default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 29 matches
- 2017
- Yun Ai, Manav R. Bhatnagar, Michael Cheffena, Aashish Mathur, Artem A. Sedakov:
Game-Theoretical Analysis of PLC System Performance in the Presence of Jamming Attacks. GameSec 2017: 74-90 - Mário S. Alvim, Konstantinos Chatzikokolakis, Yusuke Kawamoto, Catuscia Palamidessi:
Information Leakage Games. GameSec 2017: 437-457 - Samuel Ang, Hau Chan, Albert Xin Jiang, William Yeoh:
Game-Theoretic Goal Recognition Models with Applications to Security Domains. GameSec 2017: 256-272 - Bastián Bahamondes, José Correa, Jannik Matuschke, Gianpaolo Oriolo:
Adaptivity in Network Interdiction. GameSec 2017: 40-52 - Elizabeth Bondi, Fei Fang, Debarun Kar, Venil Loyd Noronha, Donnabell Dmello, Milind Tambe, Arvind Iyer, Robert Hannaford:
VIOLA: Video Labeling Application for Security Domains. GameSec 2017: 377-396 - Victor Bucarey, Carlos Casorrán, Óscar Figueroa, Karla Rosas, Hugo F. Navarrete, Fernando Ordóñez:
Building Real Stackelberg Security Games for Border Patrols. GameSec 2017: 193-212 - Matteo Campanelli, Rosario Gennaro:
Efficient Rational Proofs for Space Bounded Computations. GameSec 2017: 53-73 - Tristan Caulfield, Christos Ioannidis, David J. Pym:
The U.S. Vulnerabilities Equities Process: An Economic Perspective. GameSec 2017: 131-150 - Jinshu Cui, Heather Rosoff, Richard S. John:
Deterrence of Cyber Attackers in a Three-Player Behavioral Game. GameSec 2017: 418-436 - Karel Durkota, Viliam Lisý, Christopher Kiekintveld, Karel Horák, Branislav Bosanský, Tomás Pevný:
Optimal Strategies for Detecting Data Exfiltration by Internal and External Attackers. GameSec 2017: 171-192 - Xiaotao Feng, Zizhan Zheng, Prasant Mohapatra, Derya Cansever:
A Stackelberg Game and Markov Modeling of Moving Target Defense. GameSec 2017: 315-335 - Yezekael Hayel, Quanyan Zhu:
Dynamics of Strategic Protection Against Virus Propagation in Heterogeneous Complex Networks. GameSec 2017: 506-518 - Xiaobing He, Hermann de Meer:
A Stochastic Game-Theoretic Model for Smart Grid Communication Networks. GameSec 2017: 295-314 - Karel Horák, Quanyan Zhu, Branislav Bosanský:
Manipulating Adversary's Belief: A Dynamic Game Approach to Deception by Design for Proactive Network Security. GameSec 2017: 273-294 - Linan Huang, Juntao Chen, Quanyan Zhu:
A Large-Scale Markov Game Approach to Dynamic Protection of Interdependent Infrastructure Networks. GameSec 2017: 357-376 - Ziad Ismail, Christophe Kiennert, Jean Leneutre, Lin Chen:
A Game Theoretical Model for Optimal Distribution of Network Security Resources. GameSec 2017: 234-255 - Corine M. Laan, Ana Isabel Barros, Richard J. Boucherie, Herman Monsuur:
Security Games with Probabilistic Constraints on the Agent's Strategy. GameSec 2017: 481-493 - Aron Laszka, Sadegh Farhang, Jens Grossklags:
On the Economics of Ransomware. GameSec 2017: 397-417 - Thanh Hong Nguyen, Michael P. Wellman, Satinder Singh:
A Stackelberg Game Model for Botnet Data Exfiltration. GameSec 2017: 151-170 - Jeffrey Pawlick, Quanyan Zhu:
Proactive Defense Against Physical Denial of Service Attacks Using Poisson Signaling Games. GameSec 2017: 336-356 - Sarah Michele Rajtmajer, Anna Cinzia Squicciarini, Jose M. Such, Justin Semonsen, Andrew Belmonte:
An Ultimatum Game Model for the Evolution of Privacy in Jointly Managed Content. GameSec 2017: 112-130 - Stefan Rass, Sandra König, Stefan Schauer:
On the Cost of Game Playing: How to Control the Expenses in Mixed Strategies. GameSec 2017: 494-505 - Ariel Rosenfeld, Oleg Maksimov, Sarit Kraus:
Optimizing Traffic Enforcement: From the Lab to the Roads. GameSec 2017: 3-20 - Muhammed O. Sayin, Tamer Basar:
Secure Sensor Design for Cyber-Physical Systems Against Advanced Persistent Threats. GameSec 2017: 91-111 - Deepak K. Tosh, Iman Vakilinia, Sachin Shetty, Shamik Sengupta, Charles A. Kamhoua, Laurent Njilla, Kevin A. Kwiat:
Three Layer Game Theoretic Decision Framework for Cyber-Investment and Cyber-Insurance. GameSec 2017: 519-532 - Haifeng Xu, Benjamin J. Ford, Fei Fang, Bistra Dilkina, Andrew J. Plumptre, Milind Tambe, Margaret Driciru, Fred Wanyama, Aggrey Rwetsiba, Mustapha Nsubaga, Joshua Mabonga:
Optimal Patrol Planning for Green Security Games with Black-Box Attackers. GameSec 2017: 458-477 - Tao Zhang, Quanyan Zhu:
Strategic Defense Against Deceptive Civilian GPS Spoofing of Unmanned Aerial Vehicles. GameSec 2017: 213-233 - Yevhen Zolotavkin, Julián García, Carsten Rudolph:
Incentive Compatibility of Pay Per Last N Shares in Bitcoin Mining Pools. GameSec 2017: 21-39 - Stefan Rass, Bo An, Christopher Kiekintveld, Fei Fang, Stefan Schauer:
Decision and Game Theory for Security - 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings. Lecture Notes in Computer Science 10575, Springer 2017, ISBN 978-3-319-68710-0 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-03 21:55 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint