


default search action
1st GameSec 2010: Berlin, Germany
- Tansu Alpcan, Levente Buttyán, John S. Baras:

Decision and Game Theory for Security - First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings. Lecture Notes in Computer Science 6442, Springer 2010, ISBN 978-3-642-17196-3
Security Investments and Planning
- Assane Gueye

, Jean C. Walrand, Venkat Anantharam:
Design of Network Topology in an Adversarial Environment. 1-20 - Rainer Böhme, Márk Félegyházi:

Optimal Information Security Investment with Penetration Testing. 21-37
Privacy and Anonymity
- Mathias Humbert, Mohammad Hossein Manshaei, Julien Freudiger, Jean-Pierre Hubaux:

Tracking Games in Mobile Networks. 38-57 - Nan Zhang, Wei Yu

, Xinwen Fu
, Sajal K. Das
:
gPath: A Game-Theoretic Path Selection Algorithm to Protect Tor's Anonymity. 58-71 - Murat Kantarcioglu, Alain Bensoussan

, SingRu Celine Hoe:
When Do Firms Invest in Privacy-Preserving Technologies? 72-86
Adversarial and Robust Control
- Eitan Altman, Tamer Basar, Veeraruna Kavitha:

Adversarial Control in a Delay Tolerant Network. 87-106 - Saurabh Amin, Galina A. Schwartz, S. Shankar Sastry:

Security Interdependencies for Networked Control Systems with Identical Agents. 107-122 - Eitan Altman, Alireza Aram, Tamer Basar, Corinne Touati, Saswati Sarkar:

Robust Control in Sparse Mobile Ad-Hoc Networks. 123-134
Network Security and Botnets
- Alain Bensoussan

, Murat Kantarcioglu, SingRu Celine Hoe:
A Game-Theoretical Approach for Finding Optimal Strategies in a Botnet Defense Model. 135-148 - Nevena Vratonjic, Mohammad Hossein Manshaei, Maxim Raya, Jean-Pierre Hubaux:

ISPs and Ad Networks Against Botnet Ad Fraud. 149-167 - Nicola Gatti

, Mattia Monga
, Sabrina Sicari:
A Localization Game in Wireless Sensor Networks. 168-179 - Alberto Volpatto

, Federico Maggi
, Stefano Zanero
:
Effective Multimodel Anomaly Detection Using Cooperative Negotiation. 180-191
Authorization and Authentication
- Sören Preibusch, Joseph Bonneau:

The Password Game: Negative Externalities from Weak Password Practices. 192-207 - Farzad Salim, Jason Reid, Uwe Dulleck

, Ed Dawson
:
Towards a Game Theoretic Authorisation Model. 208-219
Theory and Algorithms for Security
- Steve Alpern, Robbert Fokkink, Joram op den Kelder, Tom Lidbetter:

Disperse or Unite? A Mathematical Model of Coordinated Attack. 220-233 - Benjamin Johnson, Jens Grossklags, Nicolas Christin

, John Chuang
:
Uncertainty in Interdependent Security Games. 234-244 - Barbara Kordy, Sjouke Mauw

, Matthijs Melissen, Patrick Schweitzer:
Attack-Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent. 245-256 - Christopher Kiekintveld, Janusz Marecki, Milind Tambe:

Methods and Algorithms for Infinite Bayesian Stackelberg Security Games - (Extended Abstract). 257-265

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














