}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47413-7\_21}, doi = {10.1007/978-3-319-47413-7\_21}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/AndersonMP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/BasakFNK16, author = {Anjon Basak and Fei Fang and Thanh Hong Nguyen and Christopher Kiekintveld}, editor = {Quanyan Zhu and Tansu Alpcan and Emmanouil A. Panaousis and Milind Tambe and William Casey}, title = {Combining Graph Contraction and Strategy Generation for Green Security Games}, booktitle = {Decision and Game Theory for Security - 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9996}, pages = {251--271}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47413-7\_15}, doi = {10.1007/978-3-319-47413-7\_15}, timestamp = {Wed, 07 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/BasakFNK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/CaulfieldIP16, author = {Tristan Caulfield and Christos Ioannidis and David J. Pym}, editor = {Quanyan Zhu and Tansu Alpcan and Emmanouil A. Panaousis and Milind Tambe and William Casey}, title = {On the Adoption of Privacy-enhancing Technologies}, booktitle = {Decision and Game Theory for Security - 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9996}, pages = {175--194}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47413-7\_11}, doi = {10.1007/978-3-319-47413-7\_11}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/CaulfieldIP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/CekerZULS16, author = {Hayreddin {\c{C}}eker and Jun Zhuang and Shambhu J. Upadhyaya and Quang Duy La and Boon{-}Hee Soong}, editor = {Quanyan Zhu and Tansu Alpcan and Emmanouil A. Panaousis and Milind Tambe and William Casey}, title = {Deception-Based Game Theoretical Approach to Mitigate DoS Attacks}, booktitle = {Decision and Game Theory for Security - 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9996}, pages = {18--38}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47413-7\_2}, doi = {10.1007/978-3-319-47413-7\_2}, timestamp = {Sun, 27 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/CekerZULS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/ChenZ16, author = {Juntao Chen and Quanyan Zhu}, editor = {Quanyan Zhu and Tansu Alpcan and Emmanouil A. Panaousis and Milind Tambe and William Casey}, title = {Optimal Contract Design Under Asymmetric Information for Cloud-Enabled Internet of Controlled Things}, booktitle = {Decision and Game Theory for Security - 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9996}, pages = {329--348}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47413-7\_19}, doi = {10.1007/978-3-319-47413-7\_19}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/ChenZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/ChicoisneO16, author = {Renaud Chicoisne and Fernando Ord{\'{o}}{\~{n}}ez}, editor = {Quanyan Zhu and Tansu Alpcan and Emmanouil A. Panaousis and Milind Tambe and William Casey}, title = {Risk Averse Stackelberg Security Games with Quantal Response}, booktitle = {Decision and Game Theory for Security - 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9996}, pages = {83--100}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47413-7\_5}, doi = {10.1007/978-3-319-47413-7\_5}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/ChicoisneO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/CulnaneT16, author = {Chris Culnane and Vanessa Teague}, editor = {Quanyan Zhu and Tansu Alpcan and Emmanouil A. Panaousis and Milind Tambe and William Casey}, title = {Strategies for Voter-Initiated Election Audits}, booktitle = {Decision and Game Theory for Security - 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9996}, pages = {235--247}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47413-7\_14}, doi = {10.1007/978-3-319-47413-7\_14}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/CulnaneT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/DziubinskiSZ16, author = {Marcin Dziubinski and Piotr Sankowski and Qiang Zhang}, editor = {Quanyan Zhu and Tansu Alpcan and Emmanouil A. Panaousis and Milind Tambe and William Casey}, title = {Network Elicitation in Adversarial Environment}, booktitle = {Decision and Game Theory for Security - 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9996}, pages = {397--414}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47413-7\_23}, doi = {10.1007/978-3-319-47413-7\_23}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/DziubinskiSZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/FarhangG16, author = {Sadegh Farhang and Jens Grossklags}, editor = {Quanyan Zhu and Tansu Alpcan and Emmanouil A. Panaousis and Milind Tambe and William Casey}, title = {FlipLeakage: {A} Game-Theoretic Approach to Protect Against Stealthy Attackers in the Presence of Information Leakage}, booktitle = {Decision and Game Theory for Security - 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9996}, pages = {195--214}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47413-7\_12}, doi = {10.1007/978-3-319-47413-7\_12}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/FarhangG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/GhafouriALVK16, author = {Amin Ghafouri and Waseem Abbas and Aron Laszka and Yevgeniy Vorobeychik and Xenofon D. Koutsoukos}, editor = {Quanyan Zhu and Tansu Alpcan and Emmanouil A. Panaousis and Milind Tambe and William Casey}, title = {Optimal Thresholds for Anomaly-Based Intrusion Detection in Dynamical Environments}, booktitle = {Decision and Game Theory for Security - 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9996}, pages = {415--434}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47413-7\_24}, doi = {10.1007/978-3-319-47413-7\_24}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/GhafouriALVK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/GholamiWBTST16, author = {Shahrzad Gholami and Bryan Wilder and Matthew Brown and Dana Thomas and Nicole D. Sintov and Milind Tambe}, editor = {Quanyan Zhu and Tansu Alpcan and Emmanouil A. Panaousis and Milind Tambe and William Casey}, title = {Divide to Defend: Collusive Security Games}, booktitle = {Decision and Game Theory for Security - 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9996}, pages = {272--293}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47413-7\_16}, doi = {10.1007/978-3-319-47413-7\_16}, timestamp = {Thu, 05 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/GholamiWBTST16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/HorakB16, author = {Karel Hor{\'{a}}k and Branislav Bosansk{\'{y}}}, editor = {Quanyan Zhu and Tansu Alpcan and Emmanouil A. Panaousis and Milind Tambe and William Casey}, title = {A Point-Based Approximate Algorithm for One-Sided Partially Observable Pursuit-Evasion Games}, booktitle = {Decision and Game Theory for Security - 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9996}, pages = {435--454}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47413-7\_25}, doi = {10.1007/978-3-319-47413-7\_25}, timestamp = {Tue, 19 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/HorakB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/HotaCSB16, author = {Ashish Ranjan Hota and Abraham A. Clements and Shreyas Sundaram and Saurabh Bagchi}, editor = {Quanyan Zhu and Tansu Alpcan and Emmanouil A. Panaousis and Milind Tambe and William Casey}, title = {Optimal and Game-Theoretic Deployment of Security Investments in Interdependent Assets}, booktitle = {Decision and Game Theory for Security - 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9996}, pages = {101--113}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47413-7\_6}, doi = {10.1007/978-3-319-47413-7\_6}, timestamp = {Wed, 08 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/HotaCSB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/IsmailLB016, author = {Ziad Ismail and Jean Leneutre and David Bateman and Lin Chen}, editor = {Quanyan Zhu and Tansu Alpcan and Emmanouil A. Panaousis and Milind Tambe and William Casey}, title = {A Methodology to Apply a Game Theoretic Model of Security Risks Interdependencies Between {ICT} and Electric Infrastructures}, booktitle = {Decision and Game Theory for Security - 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9996}, pages = {159--171}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47413-7\_10}, doi = {10.1007/978-3-319-47413-7\_10}, timestamp = {Thu, 17 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/IsmailLB016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/KallasTLB16, author = {Kassem Kallas and Benedetta Tondi and Riccardo Lazzeretti and Mauro Barni}, editor = {Quanyan Zhu and Tansu Alpcan and Emmanouil A. Panaousis and Milind Tambe and William Casey}, title = {Consensus Algorithm with Censored Data for Distributed Detection with Corrupted Measurements: {A} Game-Theoretic Approach}, booktitle = {Decision and Game Theory for Security - 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9996}, pages = {455--466}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47413-7\_26}, doi = {10.1007/978-3-319-47413-7\_26}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/KallasTLB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/LaszkaS16, author = {Aron Laszka and Galina Schwartz}, editor = {Quanyan Zhu and Tansu Alpcan and Emmanouil A. Panaousis and Milind Tambe and William Casey}, title = {Becoming Cybercriminals: Incentives in Networks with Interdependent Security - Incentives in Networks with Interdependent Security}, booktitle = {Decision and Game Theory for Security - 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9996}, pages = {349--369}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47413-7\_20}, doi = {10.1007/978-3-319-47413-7\_20}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/LaszkaS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/McCarthySTM16, author = {Sara Marie McCarthy and Arunesh Sinha and Milind Tambe and Pratyusa Manadhata}, editor = {Quanyan Zhu and Tansu Alpcan and Emmanouil A. Panaousis and Milind Tambe and William Casey}, title = {Data Exfiltration Detection and Prevention: Virtually Distributed POMDPs for Practically Safer Networks}, booktitle = {Decision and Game Theory for Security - 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9996}, pages = {39--61}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47413-7\_3}, doi = {10.1007/978-3-319-47413-7\_3}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/McCarthySTM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/MihcakABL16, author = {M. Kivan{\c{c}} Mih{\c{c}}ak and Emrah Akyol and Tamer Basar and C{\'{e}}dric Langbort}, editor = {Quanyan Zhu and Tansu Alpcan and Emmanouil A. Panaousis and Milind Tambe and William Casey}, title = {Scalar Quadratic-Gaussian Soft Watermarking Games}, booktitle = {Decision and Game Theory for Security - 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9996}, pages = {215--234}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47413-7\_13}, doi = {10.1007/978-3-319-47413-7\_13}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/MihcakABL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/MohammadiMMZ16, author = {Amin Mohammadi and Mohammad Hossein Manshaei and Monireh Mohebbi Moghaddam and Quanyan Zhu}, editor = {Quanyan Zhu and Tansu Alpcan and Emmanouil A. Panaousis and Milind Tambe and William Casey}, title = {A Game-Theoretic Analysis of Deception over Social Networks Using Fake Avatars}, booktitle = {Decision and Game Theory for Security - 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9996}, pages = {382--394}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47413-7\_22}, doi = {10.1007/978-3-319-47413-7\_22}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/MohammadiMMZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/MukhopadhyayZVT16, author = {Ayan Mukhopadhyay and Chao Zhang and Yevgeniy Vorobeychik and Milind Tambe and Kenneth Pence and Paul Speer}, editor = {Quanyan Zhu and Tansu Alpcan and Emmanouil A. Panaousis and Milind Tambe and William Casey}, title = {Optimal Allocation of Police Patrol Resources Using a Continuous-Time Crime Model}, booktitle = {Decision and Game Theory for Security - 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9996}, pages = {139--158}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47413-7\_9}, doi = {10.1007/978-3-319-47413-7\_9}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/MukhopadhyayZVT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/NoureddineFSB16, author = {Mohammad A. Noureddine and Ahmed M. Fawaz and William H. Sanders and Tamer Basar}, editor = {Quanyan Zhu and Tansu Alpcan and Emmanouil A. Panaousis and Milind Tambe and William Casey}, title = {A Game-Theoretic Approach to Respond to Attacker Lateral Movement}, booktitle = {Decision and Game Theory for Security - 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9996}, pages = {294--313}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47413-7\_17}, doi = {10.1007/978-3-319-47413-7\_17}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/NoureddineFSB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/RassZ16, author = {Stefan Rass and Quanyan Zhu}, editor = {Quanyan Zhu and Tansu Alpcan and Emmanouil A. Panaousis and Milind Tambe and William Casey}, title = {{GADAPT:} {A} Sequential Game-Theoretic Framework for Designing Defense-in-Depth Strategies Against Advanced Persistent Threats}, booktitle = {Decision and Game Theory for Security - 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9996}, pages = {314--326}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47413-7\_18}, doi = {10.1007/978-3-319-47413-7\_18}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/RassZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/TsiropoulouBPQ16, author = {Eirini{-}Eleni Tsiropoulou and John S. Baras and Symeon Papavassiliou and Gang Qu}, editor = {Quanyan Zhu and Tansu Alpcan and Emmanouil A. Panaousis and Milind Tambe and William Casey}, title = {On the Mitigation of Interference Imposed by Intruders in Passive {RFID} Networks}, booktitle = {Decision and Game Theory for Security - 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9996}, pages = {62--80}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47413-7\_4}, doi = {10.1007/978-3-319-47413-7\_4}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/TsiropoulouBPQ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/ZhouBG16, author = {Zhengyuan Zhou and Nicholas Bambos and Peter W. Glynn}, editor = {Quanyan Zhu and Tansu Alpcan and Emmanouil A. Panaousis and Milind Tambe and William Casey}, title = {Dynamics on Linear Influence Network Games Under Stochastic Environments}, booktitle = {Decision and Game Theory for Security - 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9996}, pages = {114--126}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47413-7\_7}, doi = {10.1007/978-3-319-47413-7\_7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/ZhouBG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/gamesec/2016, editor = {Quanyan Zhu and Tansu Alpcan and Emmanouil A. Panaousis and Milind Tambe and William Casey}, title = {Decision and Game Theory for Security - 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9996}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47413-7}, doi = {10.1007/978-3-319-47413-7}, isbn = {978-3-319-47412-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/BasilicoNG15, author = {Nicola Basilico and Giuseppe De Nittis and Nicola Gatti}, editor = {M. H. R. Khouzani and Emmanouil A. Panaousis and George Theodorakopoulos}, title = {A Security Game Model for Environment Protection in the Presence of an Alarm System}, booktitle = {Decision and Game Theory for Security - 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9406}, pages = {192--207}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25594-1\_11}, doi = {10.1007/978-3-319-25594-1\_11}, timestamp = {Thu, 17 Sep 2020 10:44:10 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/BasilicoNG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/CampanelliG15, author = {Matteo Campanelli and Rosario Gennaro}, editor = {M. H. R. Khouzani and Emmanouil A. Panaousis and George Theodorakopoulos}, title = {Sequentially Composable Rational Proofs}, booktitle = {Decision and Game Theory for Security - 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9406}, pages = {270--288}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25594-1\_15}, doi = {10.1007/978-3-319-25594-1\_15}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/CampanelliG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/ClarkSBP15, author = {Andrew Clark and Kun Sun and Linda Bushnell and Radha Poovendran}, editor = {M. H. R. Khouzani and Emmanouil A. Panaousis and George Theodorakopoulos}, title = {A Game-Theoretic Approach to {IP} Address Randomization in Decoy-Based Cyber Defense}, booktitle = {Decision and Game Theory for Security - 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9406}, pages = {3--21}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25594-1\_1}, doi = {10.1007/978-3-319-25594-1\_1}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/ClarkSBP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/DurkotaLBK15, author = {Karel Durkota and Viliam Lis{\'{y}} and Branislav Bosansk{\'{y}} and Christopher Kiekintveld}, editor = {M. H. R. Khouzani and Emmanouil A. Panaousis and George Theodorakopoulos}, title = {Approximate Solutions for Attack Graph Games with Imperfect Information}, booktitle = {Decision and Game Theory for Security - 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9406}, pages = {228--249}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25594-1\_13}, doi = {10.1007/978-3-319-25594-1\_13}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/DurkotaLBK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/FordNTSF15, author = {Benjamin J. Ford and Thanh Hong Nguyen and Milind Tambe and Nicole D. Sintov and Francesco Maria Delle Fave}, editor = {M. H. R. Khouzani and Emmanouil A. Panaousis and George Theodorakopoulos}, title = {Beware the Soothsayer: From Attack Prediction Accuracy to Predictive Reliability in Security Games}, booktitle = {Decision and Game Theory for Security - 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9406}, pages = {35--56}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25594-1\_3}, doi = {10.1007/978-3-319-25594-1\_3}, timestamp = {Thu, 05 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/FordNTSF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/HayelZ15, author = {Yezekael Hayel and Quanyan Zhu}, editor = {M. H. R. Khouzani and Emmanouil A. Panaousis and George Theodorakopoulos}, title = {Attack-Aware Cyber Insurance for Risk Sharing in Computer Networks}, booktitle = {Decision and Game Theory for Security - 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9406}, pages = {22--34}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25594-1\_2}, doi = {10.1007/978-3-319-25594-1\_2}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/HayelZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/HeitzenraterTS15, author = {Chad Heitzenrater and Greg Taylor and Andrew Simpson}, editor = {M. H. R. Khouzani and Emmanouil A. Panaousis and George Theodorakopoulos}, title = {When the Winning Move is Not to Play: Games of Deterrence in Cyber Security}, booktitle = {Decision and Game Theory for Security - 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9406}, pages = {250--269}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25594-1\_14}, doi = {10.1007/978-3-319-25594-1\_14}, timestamp = {Thu, 20 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/HeitzenraterTS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/HotaS15, author = {Ashish Ranjan Hota and Shreyas Sundaram}, editor = {M. H. R. Khouzani and Emmanouil A. Panaousis and George Theodorakopoulos}, title = {Interdependent Security Games Under Behavioral Probability Weighting}, booktitle = {Decision and Game Theory for Security - 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9406}, pages = {150--169}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25594-1\_9}, doi = {10.1007/978-3-319-25594-1\_9}, timestamp = {Wed, 08 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/HotaS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/HuangSS15, author = {Chong Huang and Lalitha Sankar and Anand D. Sarwate}, editor = {M. H. R. Khouzani and Emmanouil A. Panaousis and George Theodorakopoulos}, title = {Incentive Schemes for Privacy-Sensitive Consumers}, booktitle = {Decision and Game Theory for Security - 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9406}, pages = {358--369}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25594-1\_21}, doi = {10.1007/978-3-319-25594-1\_21}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/HuangSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/JohnsonLG15, author = {Benjamin Johnson and Aron Laszka and Jens Grossklags}, editor = {M. H. R. Khouzani and Emmanouil A. Panaousis and George Theodorakopoulos}, title = {Games of Timing for Security in Dynamic Environments}, booktitle = {Decision and Game Theory for Security - 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9406}, pages = {57--73}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25594-1\_4}, doi = {10.1007/978-3-319-25594-1\_4}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/JohnsonLG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/KlimaLK15, author = {Richard Kl{\'{\i}}ma and Viliam Lis{\'{y}} and Christopher Kiekintveld}, editor = {M. H. R. Khouzani and Emmanouil A. Panaousis and George Theodorakopoulos}, title = {Combining Online Learning and Equilibrium Computation in Security Games}, booktitle = {Decision and Game Theory for Security - 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9406}, pages = {130--149}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25594-1\_8}, doi = {10.1007/978-3-319-25594-1\_8}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/KlimaLK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/LeeCABP15, author = {Phillip Lee and Andrew Clark and Basel Alomair and Linda Bushnell and Radha Poovendran}, editor = {M. H. R. Khouzani and Emmanouil A. Panaousis and George Theodorakopoulos}, title = {Passivity-Based Distributed Strategies for Stochastic Stackelberg Security Games}, booktitle = {Decision and Game Theory for Security - 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9406}, pages = {113--129}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25594-1\_7}, doi = {10.1007/978-3-319-25594-1\_7}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/LeeCABP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/LeninWC15, author = {Aleksandr Lenin and Jan Willemson and Anton Charnamord}, editor = {M. H. R. Khouzani and Emmanouil A. Panaousis and George Theodorakopoulos}, title = {Genetic Approximations for the Failure-Free Security Games}, booktitle = {Decision and Game Theory for Security - 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9406}, pages = {311--321}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25594-1\_17}, doi = {10.1007/978-3-319-25594-1\_17}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/LeninWC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/LeslieSS15, author = {David S. Leslie and Chris Sherfield and Nigel P. Smart}, editor = {M. H. R. Khouzani and Emmanouil A. Panaousis and George Theodorakopoulos}, title = {Threshold FlipThem: When the Winner Does Not Need to Take All}, booktitle = {Decision and Game Theory for Security - 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9406}, pages = {74--92}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25594-1\_5}, doi = {10.1007/978-3-319-25594-1\_5}, timestamp = {Tue, 06 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/LeslieSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/MerlevedeH15, author = {Jonathan S. A. Merlevede and Tom Holvoet}, editor = {M. H. R. Khouzani and Emmanouil A. Panaousis and George Theodorakopoulos}, title = {Game Theory and Security: Recent History and Future Directions}, booktitle = {Decision and Game Theory for Security - 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9406}, pages = {334--345}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25594-1\_19}, doi = {10.1007/978-3-319-25594-1\_19}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/MerlevedeH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/MoghaddamMZ15, author = {Monireh Mohebbi Moghaddam and Mohammad Hossein Manshaei and Quanyan Zhu}, editor = {M. H. R. Khouzani and Emmanouil A. Panaousis and George Theodorakopoulos}, title = {To Trust or Not: {A} Security Signaling Game Between Service Provider and Client}, booktitle = {Decision and Game Theory for Security - 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9406}, pages = {322--333}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25594-1\_18}, doi = {10.1007/978-3-319-25594-1\_18}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/MoghaddamMZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/NguyenFKLYTAPDW15, author = {Thanh Hong Nguyen and Francesco Maria Delle Fave and Debarun Kar and Aravind S. Lakshminarayanan and Amulya Yadav and Milind Tambe and Noa Agmon and Andrew J. Plumptre and Margaret Driciru and Fred Wanyama and Aggrey Rwetsiba}, editor = {M. H. R. Khouzani and Emmanouil A. Panaousis and George Theodorakopoulos}, title = {Making the Most of Our Regrets: Regret-Based Solutions to Handle Payoff Uncertainty and Elicitation in Green Security Games}, booktitle = {Decision and Game Theory for Security - 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9406}, pages = {170--191}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25594-1\_10}, doi = {10.1007/978-3-319-25594-1\_10}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/NguyenFKLYTAPDW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/PawlickFZ15, author = {Jeffrey Pawlick and Sadegh Farhang and Quanyan Zhu}, editor = {M. H. R. Khouzani and Emmanouil A. Panaousis and George Theodorakopoulos}, title = {Flip the Cloud: Cyber-Physical Signaling Games in the Presence of Advanced Persistent Threats}, booktitle = {Decision and Game Theory for Security - 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9406}, pages = {289--308}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25594-1\_16}, doi = {10.1007/978-3-319-25594-1\_16}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/PawlickFZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/RajtmajerGS15, author = {Sarah Michele Rajtmajer and Christopher Griffin and Anna Cinzia Squicciarini}, editor = {M. H. R. Khouzani and Emmanouil A. Panaousis and George Theodorakopoulos}, title = {Determining a Discrete Set of Site-Constrained Privacy Options for Users in Social Networks Through Stackelberg Games}, booktitle = {Decision and Game Theory for Security - 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9406}, pages = {208--227}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25594-1\_12}, doi = {10.1007/978-3-319-25594-1\_12}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/RajtmajerGS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/RassKS15, author = {Stefan Rass and Sandra K{\"{o}}nig and Stefan Schauer}, editor = {M. H. R. Khouzani and Emmanouil A. Panaousis and George Theodorakopoulos}, title = {Uncertainty in Games: Using Probability-Distributions as Payoffs}, booktitle = {Decision and Game Theory for Security - 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9406}, pages = {346--357}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25594-1\_20}, doi = {10.1007/978-3-319-25594-1\_20}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/RassKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/ZhangZS15, author = {Ming Zhang and Zizhan Zheng and Ness B. Shroff}, editor = {M. H. R. Khouzani and Emmanouil A. Panaousis and George Theodorakopoulos}, title = {A Game Theoretic Model for Defending Against Stealthy Attacks with Limited Resources}, booktitle = {Decision and Game Theory for Security - 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9406}, pages = {93--112}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25594-1\_6}, doi = {10.1007/978-3-319-25594-1\_6}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/ZhangZS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/gamesec/2015, editor = {M. H. R. Khouzani and Emmanouil A. Panaousis and George Theodorakopoulos}, title = {Decision and Game Theory for Security - 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9406}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25594-1}, doi = {10.1007/978-3-319-25594-1}, isbn = {978-3-319-25593-4}, timestamp = {Thu, 17 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/BhattacharyaBF14, author = {Sourabh Bhattacharya and Tamer Basar and Maurizio Falcone}, editor = {Radha Poovendran and Walid Saad}, title = {Surveillance for Security as a Pursuit-Evasion Game}, booktitle = {Decision and Game Theory for Security - 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8840}, pages = {370--379}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12601-2\_23}, doi = {10.1007/978-3-319-12601-2\_23}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/BhattacharyaBF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/BrownHT14, author = {Matthew Brown and William B. Haskell and Milind Tambe}, editor = {Radha Poovendran and Walid Saad}, title = {Addressing Scalability and Robustness in Security Games with Multiple Boundedly Rational Adversaries}, booktitle = {Decision and Game Theory for Security - 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8840}, pages = {23--42}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12601-2\_2}, doi = {10.1007/978-3-319-12601-2\_2}, timestamp = {Mon, 30 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/BrownHT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/CuiJ14, author = {Jinshu Cui and Richard S. John}, editor = {Radha Poovendran and Walid Saad}, title = {Empirical Comparisons of Descriptive Multi-objective Adversary Models in Stackelberg Security Games}, booktitle = {Decision and Game Theory for Security - 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8840}, pages = {309--318}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12601-2\_17}, doi = {10.1007/978-3-319-12601-2\_17}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/CuiJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/DjebailiKLC14, author = {Brahim Djebaili and Christophe Kiennert and Jean Leneutre and Lin Chen}, editor = {Radha Poovendran and Walid Saad}, title = {Data Integrity and Availability Verification Game in Untrusted Cloud Storage}, booktitle = {Decision and Game Theory for Security - 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8840}, pages = {287--306}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12601-2\_16}, doi = {10.1007/978-3-319-12601-2\_16}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/DjebailiKLC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/FarhangMEZ14, author = {Sadegh Farhang and Mohammad Hossein Manshaei and Milad Nasr Esfahani and Quanyan Zhu}, editor = {Radha Poovendran and Walid Saad}, title = {A Dynamic Bayesian Security Game Framework for Strategic Defense Mechanism Design}, booktitle = {Decision and Game Theory for Security - 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8840}, pages = {319--328}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12601-2\_18}, doi = {10.1007/978-3-319-12601-2\_18}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/FarhangMEZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/GuptaBS14, author = {Abhishek Gupta and Tamer Basar and Galina A. Schwartz}, editor = {Radha Poovendran and Walid Saad}, title = {A Three-Stage Colonel Blotto Game: When to Provide More Information to an Adversary}, booktitle = {Decision and Game Theory for Security - 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8840}, pages = {216--233}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12601-2\_12}, doi = {10.1007/978-3-319-12601-2\_12}, timestamp = {Wed, 25 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/GuptaBS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/KamhouaRK14, author = {Charles A. Kamhoua and Manuel Rodr{\'{\i}}guez and Kevin A. Kwiat}, editor = {Radha Poovendran and Walid Saad}, title = {Testing for Hardware Trojans: {A} Game-Theoretic Approach}, booktitle = {Decision and Game Theory for Security - 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8840}, pages = {360--369}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12601-2\_22}, doi = {10.1007/978-3-319-12601-2\_22}, timestamp = {Thu, 29 Mar 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/KamhouaRK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/KhouzaniPC14, author = {M. H. R. Khouzani and Viet Pham and Carlos Cid}, editor = {Radha Poovendran and Walid Saad}, title = {Strategic Discovery and Sharing of Vulnerabilities in Competitive Environments}, booktitle = {Decision and Game Theory for Security - 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8840}, pages = {59--78}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12601-2\_4}, doi = {10.1007/978-3-319-12601-2\_4}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/KhouzaniPC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/KlimaKL14, author = {Richard Kl{\'{\i}}ma and Christopher Kiekintveld and Viliam Lis{\'{y}}}, editor = {Radha Poovendran and Walid Saad}, title = {Online Learning Methods for Border Patrol Resource Allocation}, booktitle = {Decision and Game Theory for Security - 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8840}, pages = {340--349}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12601-2\_20}, doi = {10.1007/978-3-319-12601-2\_20}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/KlimaKL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/LaszkaHFB14, author = {Aron Laszka and G{\'{a}}bor Horv{\'{a}}th and M{\'{a}}rk F{\'{e}}legyh{\'{a}}zi and Levente Butty{\'{a}}n}, editor = {Radha Poovendran and Walid Saad}, title = {FlipThem: Modeling Targeted Attacks with FlipIt for Multiple Resources}, booktitle = {Decision and Game Theory for Security - 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8840}, pages = {175--194}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12601-2\_10}, doi = {10.1007/978-3-319-12601-2\_10}, timestamp = {Wed, 25 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/LaszkaHFB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/LeninB14, author = {Aleksandr Lenin and Ahto Buldas}, editor = {Radha Poovendran and Walid Saad}, title = {Limiting Adversarial Budget in Quantitative Security Assessment}, booktitle = {Decision and Game Theory for Security - 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8840}, pages = {155--174}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12601-2\_9}, doi = {10.1007/978-3-319-12601-2\_9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/LeninB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/LiuB14, author = {Ji Liu and Tamer Basar}, editor = {Radha Poovendran and Walid Saad}, title = {Toward Optimal Network Topology Design for Fast and Secure Distributed Computation}, booktitle = {Decision and Game Theory for Security - 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8840}, pages = {234--245}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12601-2\_13}, doi = {10.1007/978-3-319-12601-2\_13}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/LiuB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/PanaousisAFC14, author = {Emmanouil A. Panaousis and Tansu Alpcan and Hossein Fereidooni and Mauro Conti}, editor = {Radha Poovendran and Walid Saad}, title = {Secure Message Delivery Games for Device-to-Device Communications}, booktitle = {Decision and Game Theory for Security - 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8840}, pages = {195--215}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12601-2\_11}, doi = {10.1007/978-3-319-12601-2\_11}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/PanaousisAFC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/PanaousisFMHS14, author = {Emmanouil A. Panaousis and Andrew Fielder and Pasquale Malacaria and Chris Hankin and Fabrizio Smeraldi}, editor = {Radha Poovendran and Walid Saad}, title = {Cybersecurity Games and Investments: {A} Decision Support Approach}, booktitle = {Decision and Game Theory for Security - 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8840}, pages = {266--286}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12601-2\_15}, doi = {10.1007/978-3-319-12601-2\_15}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/PanaousisFMHS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/PhamKC14, author = {Viet Pham and M. H. R. Khouzani and Carlos Cid}, editor = {Radha Poovendran and Walid Saad}, title = {Optimal Contracts for Outsourced Computation}, booktitle = {Decision and Game Theory for Security - 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8840}, pages = {79--98}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12601-2\_5}, doi = {10.1007/978-3-319-12601-2\_5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/PhamKC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/PuG14, author = {Yu Pu and Jens Grossklags}, editor = {Radha Poovendran and Walid Saad}, title = {An Economic Model and Simulation Results of App Adoption Decisions on Networks with Interdependent Privacy Consequences}, booktitle = {Decision and Game Theory for Security - 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8840}, pages = {246--265}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12601-2\_14}, doi = {10.1007/978-3-319-12601-2\_14}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/PuG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/RasouliMT14, author = {Mohammad Rasouli and Erik Miehling and Demosthenis Teneketzis}, editor = {Radha Poovendran and Walid Saad}, title = {A Supervisory Control Approach to Dynamic Cyber-Security}, booktitle = {Decision and Game Theory for Security - 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8840}, pages = {99--117}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12601-2\_6}, doi = {10.1007/978-3-319-12601-2\_6}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/RasouliMT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/RassR14, author = {Stefan Rass and Benjamin Rainer}, editor = {Radha Poovendran and Walid Saad}, title = {Numerical Computation of Multi-goal Security Strategies}, booktitle = {Decision and Game Theory for Security - 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8840}, pages = {118--133}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12601-2\_7}, doi = {10.1007/978-3-319-12601-2\_7}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/RassR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/SarabiNL14, author = {Armin Sarabi and Parinaz Naghizadeh and Mingyan Liu}, editor = {Radha Poovendran and Walid Saad}, title = {Can Less Be More? {A} Game-Theoretic Analysis of Filtering vs. Investment}, booktitle = {Decision and Game Theory for Security - 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8840}, pages = {329--339}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12601-2\_19}, doi = {10.1007/978-3-319-12601-2\_19}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/SarabiNL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/WallrabensteinC14, author = {John Ross Wallrabenstein and Chris Clifton}, editor = {Radha Poovendran and Walid Saad}, title = {Realizable Rational Multiparty Cryptographic Protocols}, booktitle = {Decision and Game Theory for Security - 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8840}, pages = {134--154}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12601-2\_8}, doi = {10.1007/978-3-319-12601-2\_8}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/WallrabensteinC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/WellmanP14, author = {Michael P. Wellman and Achintya Prakash}, editor = {Radha Poovendran and Walid Saad}, title = {Empirical Game-Theoretic Analysis of an Adaptive Cyber-Defense Scenario (Preliminary Report)}, booktitle = {Decision and Game Theory for Security - 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8840}, pages = {43--58}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12601-2\_3}, doi = {10.1007/978-3-319-12601-2\_3}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/WellmanP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/ZhangJCH14, author = {Jianhua Zhang and Prateek Jaipuria and Aranya Chakrabortty and Alefiya Hussain}, editor = {Radha Poovendran and Walid Saad}, title = {A Distributed Optimization Algorithm for Attack-Resilient Wide-Area Monitoring of Power Systems: Theoretical and Experimental Methods}, booktitle = {Decision and Game Theory for Security - 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8840}, pages = {350--359}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12601-2\_21}, doi = {10.1007/978-3-319-12601-2\_21}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/ZhangJCH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/ZhangJSBT14, author = {Chao Zhang and Albert Xin Jiang and Martin B. Short and P. Jeffrey Brantingham and Milind Tambe}, editor = {Radha Poovendran and Walid Saad}, title = {Defending Against Opportunistic Criminals: New Game-Theoretic Frameworks and Algorithms}, booktitle = {Decision and Game Theory for Security - 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8840}, pages = {3--22}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12601-2\_1}, doi = {10.1007/978-3-319-12601-2\_1}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/ZhangJSBT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/gamesec/2014, editor = {Radha Poovendran and Walid Saad}, title = {Decision and Game Theory for Security - 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8840}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12601-2}, doi = {10.1007/978-3-319-12601-2}, isbn = {978-3-319-12600-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/AkyolRB13, author = {Emrah Akyol and Kenneth Rose and Tamer Basar}, editor = {Sajal K. Das and Cristina Nita{-}Rotaru and Murat Kantarcioglu}, title = {On Communication over Gaussian Sensor Networks with Adversaries: Further Results}, booktitle = {Decision and Game Theory for Security - 4th International Conference, GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8252}, pages = {1--9}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-02786-9\_1}, doi = {10.1007/978-3-319-02786-9\_1}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/AkyolRB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/AlimomeniSS13, author = {Mohsen Alimomeni and Reihaneh Safavi{-}Naini and Setareh Sharifian}, editor = {Sajal K. Das and Cristina Nita{-}Rotaru and Murat Kantarcioglu}, title = {A True Random Generator Using Human Gameplay}, booktitle = {Decision and Game Theory for Security - 4th International Conference, GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8252}, pages = {10--28}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-02786-9\_2}, doi = {10.1007/978-3-319-02786-9\_2}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/AlimomeniSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/AnandAMN13, author = {S. Anand and Ofer Arazy and Narayan B. Mandayam and Oded Nov}, editor = {Sajal K. Das and Cristina Nita{-}Rotaru and Murat Kantarcioglu}, title = {A Game Theoretic Analysis of Collaboration in Wikipedia}, booktitle = {Decision and Game Theory for Security - 4th International Conference, GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8252}, pages = {29--44}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-02786-9\_3}, doi = {10.1007/978-3-319-02786-9\_3}, timestamp = {Thu, 28 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/AnandAMN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/BarretoCQ13, author = {Carlos A. Barreto and Alvaro A. C{\'{a}}rdenas and Nicanor Quijano}, editor = {Sajal K. Das and Cristina Nita{-}Rotaru and Murat Kantarcioglu}, title = {Controllability of Dynamical Systems: Threat Models and Reactive Security}, booktitle = {Decision and Game Theory for Security - 4th International Conference, GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8252}, pages = {45--64}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-02786-9\_4}, doi = {10.1007/978-3-319-02786-9\_4}, timestamp = {Tue, 01 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/BarretoCQ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/BlockiCDS13, author = {Jeremiah Blocki and Nicolas Christin and Anupam Datta and Arunesh Sinha}, editor = {Sajal K. Das and Cristina Nita{-}Rotaru and Murat Kantarcioglu}, title = {Adaptive Regret Minimization in Bounded-Memory Games}, booktitle = {Decision and Game Theory for Security - 4th International Conference, GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8252}, pages = {65--84}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-02786-9\_5}, doi = {10.1007/978-3-319-02786-9\_5}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/BlockiCDS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/BuldasL13, author = {Ahto Buldas and Aleksandr Lenin}, editor = {Sajal K. Das and Cristina Nita{-}Rotaru and Murat Kantarcioglu}, title = {New Efficient Utility Upper Bounds for the Fully Adaptive Model of Attack Trees}, booktitle = {Decision and Game Theory for Security - 4th International Conference, GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8252}, pages = {192--205}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-02786-9\_12}, doi = {10.1007/978-3-319-02786-9\_12}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/BuldasL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/EversBM13, author = {Lanah Evers and Ana Isabel Barros and Herman Monsuur}, editor = {Sajal K. Das and Cristina Nita{-}Rotaru and Murat Kantarcioglu}, title = {The Cooperative Ballistic Missile Defence Game}, booktitle = {Decision and Game Theory for Security - 4th International Conference, GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8252}, pages = {85--98}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-02786-9\_6}, doi = {10.1007/978-3-319-02786-9\_6}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/EversBM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/HanACL13, author = {Yi Han and Tansu Alpcan and Jeffrey Chan and Christopher Leckie}, editor = {Sajal K. Das and Cristina Nita{-}Rotaru and Murat Kantarcioglu}, title = {Security Games for Virtual Machine Allocation in Cloud Computing}, booktitle = {Decision and Game Theory for Security - 4th International Conference, GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8252}, pages = {99--118}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-02786-9\_7}, doi = {10.1007/978-3-319-02786-9\_7}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/HanACL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/JiangNTP13, author = {Albert Xin Jiang and Thanh Hong Nguyen and Milind Tambe and Ariel D. Procaccia}, editor = {Sajal K. Das and Cristina Nita{-}Rotaru and Murat Kantarcioglu}, title = {Monotonic Maximin: {A} Robust Stackelberg Solution against Boundedly Rational Followers}, booktitle = {Decision and Game Theory for Security - 4th International Conference, GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8252}, pages = {119--139}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-02786-9\_8}, doi = {10.1007/978-3-319-02786-9\_8}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/JiangNTP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/Kurve0K13, author = {Aditya Kurve and David J. Miller and George Kesidis}, editor = {Sajal K. Das and Cristina Nita{-}Rotaru and Murat Kantarcioglu}, title = {Defeating Tyranny of the Masses in Crowdsourcing: Accounting for Low-Skilled and Adversarial Workers}, booktitle = {Decision and Game Theory for Security - 4th International Conference, GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8252}, pages = {140--153}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-02786-9\_9}, doi = {10.1007/978-3-319-02786-9\_9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/Kurve0K13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/LaszkaG13, author = {Aron Laszka and Assane Gueye}, editor = {Sajal K. Das and Cristina Nita{-}Rotaru and Murat Kantarcioglu}, title = {Quantifying Network Topology Robustness under Budget Constraints: General Model and Computational Complexity}, booktitle = {Decision and Game Theory for Security - 4th International Conference, GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8252}, pages = {154--174}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-02786-9\_10}, doi = {10.1007/978-3-319-02786-9\_10}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/LaszkaG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/LaszkaJG13, author = {Aron Laszka and Benjamin Johnson and Jens Grossklags}, editor = {Sajal K. Das and Cristina Nita{-}Rotaru and Murat Kantarcioglu}, title = {Mitigation of Targeted and Non-targeted Covert Attacks as a Timing Game}, booktitle = {Decision and Game Theory for Security - 4th International Conference, GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8252}, pages = {175--191}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-02786-9\_11}, doi = {10.1007/978-3-319-02786-9\_11}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/LaszkaJG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/LuXY13, author = {Wenlian Lu and Shouhuai Xu and Xinlei Yi}, editor = {Sajal K. Das and Cristina Nita{-}Rotaru and Murat Kantarcioglu}, title = {Optimizing Active Cyber Defense}, booktitle = {Decision and Game Theory for Security - 4th International Conference, GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8252}, pages = {206--225}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-02786-9\_13}, doi = {10.1007/978-3-319-02786-9\_13}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/LuXY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/WallrabensteinC13, author = {John Ross Wallrabenstein and Chris Clifton}, editor = {Sajal K. Das and Cristina Nita{-}Rotaru and Murat Kantarcioglu}, title = {Equilibrium Concepts for Rational Multiparty Computation}, booktitle = {Decision and Game Theory for Security - 4th International Conference, GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8252}, pages = {226--245}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-02786-9\_14}, doi = {10.1007/978-3-319-02786-9\_14}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/WallrabensteinC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/ZhuB13, author = {Quanyan Zhu and Tamer Basar}, editor = {Sajal K. Das and Cristina Nita{-}Rotaru and Murat Kantarcioglu}, title = {Game-Theoretic Approach to Feedback-Driven Multi-stage Moving Target Defense}, booktitle = {Decision and Game Theory for Security - 4th International Conference, GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8252}, pages = {246--263}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-02786-9\_15}, doi = {10.1007/978-3-319-02786-9\_15}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/ZhuB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/gamesec/2013, editor = {Sajal K. Das and Cristina Nita{-}Rotaru and Murat Kantarcioglu}, title = {Decision and Game Theory for Security - 4th International Conference, GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8252}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-02786-9}, doi = {10.1007/978-3-319-02786-9}, isbn = {978-3-319-02785-2}, timestamp = {Tue, 10 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/AminST12, author = {Saurabh Amin and Galina A. Schwartz and Hamidou Tembine}, editor = {Jens Grossklags and Jean C. Walrand}, title = {Incentives and Security in Electricity Distribution Networks}, booktitle = {Decision and Game Theory for Security - Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7638}, pages = {264--280}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34266-0\_16}, doi = {10.1007/978-3-642-34266-0\_16}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/AminST12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/BlockiCDS12, author = {Jeremiah Blocki and Nicolas Christin and Anupam Datta and Arunesh Sinha}, editor = {Jens Grossklags and Jean C. Walrand}, title = {Audit Mechanisms for Provable Risk Management and Accountable Data Governance}, booktitle = {Decision and Game Theory for Security - Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7638}, pages = {38--59}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34266-0\_3}, doi = {10.1007/978-3-642-34266-0\_3}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/BlockiCDS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/BowersDGJORT12, author = {Kevin D. Bowers and Marten van Dijk and Robert Griffin and Ari Juels and Alina Oprea and Ronald L. Rivest and Nikos Triandopoulos}, editor = {Jens Grossklags and Jean C. Walrand}, title = {Defending against the Unknown Enemy: Applying FlipIt to System Security}, booktitle = {Decision and Game Theory for Security - Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7638}, pages = {248--263}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34266-0\_15}, doi = {10.1007/978-3-642-34266-0\_15}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/BowersDGJORT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/BuldasS12, author = {Ahto Buldas and Roman Stepanenko}, editor = {Jens Grossklags and Jean C. Walrand}, title = {Upper Bounds for Adversaries' Utility in Attack Trees}, booktitle = {Decision and Game Theory for Security - Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7638}, pages = {98--117}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34266-0\_6}, doi = {10.1007/978-3-642-34266-0\_6}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/BuldasS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/ClarkZPB12, author = {Andrew Clark and Quanyan Zhu and Radha Poovendran and Tamer Basar}, editor = {Jens Grossklags and Jean C. Walrand}, title = {Deceptive Routing in Relay Networks}, booktitle = {Decision and Game Theory for Security - Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7638}, pages = {171--185}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34266-0\_10}, doi = {10.1007/978-3-642-34266-0\_10}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/ClarkZPB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/Collins12, author = {M. Patrick Collins}, editor = {Jens Grossklags and Jean C. Walrand}, title = {A Cost-Based Mechanism for Evaluating the Effectiveness of Moving Target Defenses}, booktitle = {Decision and Game Theory for Security - Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7638}, pages = {221--233}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34266-0\_13}, doi = {10.1007/978-3-642-34266-0\_13}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/Collins12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/DritsoulaLM12, author = {Lemonia Dritsoula and Patrick Loiseau and John Musacchio}, editor = {Jens Grossklags and Jean C. Walrand}, title = {Computing the Nash Equilibria of Intruder Classification Games}, booktitle = {Decision and Game Theory for Security - Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7638}, pages = {78--97}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34266-0\_5}, doi = {10.1007/978-3-642-34266-0\_5}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/DritsoulaLM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/GueyeM12, author = {Assane Gueye and Vladimir Marbukh}, editor = {Jens Grossklags and Jean C. Walrand}, title = {A Game-Theoretic Framework for Network Security Vulnerability Assessment and Mitigation}, booktitle = {Decision and Game Theory for Security - Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7638}, pages = {186--200}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34266-0\_11}, doi = {10.1007/978-3-642-34266-0\_11}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/GueyeM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/HoeKB12, author = {SingRu Celine Hoe and Murat Kantarcioglu and Alain Bensoussan}, editor = {Jens Grossklags and Jean C. Walrand}, title = {A Game Theoretical Analysis of Lemonizing Cybercriminal Black Markets}, booktitle = {Decision and Game Theory for Security - Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7638}, pages = {60--77}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34266-0\_4}, doi = {10.1007/978-3-642-34266-0\_4}, timestamp = {Tue, 05 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/HoeKB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/JohnsonSB12, author = {Benjamin Johnson and Pascal Sch{\"{o}}ttle and Rainer B{\"{o}}hme}, editor = {Jens Grossklags and Jean C. Walrand}, title = {Where to Hide the Bits ?}, booktitle = {Decision and Game Theory for Security - Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7638}, pages = {1--17}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34266-0\_1}, doi = {10.1007/978-3-642-34266-0\_1}, timestamp = {Mon, 18 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/JohnsonSB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/LaszkaSB12, author = {Aron Laszka and D{\'{a}}vid Szeszl{\'{e}}r and Levente Butty{\'{a}}n}, editor = {Jens Grossklags and Jean C. Walrand}, title = {Linear Loss Function for the Network Blocking Game: An Efficient Model for Measuring Network Robustness and Link Criticality}, booktitle = {Decision and Game Theory for Security - Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7638}, pages = {152--170}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34266-0\_9}, doi = {10.1007/978-3-642-34266-0\_9}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/LaszkaSB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/LawAPD12, author = {Yee Wei Law and Tansu Alpcan and Marimuthu Palaniswami and Subhrakanti Dey}, editor = {Jens Grossklags and Jean C. Walrand}, title = {Security Games and Risk Minimization for Automatic Generation Control in Smart Grid}, booktitle = {Decision and Game Theory for Security - Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7638}, pages = {281--295}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34266-0\_17}, doi = {10.1007/978-3-642-34266-0\_17}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/LawAPD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/LinLJ12, author = {Jingqiang Lin and Peng Liu and Jiwu Jing}, editor = {Jens Grossklags and Jean C. Walrand}, title = {Using Signaling Games to Model the Multi-step Attack-Defense Scenarios on Confidentiality}, booktitle = {Decision and Game Theory for Security - Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7638}, pages = {118--137}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34266-0\_7}, doi = {10.1007/978-3-642-34266-0\_7}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/LinLJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/NixK12, author = {Robert Nix and Murat Kantarcioglu}, editor = {Jens Grossklags and Jean C. Walrand}, title = {Contractual Agreement Design for Enforcing Honesty in Cloud Outsourcing}, booktitle = {Decision and Game Theory for Security - Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7638}, pages = {296--308}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34266-0\_18}, doi = {10.1007/978-3-642-34266-0\_18}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/NixK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/NochensonH12, author = {Alan Nochenson and C. F. Larry Heimann}, editor = {Jens Grossklags and Jean C. Walrand}, title = {Simulation and Game-Theoretic Analysis of an Attacker-Defender Game}, booktitle = {Decision and Game Theory for Security - Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7638}, pages = {138--151}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34266-0\_8}, doi = {10.1007/978-3-642-34266-0\_8}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/NochensonH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/NojoumianS12, author = {Mehrdad Nojoumian and Douglas R. Stinson}, editor = {Jens Grossklags and Jean C. Walrand}, title = {Socio-Rational Secret Sharing as a New Direction in Rational Cryptography}, booktitle = {Decision and Game Theory for Security - Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7638}, pages = {18--37}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34266-0\_2}, doi = {10.1007/978-3-642-34266-0\_2}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/NojoumianS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/PhamC12, author = {Viet Pham and Carlos Cid}, editor = {Jens Grossklags and Jean C. Walrand}, title = {Are We Compromised? Modelling Security Assessment Games}, booktitle = {Decision and Game Theory for Security - Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7638}, pages = {234--247}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34266-0\_14}, doi = {10.1007/978-3-642-34266-0\_14}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/PhamC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/PibilLKBP12, author = {Radek P{\'{\i}}bil and Viliam Lis{\'{y}} and Christopher Kiekintveld and Branislav Bosansk{\'{y}} and Michal Pechoucek}, editor = {Jens Grossklags and Jean C. Walrand}, title = {Game Theoretic Model of Strategic Honeypot Selection in Computer Networks}, booktitle = {Decision and Game Theory for Security - Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7638}, pages = {201--220}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34266-0\_12}, doi = {10.1007/978-3-642-34266-0\_12}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/PibilLKBP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/gamesec/2012, editor = {Jens Grossklags and Jean C. Walrand}, title = {Decision and Game Theory for Security - Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7638}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34266-0}, doi = {10.1007/978-3-642-34266-0}, isbn = {978-3-642-34265-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/AlpcanLS11, author = {Tansu Alpcan and Albert Levi and Erkay Savas}, editor = {John S. Baras and Jonathan Katz and Eitan Altman}, title = {Digital Trust Games: An Experimental Study}, booktitle = {Decision and Game Theory for Security - Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7037}, pages = {182--200}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25280-8\_15}, doi = {10.1007/978-3-642-25280-8\_15}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/AlpcanLS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/BonaciB11, author = {Tamara Bonaci and Linda Bushnell}, editor = {John S. Baras and Jonathan Katz and Eitan Altman}, title = {Node Capture Games: {A} Game Theoretic Approach to Modeling and Mitigating Node Capture Attacks}, booktitle = {Decision and Game Theory for Security - Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7037}, pages = {44--55}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25280-8\_6}, doi = {10.1007/978-3-642-25280-8\_6}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/BonaciB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/ChiaC11, author = {Pern Hui Chia and John Chuang}, editor = {John S. Baras and Jonathan Katz and Eitan Altman}, title = {Colonel Blotto in the Phishing War}, booktitle = {Decision and Game Theory for Security - Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7037}, pages = {201--218}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25280-8\_16}, doi = {10.1007/978-3-642-25280-8\_16}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/ChiaC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/Christin11, author = {Nicolas Christin}, editor = {John S. Baras and Jonathan Katz and Eitan Altman}, title = {Network Security Games: Combining Game Theory, Behavioral Economics, and Network Measurements}, booktitle = {Decision and Game Theory for Security - Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7037}, pages = {4--6}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25280-8\_2}, doi = {10.1007/978-3-642-25280-8\_2}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/Christin11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/ClarkP11, author = {Andrew Clark and Radha Poovendran}, editor = {John S. Baras and Jonathan Katz and Eitan Altman}, title = {Maximizing Influence in Competitive Environments: {A} Game-Theoretic Approach}, booktitle = {Decision and Game Theory for Security - Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7037}, pages = {151--162}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25280-8\_13}, doi = {10.1007/978-3-642-25280-8\_13}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/ClarkP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/FokkinkS11, author = {Robbert Fokkink and Misha Stassen}, editor = {John S. Baras and Jonathan Katz and Eitan Altman}, title = {An Asymptotic Solution of Dresher's Guessing Game}, booktitle = {Decision and Game Theory for Security - Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7037}, pages = {104--116}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25280-8\_10}, doi = {10.1007/978-3-642-25280-8\_10}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/FokkinkS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/GhaniT11, author = {Ahmad Termimi Ab Ghani and Kazuyuki Tanaka}, editor = {John S. Baras and Jonathan Katz and Eitan Altman}, title = {Network Games with and without Synchroneity}, booktitle = {Decision and Game Theory for Security - Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7037}, pages = {87--103}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25280-8\_9}, doi = {10.1007/978-3-642-25280-8\_9}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/GhaniT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/Halpern11, author = {Joseph Y. Halpern}, editor = {John S. Baras and Jonathan Katz and Eitan Altman}, title = {Beyond Nash Equilibrium: Solution Concepts for the 21st Century}, booktitle = {Decision and Game Theory for Security - Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7037}, pages = {1--3}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25280-8\_1}, doi = {10.1007/978-3-642-25280-8\_1}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/Halpern11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/JohnsonBG11, author = {Benjamin Johnson and Rainer B{\"{o}}hme and Jens Grossklags}, editor = {John S. Baras and Jonathan Katz and Eitan Altman}, title = {Security Games with Market Insurance}, booktitle = {Decision and Game Theory for Security - Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7037}, pages = {117--130}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25280-8\_11}, doi = {10.1007/978-3-642-25280-8\_11}, timestamp = {Mon, 18 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/JohnsonBG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/KantarciogluBH11, author = {Murat Kantarcioglu and Alain Bensoussan and SingRu Celine Hoe}, editor = {John S. Baras and Jonathan Katz and Eitan Altman}, title = {Investment in Privacy-Preserving Technologies under Uncertainty}, booktitle = {Decision and Game Theory for Security - Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7037}, pages = {219--238}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25280-8\_17}, doi = {10.1007/978-3-642-25280-8\_17}, timestamp = {Tue, 05 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/KantarciogluBH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/MailleRT11, author = {Patrick Maill{\'{e}} and Peter Reichl and Bruno Tuffin}, editor = {John S. Baras and Jonathan Katz and Eitan Altman}, title = {Interplay between Security Providers, Consumers, and Attackers: {A} Weighted Congestion Game Approach}, booktitle = {Decision and Game Theory for Security - Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7037}, pages = {67--86}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25280-8\_8}, doi = {10.1007/978-3-642-25280-8\_8}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/MailleRT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/PalGP11, author = {Ranjan Pal and Leana Golubchik and Konstantinos Psounis}, editor = {John S. Baras and Jonathan Katz and Eitan Altman}, title = {Aegis {A} Novel Cyber-Insurance Model}, booktitle = {Decision and Game Theory for Security - Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7037}, pages = {131--150}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25280-8\_12}, doi = {10.1007/978-3-642-25280-8\_12}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/PalGP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/PalH11, author = {Ranjan Pal and Pan Hui}, editor = {John S. Baras and Jonathan Katz and Eitan Altman}, title = {Modeling Internet Security Investments: Tackling Topological Information Uncertainty}, booktitle = {Decision and Game Theory for Security - Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7037}, pages = {239--257}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25280-8\_18}, doi = {10.1007/978-3-642-25280-8\_18}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/PalH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/SantosHSH11, author = {Francisco Santos and Mathias Humbert and Reza Shokri and Jean{-}Pierre Hubaux}, editor = {John S. Baras and Jonathan Katz and Eitan Altman}, title = {Collaborative Location Privacy with Rational Users}, booktitle = {Decision and Game Theory for Security - Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7037}, pages = {163--181}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25280-8\_14}, doi = {10.1007/978-3-642-25280-8\_14}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/SantosHSH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/SodagariC11, author = {Shabnam Sodagari and T. Charles Clancy}, editor = {John S. Baras and Jonathan Katz and Eitan Altman}, title = {An Anti-jamming Strategy for Channel Access in Cognitive Radio Networks}, booktitle = {Decision and Game Theory for Security - Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7037}, pages = {34--43}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25280-8\_5}, doi = {10.1007/978-3-642-25280-8\_5}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/SodagariC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/StoccoC11, author = {Gabriel Fortunato Stocco and George Cybenko}, editor = {John S. Baras and Jonathan Katz and Eitan Altman}, title = {Exploiting Adversary's Risk Profiles in Imperfect Information Security Games}, booktitle = {Decision and Game Theory for Security - Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7037}, pages = {22--33}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25280-8\_4}, doi = {10.1007/978-3-642-25280-8\_4}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/StoccoC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/Szajowski11, author = {Krzysztof Szajowski}, editor = {John S. Baras and Jonathan Katz and Eitan Altman}, title = {Multi-variate Quickest Detection of Significant Change Process}, booktitle = {Decision and Game Theory for Security - Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7037}, pages = {56--66}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25280-8\_7}, doi = {10.1007/978-3-642-25280-8\_7}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/Szajowski11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/ZhuB11, author = {Quanyan Zhu and Tamer Basar}, editor = {John S. Baras and Jonathan Katz and Eitan Altman}, title = {Indices of Power in Optimal {IDS} Default Configuration: Theory and Examples}, booktitle = {Decision and Game Theory for Security - Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7037}, pages = {7--21}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25280-8\_3}, doi = {10.1007/978-3-642-25280-8\_3}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/ZhuB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/gamesec/2011, editor = {John S. Baras and Jonathan Katz and Eitan Altman}, title = {Decision and Game Theory for Security - Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7037}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25280-8}, doi = {10.1007/978-3-642-25280-8}, isbn = {978-3-642-25279-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/AlpernFKL10, author = {Steve Alpern and Robbert Fokkink and Joram op den Kelder and Tom Lidbetter}, editor = {Tansu Alpcan and Levente Butty{\'{a}}n and John S. Baras}, title = {Disperse or Unite? {A} Mathematical Model of Coordinated Attack}, booktitle = {Decision and Game Theory for Security - First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6442}, pages = {220--233}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17197-0\_15}, doi = {10.1007/978-3-642-17197-0\_15}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/AlpernFKL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/AltmanABTS10, author = {Eitan Altman and Alireza Aram and Tamer Basar and Corinne Touati and Saswati Sarkar}, editor = {Tansu Alpcan and Levente Butty{\'{a}}n and John S. Baras}, title = {Robust Control in Sparse Mobile Ad-Hoc Networks}, booktitle = {Decision and Game Theory for Security - First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6442}, pages = {123--134}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17197-0\_8}, doi = {10.1007/978-3-642-17197-0\_8}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/AltmanABTS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/AltmanBK10, author = {Eitan Altman and Tamer Basar and Veeraruna Kavitha}, editor = {Tansu Alpcan and Levente Butty{\'{a}}n and John S. Baras}, title = {Adversarial Control in a Delay Tolerant Network}, booktitle = {Decision and Game Theory for Security - First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6442}, pages = {87--106}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17197-0\_6}, doi = {10.1007/978-3-642-17197-0\_6}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/AltmanBK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/AminSS10, author = {Saurabh Amin and Galina A. Schwartz and S. Shankar Sastry}, editor = {Tansu Alpcan and Levente Butty{\'{a}}n and John S. Baras}, title = {Security Interdependencies for Networked Control Systems with Identical Agents}, booktitle = {Decision and Game Theory for Security - First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6442}, pages = {107--122}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17197-0\_7}, doi = {10.1007/978-3-642-17197-0\_7}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/AminSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/BensoussanKH10, author = {Alain Bensoussan and Murat Kantarcioglu and SingRu Celine Hoe}, editor = {Tansu Alpcan and Levente Butty{\'{a}}n and John S. Baras}, title = {A Game-Theoretical Approach for Finding Optimal Strategies in a Botnet Defense Model}, booktitle = {Decision and Game Theory for Security - First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6442}, pages = {135--148}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17197-0\_9}, doi = {10.1007/978-3-642-17197-0\_9}, timestamp = {Tue, 05 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/BensoussanKH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/BohmeF10, author = {Rainer B{\"{o}}hme and M{\'{a}}rk F{\'{e}}legyh{\'{a}}zi}, editor = {Tansu Alpcan and Levente Butty{\'{a}}n and John S. Baras}, title = {Optimal Information Security Investment with Penetration Testing}, booktitle = {Decision and Game Theory for Security - First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6442}, pages = {21--37}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17197-0\_2}, doi = {10.1007/978-3-642-17197-0\_2}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/BohmeF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/GattiMS10, author = {Nicola Gatti and Mattia Monga and Sabrina Sicari}, editor = {Tansu Alpcan and Levente Butty{\'{a}}n and John S. Baras}, title = {A Localization Game in Wireless Sensor Networks}, booktitle = {Decision and Game Theory for Security - First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6442}, pages = {168--179}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17197-0\_11}, doi = {10.1007/978-3-642-17197-0\_11}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/GattiMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/GueyeWA10, author = {Assane Gueye and Jean C. Walrand and Venkat Anantharam}, editor = {Tansu Alpcan and Levente Butty{\'{a}}n and John S. Baras}, title = {Design of Network Topology in an Adversarial Environment}, booktitle = {Decision and Game Theory for Security - First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6442}, pages = {1--20}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17197-0\_1}, doi = {10.1007/978-3-642-17197-0\_1}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/GueyeWA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/HumbertMFH10, author = {Mathias Humbert and Mohammad Hossein Manshaei and Julien Freudiger and Jean{-}Pierre Hubaux}, editor = {Tansu Alpcan and Levente Butty{\'{a}}n and John S. Baras}, title = {Tracking Games in Mobile Networks}, booktitle = {Decision and Game Theory for Security - First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6442}, pages = {38--57}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17197-0\_3}, doi = {10.1007/978-3-642-17197-0\_3}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/HumbertMFH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/JohnsonGCC10, author = {Benjamin Johnson and Jens Grossklags and Nicolas Christin and John Chuang}, editor = {Tansu Alpcan and Levente Butty{\'{a}}n and John S. Baras}, title = {Uncertainty in Interdependent Security Games}, booktitle = {Decision and Game Theory for Security - First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6442}, pages = {234--244}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17197-0\_16}, doi = {10.1007/978-3-642-17197-0\_16}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/JohnsonGCC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/KantarciogluBH10, author = {Murat Kantarcioglu and Alain Bensoussan and SingRu Celine Hoe}, editor = {Tansu Alpcan and Levente Butty{\'{a}}n and John S. Baras}, title = {When Do Firms Invest in Privacy-Preserving Technologies?}, booktitle = {Decision and Game Theory for Security - First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6442}, pages = {72--86}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17197-0\_5}, doi = {10.1007/978-3-642-17197-0\_5}, timestamp = {Tue, 05 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/KantarciogluBH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/KiekintveldMT10, author = {Christopher Kiekintveld and Janusz Marecki and Milind Tambe}, editor = {Tansu Alpcan and Levente Butty{\'{a}}n and John S. Baras}, title = {Methods and Algorithms for Infinite Bayesian Stackelberg Security Games - (Extended Abstract)}, booktitle = {Decision and Game Theory for Security - First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6442}, pages = {257--265}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17197-0\_18}, doi = {10.1007/978-3-642-17197-0\_18}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/KiekintveldMT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/KordyMMS10, author = {Barbara Kordy and Sjouke Mauw and Matthijs Melissen and Patrick Schweitzer}, editor = {Tansu Alpcan and Levente Butty{\'{a}}n and John S. Baras}, title = {Attack-Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent}, booktitle = {Decision and Game Theory for Security - First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6442}, pages = {245--256}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17197-0\_17}, doi = {10.1007/978-3-642-17197-0\_17}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/KordyMMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/PreibuschB10, author = {S{\"{o}}ren Preibusch and Joseph Bonneau}, editor = {Tansu Alpcan and Levente Butty{\'{a}}n and John S. Baras}, title = {The Password Game: Negative Externalities from Weak Password Practices}, booktitle = {Decision and Game Theory for Security - First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6442}, pages = {192--207}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17197-0\_13}, doi = {10.1007/978-3-642-17197-0\_13}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/PreibuschB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/SalimRDD10, author = {Farzad Salim and Jason Reid and Uwe Dulleck and Ed Dawson}, editor = {Tansu Alpcan and Levente Butty{\'{a}}n and John S. Baras}, title = {Towards a Game Theoretic Authorisation Model}, booktitle = {Decision and Game Theory for Security - First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6442}, pages = {208--219}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17197-0\_14}, doi = {10.1007/978-3-642-17197-0\_14}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/SalimRDD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/VolpattoMZ10, author = {Alberto Volpatto and Federico Maggi and Stefano Zanero}, editor = {Tansu Alpcan and Levente Butty{\'{a}}n and John S. Baras}, title = {Effective Multimodel Anomaly Detection Using Cooperative Negotiation}, booktitle = {Decision and Game Theory for Security - First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6442}, pages = {180--191}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17197-0\_12}, doi = {10.1007/978-3-642-17197-0\_12}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/VolpattoMZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/VratonjicMRH10, author = {Nevena Vratonjic and Mohammad Hossein Manshaei and Maxim Raya and Jean{-}Pierre Hubaux}, editor = {Tansu Alpcan and Levente Butty{\'{a}}n and John S. Baras}, title = {ISPs and Ad Networks Against Botnet Ad Fraud}, booktitle = {Decision and Game Theory for Security - First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6442}, pages = {149--167}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17197-0\_10}, doi = {10.1007/978-3-642-17197-0\_10}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/VratonjicMRH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/ZhangYFD10, author = {Nan Zhang and Wei Yu and Xinwen Fu and Sajal K. Das}, editor = {Tansu Alpcan and Levente Butty{\'{a}}n and John S. Baras}, title = {gPath: {A} Game-Theoretic Path Selection Algorithm to Protect Tor's Anonymity}, booktitle = {Decision and Game Theory for Security - First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6442}, pages = {58--71}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17197-0\_4}, doi = {10.1007/978-3-642-17197-0\_4}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/ZhangYFD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/gamesec/2010, editor = {Tansu Alpcan and Levente Butty{\'{a}}n and John S. Baras}, title = {Decision and Game Theory for Security - First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6442}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17197-0}, doi = {10.1007/978-3-642-17197-0}, isbn = {978-3-642-17196-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.