


default search action
3rd GameSec 2012: Budapest, Hungary
- Jens Grossklags, Jean C. Walrand:

Decision and Game Theory for Security - Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings. Lecture Notes in Computer Science 7638, Springer 2012, ISBN 978-3-642-34265-3
Secret Communications
- Benjamin Johnson, Pascal Schöttle, Rainer Böhme:

Where to Hide the Bits ? 1-17 - Mehrdad Nojoumian, Douglas R. Stinson:

Socio-Rational Secret Sharing as a New Direction in Rational Cryptography. 18-37
Identification of Attackers
- Jeremiah Blocki

, Nicolas Christin
, Anupam Datta, Arunesh Sinha
:
Audit Mechanisms for Provable Risk Management and Accountable Data Governance. 38-59 - SingRu Celine Hoe, Murat Kantarcioglu, Alain Bensoussan

:
A Game Theoretical Analysis of Lemonizing Cybercriminal Black Markets. 60-77 - Lemonia Dritsoula, Patrick Loiseau, John Musacchio:

Computing the Nash Equilibria of Intruder Classification Games. 78-97
Multi-step Attacks
- Ahto Buldas

, Roman Stepanenko:
Upper Bounds for Adversaries' Utility in Attack Trees. 98-117 - Jingqiang Lin, Peng Liu, Jiwu Jing:

Using Signaling Games to Model the Multi-step Attack-Defense Scenarios on Confidentiality. 118-137 - Alan Nochenson, C. F. Larry Heimann:

Simulation and Game-Theoretic Analysis of an Attacker-Defender Game. 138-151
Network Security
- Aron Laszka

, Dávid Szeszlér, Levente Buttyán:
Linear Loss Function for the Network Blocking Game: An Efficient Model for Measuring Network Robustness and Link Criticality. 152-170 - Andrew Clark, Quanyan Zhu, Radha Poovendran

, Tamer Basar:
Deceptive Routing in Relay Networks. 171-185 - Assane Gueye

, Vladimir Marbukh:
A Game-Theoretic Framework for Network Security Vulnerability Assessment and Mitigation. 186-200
System Defense
- Radek Píbil, Viliam Lisý

, Christopher Kiekintveld, Branislav Bosanský, Michal Pechoucek
:
Game Theoretic Model of Strategic Honeypot Selection in Computer Networks. 201-220 - M. Patrick Collins:

A Cost-Based Mechanism for Evaluating the Effectiveness of Moving Target Defenses. 221-233 - Viet Pham

, Carlos Cid:
Are We Compromised? Modelling Security Assessment Games. 234-247 - Kevin D. Bowers, Marten van Dijk

, Robert Griffin, Ari Juels, Alina Oprea, Ronald L. Rivest, Nikos Triandopoulos:
Defending against the Unknown Enemy: Applying FlipIt to System Security. 248-263
Applications Security
- Saurabh Amin, Galina A. Schwartz, Hamidou Tembine

:
Incentives and Security in Electricity Distribution Networks. 264-280 - Yee Wei Law

, Tansu Alpcan
, Marimuthu Palaniswami, Subhrakanti Dey
:
Security Games and Risk Minimization for Automatic Generation Control in Smart Grid. 281-295 - Robert Nix, Murat Kantarcioglu:

Contractual Agreement Design for Enforcing Honesty in Cloud Outsourcing. 296-308

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














