


default search action
9th GameSec 2018: Seattle, WA, USA
- Linda Bushnell
, Radha Poovendran
, Tamer Basar:
Decision and Game Theory for Security - 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings. Lecture Notes in Computer Science 11199, Springer 2018, ISBN 978-3-030-01553-4 - Chong Huang, Lalitha Sankar:
Impact of Privacy on Free Online Service Markets. 1-21 - Daniel W. Woods
, Andrew C. Simpson
:
Cyber-Warranties as a Quality Signal for Information Security Products. 22-37 - Walter O. Krawec, Fei Miao:
Game Theoretic Security Framework for Quantum Key Distribution. 38-58 - Ayon Sen, Scott Alfeld, Xuezhou Zhang, Ara Vartanian, Yuzhe Ma, Xiaojin Zhu:
Training Set Camouflage. 59-79 - Shana Moothedath, Dinuka Sahabandu, Andrew Clark, Sangho Lee, Wenke Lee, Radha Poovendran
:
Multi-stage Dynamic Information Flow Tracking Game. 80-101 - Yongshuai Liu
, Jiyu Chen
, Hao Chen
:
Less is More: Culling the Training Set to Improve Robustness of Deep Neural Networks. 102-114 - Mark Bilinski
, Ryan Gabrys
, Justin Mauger
:
Optimal Placement of Honeypots for Network Defense. 115-126 - Maiki Fujita, Kenji Yasunaga
, Takeshi Koshiba
:
Perfectly Secure Message Transmission Against Rational Timid Adversaries. 127-144 - Yi Han
, Benjamin I. P. Rubinstein
, Tamas Abraham
, Tansu Alpcan
, Olivier Y. de Vel, Sarah M. Erfani
, David Hubczenko, Christopher Leckie
, Paul Montague:
Reinforcement Learning for Autonomous Defence in Software-Defined Networking. 145-165 - Joseph L. Heyman
, Abhishek Gupta
:
Colonel Blotto Game with Coalition Formation for Sharing Resources. 166-185 - Yuzhe Ma, Kwang-Sung Jun, Lihong Li, Xiaojin Zhu:
Data Poisoning Attacks in Contextual Bandits. 186-204 - Linan Huang
, Quanyan Zhu:
Analysis and Computation of Adaptive Defense Strategies Against Advanced Persistent Threats for Cyber-Physical Systems. 205-226 - Moran Feldman
, Gonen Frim, Rica Gonen:
Multi-sided Advertising Markets: Dynamic Mechanisms and Incremental User Compensations. 227-247 - Antonin Demazy, Alexander C. Kalloniatis, Tansu Alpcan:
A Game-Theoretic Analysis of the Adversarial Boyd-Kuramoto Model. 248-264 - Jundong Chen
, Md. Shafaeat Hossain, Matthias R. Brust
, Naomi Johnson:
A Game Theoretic Analysis of the Twitter Follow-Unfollow Mechanism. 265-276 - Nick Plewtong, Bruce DeBruhl:
Game Theoretic Analysis of a Byzantine Attacker in Vehicular Mix-Zones. 277-295 - Bahare Kiumarsi, Tamer Basar:
Distributed Aggregative Games on Graphs in Adversarial Environments. 296-313 - Jasmin Wachter
, Stefan Rass
, Sandra König
, Stefan Schauer:
Disappointment-Aversion in Security Games. 314-325 - Sailik Sengupta, Ankur Chowdhary, Dijiang Huang
, Subbarao Kambhampati:
Moving Target Defense for the Placement of Intrusion Detection Systems in the Cloud. 326-345 - Daniel Clouse, David Burke:
Approximating Power Indices to Assess Cybersecurity Criticality. 346-365 - Luyao Niu, Andrew Clark:
A Differentially Private and Truthful Incentive Mechanism for Traffic Offload to Public Transportation. 366-385 - Sandamal Weerasinghe, Tansu Alpcan, Sarah M. Erfani, Christopher Leckie
, Peyam Pourbeik, Jack Riddle:
Deep Learning Based Game-Theoretical Approach to Evade Jamming Attacks. 386-397 - Jonathan M. Spring
, David J. Pym:
Towards Scientific Incident Response. 398-417 - Mehrdad Nojoumian:
Rational Trust Modeling. 418-431 - Arunesh Sinha
, Aaron Schlenker, Donnabell Dmello, Milind Tambe:
Scaling-Up Stackelberg Security Games Applications Using Approximations. 432-452 - Linh Nguyen, Sky Wang, Arunesh Sinha
:
A Learning and Masking Approach to Secure Learning. 453-464 - Naif Alzahrani, Nirupama Bulusu:
Towards True Decentralization: A Blockchain Consensus Protocol Based on Game Theory and Randomness. 465-485 - Muhammed O. Sayin
, Hossein Hosseini, Radha Poovendran
, Tamer Basar:
A Game Theoretical Framework for Inter-process Adversarial Intervention Detection. 486-507 - Aron Laszka
, Emmanouil Panaousis
, Jens Grossklags:
Cyber-Insurance as a Signaling Game: Self-reporting and External Security Audits. 508-520 - Erik Miehling, Baicen Xiao, Radha Poovendran
, Tamer Basar:
A Bayesian Multi-armed Bandit Approach for Identifying Human Vulnerabilities. 521-539 - Tao Zhang, Quanyan Zhu:
Hypothesis Testing Game for Cyber Deception. 540-555 - Anjon Basak
, Marcus Gutierrez
, Christopher Kiekintveld
:
Algorithms for Subgame Abstraction with Applications to Cyber Defense. 556-568 - Wei Wang, Bo Zeng:
A Two-Stage Deception Game for Network Defense. 569-582 - Han-Ching Ou, Milind Tambe, Bistra Dilkina
, Phebe Vayanos:
Imbalanced Collusive Security Games. 583-602 - Aida Rahmattalabi, Phebe Vayanos, Milind Tambe:
A Robust Optimization Approach to Designing Near-Optimal Strategies for Constant-Sum Monitoring Games. 603-622 - Anjon Basak
, Jakub Cerný
, Marcus Gutierrez
, Shelby R. Curtis
, Charles A. Kamhoua
, Daniel Jones
, Branislav Bosanský
, Christopher Kiekintveld
:
An Initial Study of Targeted Personality Models in the FlipIt Game. 623-636

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.