default search action
9th GameSec 2018: Seattle, WA, USA
- Linda Bushnell, Radha Poovendran, Tamer Basar:
Decision and Game Theory for Security - 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings. Lecture Notes in Computer Science 11199, Springer 2018, ISBN 978-3-030-01553-4 - Chong Huang, Lalitha Sankar:
Impact of Privacy on Free Online Service Markets. 1-21 - Daniel W. Woods, Andrew C. Simpson:
Cyber-Warranties as a Quality Signal for Information Security Products. 22-37 - Walter O. Krawec, Fei Miao:
Game Theoretic Security Framework for Quantum Key Distribution. 38-58 - Ayon Sen, Scott Alfeld, Xuezhou Zhang, Ara Vartanian, Yuzhe Ma, Xiaojin Zhu:
Training Set Camouflage. 59-79 - Shana Moothedath, Dinuka Sahabandu, Andrew Clark, Sangho Lee, Wenke Lee, Radha Poovendran:
Multi-stage Dynamic Information Flow Tracking Game. 80-101 - Yongshuai Liu, Jiyu Chen, Hao Chen:
Less is More: Culling the Training Set to Improve Robustness of Deep Neural Networks. 102-114 - Mark Bilinski, Ryan Gabrys, Justin Mauger:
Optimal Placement of Honeypots for Network Defense. 115-126 - Maiki Fujita, Kenji Yasunaga, Takeshi Koshiba:
Perfectly Secure Message Transmission Against Rational Timid Adversaries. 127-144 - Yi Han, Benjamin I. P. Rubinstein, Tamas Abraham, Tansu Alpcan, Olivier Y. de Vel, Sarah M. Erfani, David Hubczenko, Christopher Leckie, Paul Montague:
Reinforcement Learning for Autonomous Defence in Software-Defined Networking. 145-165 - Joseph L. Heyman, Abhishek Gupta:
Colonel Blotto Game with Coalition Formation for Sharing Resources. 166-185 - Yuzhe Ma, Kwang-Sung Jun, Lihong Li, Xiaojin Zhu:
Data Poisoning Attacks in Contextual Bandits. 186-204 - Linan Huang, Quanyan Zhu:
Analysis and Computation of Adaptive Defense Strategies Against Advanced Persistent Threats for Cyber-Physical Systems. 205-226 - Moran Feldman, Gonen Frim, Rica Gonen:
Multi-sided Advertising Markets: Dynamic Mechanisms and Incremental User Compensations. 227-247 - Antonin Demazy, Alexander C. Kalloniatis, Tansu Alpcan:
A Game-Theoretic Analysis of the Adversarial Boyd-Kuramoto Model. 248-264 - Jundong Chen, Md. Shafaeat Hossain, Matthias R. Brust, Naomi Johnson:
A Game Theoretic Analysis of the Twitter Follow-Unfollow Mechanism. 265-276 - Nick Plewtong, Bruce DeBruhl:
Game Theoretic Analysis of a Byzantine Attacker in Vehicular Mix-Zones. 277-295 - Bahare Kiumarsi, Tamer Basar:
Distributed Aggregative Games on Graphs in Adversarial Environments. 296-313 - Jasmin Wachter, Stefan Rass, Sandra König, Stefan Schauer:
Disappointment-Aversion in Security Games. 314-325 - Sailik Sengupta, Ankur Chowdhary, Dijiang Huang, Subbarao Kambhampati:
Moving Target Defense for the Placement of Intrusion Detection Systems in the Cloud. 326-345 - Daniel Clouse, David Burke:
Approximating Power Indices to Assess Cybersecurity Criticality. 346-365 - Luyao Niu, Andrew Clark:
A Differentially Private and Truthful Incentive Mechanism for Traffic Offload to Public Transportation. 366-385 - Sandamal Weerasinghe, Tansu Alpcan, Sarah M. Erfani, Christopher Leckie, Peyam Pourbeik, Jack Riddle:
Deep Learning Based Game-Theoretical Approach to Evade Jamming Attacks. 386-397 - Jonathan M. Spring, David J. Pym:
Towards Scientific Incident Response. 398-417 - Mehrdad Nojoumian:
Rational Trust Modeling. 418-431 - Arunesh Sinha, Aaron Schlenker, Donnabell Dmello, Milind Tambe:
Scaling-Up Stackelberg Security Games Applications Using Approximations. 432-452 - Linh Nguyen, Sky Wang, Arunesh Sinha:
A Learning and Masking Approach to Secure Learning. 453-464 - Naif Alzahrani, Nirupama Bulusu:
Towards True Decentralization: A Blockchain Consensus Protocol Based on Game Theory and Randomness. 465-485 - Muhammed O. Sayin, Hossein Hosseini, Radha Poovendran, Tamer Basar:
A Game Theoretical Framework for Inter-process Adversarial Intervention Detection. 486-507 - Aron Laszka, Emmanouil Panaousis, Jens Grossklags:
Cyber-Insurance as a Signaling Game: Self-reporting and External Security Audits. 508-520 - Erik Miehling, Baicen Xiao, Radha Poovendran, Tamer Basar:
A Bayesian Multi-armed Bandit Approach for Identifying Human Vulnerabilities. 521-539 - Tao Zhang, Quanyan Zhu:
Hypothesis Testing Game for Cyber Deception. 540-555 - Anjon Basak, Marcus Gutierrez, Christopher Kiekintveld:
Algorithms for Subgame Abstraction with Applications to Cyber Defense. 556-568 - Wei Wang, Bo Zeng:
A Two-Stage Deception Game for Network Defense. 569-582 - Han-Ching Ou, Milind Tambe, Bistra Dilkina, Phebe Vayanos:
Imbalanced Collusive Security Games. 583-602 - Aida Rahmattalabi, Phebe Vayanos, Milind Tambe:
A Robust Optimization Approach to Designing Near-Optimal Strategies for Constant-Sum Monitoring Games. 603-622 - Anjon Basak, Jakub Cerný, Marcus Gutierrez, Shelby R. Curtis, Charles A. Kamhoua, Daniel Jones, Branislav Bosanský, Christopher Kiekintveld:
An Initial Study of Targeted Personality Models in the FlipIt Game. 623-636
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.