


default search action
6th GameSec 2015: London, UK
- M. H. R. Khouzani, Emmanouil A. Panaousis, George Theodorakopoulos

:
Decision and Game Theory for Security - 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedings. Lecture Notes in Computer Science 9406, Springer 2015, ISBN 978-3-319-25593-4
Full Papers
- Andrew Clark, Kun Sun, Linda Bushnell

, Radha Poovendran
:
A Game-Theoretic Approach to IP Address Randomization in Decoy-Based Cyber Defense. 3-21 - Yezekael Hayel, Quanyan Zhu:

Attack-Aware Cyber Insurance for Risk Sharing in Computer Networks. 22-34 - Benjamin J. Ford, Thanh Hong Nguyen, Milind Tambe, Nicole D. Sintov, Francesco Maria Delle Fave:

Beware the Soothsayer: From Attack Prediction Accuracy to Predictive Reliability in Security Games. 35-56 - Benjamin Johnson, Aron Laszka

, Jens Grossklags:
Games of Timing for Security in Dynamic Environments. 57-73 - David S. Leslie

, Chris Sherfield, Nigel P. Smart:
Threshold FlipThem: When the Winner Does Not Need to Take All. 74-92 - Ming Zhang, Zizhan Zheng

, Ness B. Shroff:
A Game Theoretic Model for Defending Against Stealthy Attacks with Limited Resources. 93-112 - Phillip Lee, Andrew Clark, Basel Alomair

, Linda Bushnell
, Radha Poovendran
:
Passivity-Based Distributed Strategies for Stochastic Stackelberg Security Games. 113-129 - Richard Klíma, Viliam Lisý

, Christopher Kiekintveld:
Combining Online Learning and Equilibrium Computation in Security Games. 130-149 - Ashish Ranjan Hota

, Shreyas Sundaram
:
Interdependent Security Games Under Behavioral Probability Weighting. 150-169 - Thanh Hong Nguyen, Francesco Maria Delle Fave, Debarun Kar, Aravind S. Lakshminarayanan, Amulya Yadav, Milind Tambe, Noa Agmon, Andrew J. Plumptre, Margaret Driciru, Fred Wanyama, Aggrey Rwetsiba:

Making the Most of Our Regrets: Regret-Based Solutions to Handle Payoff Uncertainty and Elicitation in Green Security Games. 170-191 - Nicola Basilico

, Giuseppe De Nittis, Nicola Gatti:
A Security Game Model for Environment Protection in the Presence of an Alarm System. 192-207 - Sarah Michele Rajtmajer, Christopher Griffin

, Anna Cinzia Squicciarini
:
Determining a Discrete Set of Site-Constrained Privacy Options for Users in Social Networks Through Stackelberg Games. 208-227 - Karel Durkota, Viliam Lisý

, Branislav Bosanský, Christopher Kiekintveld:
Approximate Solutions for Attack Graph Games with Imperfect Information. 228-249 - Chad Heitzenrater, Greg Taylor, Andrew Simpson

:
When the Winning Move is Not to Play: Games of Deterrence in Cyber Security. 250-269 - Matteo Campanelli

, Rosario Gennaro:
Sequentially Composable Rational Proofs. 270-288 - Jeffrey Pawlick, Sadegh Farhang, Quanyan Zhu:

Flip the Cloud: Cyber-Physical Signaling Games in the Presence of Advanced Persistent Threats. 289-308
Short Papers
- Aleksandr Lenin, Jan Willemson, Anton Charnamord:

Genetic Approximations for the Failure-Free Security Games. 311-321 - Monireh Mohebbi Moghaddam, Mohammad Hossein Manshaei, Quanyan Zhu:

To Trust or Not: A Security Signaling Game Between Service Provider and Client. 322-333 - Jonathan S. A. Merlevede, Tom Holvoet

:
Game Theory and Security: Recent History and Future Directions. 334-345 - Stefan Rass

, Sandra König
, Stefan Schauer:
Uncertainty in Games: Using Probability-Distributions as Payoffs. 346-357 - Chong Huang, Lalitha Sankar, Anand D. Sarwate

:
Incentive Schemes for Privacy-Sensitive Consumers. 358-369

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














