


default search action
14th GameSec 2023: Avignon, France
- Jie Fu

, Tomás Kroupa
, Yezekael Hayel
:
Decision and Game Theory for Security: 14th International Conference, GameSec 2023, Avignon, France, October 18-20, 2023, Proceedings. Lecture Notes in Computer Science 14167, Springe 2023, ISBN 978-3-031-50669-7 - Sam Ganzfried:

Observable Perfect Equilibrium. 3-22 - Zhen Li, Qi Liao:

Does Cyber-Insurance Benefit the Insured or the Attacker? - A Game of Cyber-Insurance. 23-42 - David Sychrovsky

, Sameer Desai
, Martin Loebl
:
Rule Enforcing Through Ordering. 43-62 - Zimeng Song, Chun Kai Ling, Fei Fang:

Multi-defender Security Games with Schedules. 65-85 - Willie Kouam

, Yezekael Hayel
, Gabriel Deugoue
, Olivier Tsemogne
, Charles A. Kamhoua
:
Asymmetric Centrality Game Against Network Epidemic Propagation. 86-109 - Eckhard Pflügel

:
Shades of Grey: Strategic Bimatrix Stopping Games for Modelling (Un)Ethical Hacking Roles. 110-129 - Sonja Johnson-Yu

, Jessie Finocchiaro
, Kai Wang, Yevgeniy Vorobeychik
, Arunesh Sinha
, Aparna Taneja
, Milind Tambe
:
Characterizing and Improving the Robustness of Predict-Then-Optimize Frameworks. 133-152 - Takuma Adams

, Andrew C. Cullen
, Tansu Alpcan
:
Quantisation Effects in Adversarial Cyber-Physical Games. 153-171 - Kim Hammar, Rolf Stadler:

Scalable Learning of Intrusion Response Through Recursive Decomposition. 172-192 - Md. Abu Sayed

, Ahmed H. Anwar
, Christopher Kiekintveld
, Charles A. Kamhoua
:
Honeypot Allocation for Cyber Deception in Dynamic Tactical Networks: A Game Theoretic Approach. 195-214 - Haoxiang Ma

, Shuo Han
, Charles A. Kamhoua
, Jie Fu
:
Optimal Resource Allocation for Proactive Defense with Deception in Probabilistic Attack Graphs. 215-233 - Sonia Cromp

, Mark Bilinski
, Ryan Gabrys
, Frederic Sala
:
The Credential is Not Enough: Deception with Honeypots and Fake Credentials. 234-254 - Shivakumar Mahesh, Nicholas Bishop, Le Cong Dinh, Long Tran-Thanh:

Playing Repeated Coopetitive Polymatrix Games with Small Manipulation Cost. 257-276 - Keigo Yamashita, Kenji Yasunaga:

Rational Broadcast Protocols Against Timid Adversaries. 277-293 - Fabrice Mvah

, Vianney Kengne Tchendji
, Clémentin Tayou Djamégni
, Ahmed H. Anwar
, Deepak K. Tosh
, Charles A. Kamhoua
:
FlipPath Game to Counter Stealthy Attacks in SDN-Based Tactical Networks. 294-308 - Tom Meurs

, Edward J. Cartwright
, Anna Cartwright
:
Double-Sided Information Asymmetry in Double Extortion Ransomware. 311-328 - Sumukha Udupa

, Hazhar Rahmani
, Jie Fu
:
Opacity-Enforcing Active Perception and Control Against Eavesdropping Attacks. 329-348 - Ya-Ting Yang, Tao Zhang, Quanyan Zhu:

A Game-Theoretic Analysis of Auditing Differentially Private Algorithms with Epistemically Disparate Herd. 349-368 - Jean Le Hénaff, Hélène Le Cadre:

Modeling and Analysis of a Nonlinear Security Game with Mixed Armament. 369-388

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














