


default search action
12th GameSec 2021: Virtual Event
- Branislav Bosanský

, Cleotilde Gonzalez
, Stefan Rass
, Arunesh Sinha:
Decision and Game Theory for Security - 12th International Conference, GameSec 2021, Virtual Event, October 25-27, 2021, Proceedings. Lecture Notes in Computer Science 13061, Springer 2021, ISBN 978-3-030-90369-5
Theoretical Foundations in Equilibrium Computation
- Sam Ganzfried:

Computing Nash Equilibria in Multiplayer DAG-Structured Stochastic Games with Persistent Imperfect Information. 3-16 - Jianzong Pi

, Joseph L. Heyman
, Abhishek Gupta
:
Two Algorithms for Computing Exact and Approximate Nash Equilibria in Bimatrix Games. 17-36 - Tomás Kroupa

, Sara Vannucci
, Tomás Votroubek
:
Separable Network Games with Compact Strategy Sets. 37-56
Machine Learning and Game Theory
- Andrew R. Butler, Thanh Hong Nguyen, Arunesh Sinha

:
Countering Attacker Data Manipulation in Security Games. 59-79 - Benjamin Roussillon, Patrick Loiseau:

Scalable Optimal Classifiers for Adversarial Settings Under Uncertainty. 80-97 - Junlin Wu

, Charles A. Kamhoua, Murat Kantarcioglu, Yevgeniy Vorobeychik:
Learning Generative Deception Strategies in Combinatorial Masking Games. 98-117 - Kun Jin

, Tongxin Yin
, Charles A. Kamhoua
, Mingyan Liu
:
Network Games with Strategic Machine Learning. 118-137 - Mark Bilinski

, Joseph DiVita
, Kimberly Ferguson-Walter
, Sunny Fugate
, Ryan Gabrys
, Justin Mauger
, Brian Souza
:
No Time to Lie: Bounds on the Learning Rate of a Defender for Inferring Attacker Target Preferences. 138-157 - Maximilian Samsinger, Florian Merkle, Pascal Schöttle, Tomás Pevný:

When Should You Defend Your Classifier? - - A Game-Theoretical Analysis of Countermeasures Against Adversarial Examples. 158-177
Ransomware
- Iman Vakilinia

, Mohammad Mahdi Khalili, Ming Li:
A Mechanism Design Approach to Solve Ransomware Dilemmas. 181-194 - Erick Galinkin

:
Winning the Ransomware Lottery - A Game-Theoretic Approach to Preventing Ransomware Attacks. 195-207 - Yuhan Zhao, Yunfei Ge

, Quanyan Zhu:
Combating Ransomware in Internet of Things: A Games-in-Games Approach for Cross-Layer Cyber Defense and Security Investment. 208-228
Cyber-physical Systems Security
- Luyao Niu, Dinuka Sahabandu, Andrew Clark, Radha Poovendran

:
A Game-Theoretic Framework for Controlled Islanding in the Presence of Adversaries. 231-250 - Swastik Brahma, Laurent Njilla, Satyaki Nan:

Game Theoretic Hardware Trojan Testing Under Cost Considerations. 251-270 - Shanto Roy, Salah Uddin Kadir

, Yevgeniy Vorobeychik, Aron Laszka:
Strategic Remote Attestation: Testbed for Internet-of-Things Devices and Stackelberg Security Game for Optimal Strategies. 271-290
Innovations in Attacks and Defenses
- Zahra Motaqy, Ghada Almashaqbeh, Behnam Bahrak, Naser Yazdani:

Bet and Attack: Incentive Compatible Collaborative Attacks Using Smart Contracts. 293-313 - Linan Huang

, Quanyan Zhu:
Combating Informational Denial-of-Service (IDoS) Attacks: Modeling and Mitigation of Attentional Human Vulnerability. 314-333 - Wenjie Bai, Jeremiah Blocki

, Benjamin Harsha:
Password Strength Signaling: A Counter-Intuitive Defense Against Password Cracking. 334-353 - Erick Galinkin

, John Carter
, Spiros Mancoridis
:
Evaluating Attacker Risk Behavior in an Internet of Things Ecosystem. 354-364 - Brandon C. Collins, Shouhuai Xu, Philip N. Brown:

Paying Firms to Share Cyber Threat Intelligence. 365-377

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














