default search action
14th GameSec 2023: Avignon, France
- Jie Fu, Tomás Kroupa, Yezekael Hayel:
Decision and Game Theory for Security: 14th International Conference, GameSec 2023, Avignon, France, October 18-20, 2023, Proceedings. Lecture Notes in Computer Science 14167, Springe 2023, ISBN 978-3-031-50669-7 - Sam Ganzfried:
Observable Perfect Equilibrium. 3-22 - Zhen Li, Qi Liao:
Does Cyber-Insurance Benefit the Insured or the Attacker? - A Game of Cyber-Insurance. 23-42 - David Sychrovsky, Sameer Desai, Martin Loebl:
Rule Enforcing Through Ordering. 43-62 - Zimeng Song, Chun Kai Ling, Fei Fang:
Multi-defender Security Games with Schedules. 65-85 - Willie Kouam, Yezekael Hayel, Gabriel Deugoue, Olivier Tsemogne, Charles A. Kamhoua:
Asymmetric Centrality Game Against Network Epidemic Propagation. 86-109 - Eckhard Pflügel:
Shades of Grey: Strategic Bimatrix Stopping Games for Modelling (Un)Ethical Hacking Roles. 110-129 - Sonja Johnson-Yu, Jessie Finocchiaro, Kai Wang, Yevgeniy Vorobeychik, Arunesh Sinha, Aparna Taneja, Milind Tambe:
Characterizing and Improving the Robustness of Predict-Then-Optimize Frameworks. 133-152 - Takuma Adams, Andrew C. Cullen, Tansu Alpcan:
Quantisation Effects in Adversarial Cyber-Physical Games. 153-171 - Kim Hammar, Rolf Stadler:
Scalable Learning of Intrusion Response Through Recursive Decomposition. 172-192 - Md. Abu Sayed, Ahmed H. Anwar, Christopher Kiekintveld, Charles A. Kamhoua:
Honeypot Allocation for Cyber Deception in Dynamic Tactical Networks: A Game Theoretic Approach. 195-214 - Haoxiang Ma, Shuo Han, Charles A. Kamhoua, Jie Fu:
Optimal Resource Allocation for Proactive Defense with Deception in Probabilistic Attack Graphs. 215-233 - Sonia Cromp, Mark Bilinski, Ryan Gabrys, Frederic Sala:
The Credential is Not Enough: Deception with Honeypots and Fake Credentials. 234-254 - Shivakumar Mahesh, Nicholas Bishop, Le Cong Dinh, Long Tran-Thanh:
Playing Repeated Coopetitive Polymatrix Games with Small Manipulation Cost. 257-276 - Keigo Yamashita, Kenji Yasunaga:
Rational Broadcast Protocols Against Timid Adversaries. 277-293 - Fabrice Mvah, Vianney Kengne Tchendji, Clémentin Tayou Djamégni, Ahmed H. Anwar, Deepak K. Tosh, Charles A. Kamhoua:
FlipPath Game to Counter Stealthy Attacks in SDN-Based Tactical Networks. 294-308 - Tom Meurs, Edward J. Cartwright, Anna Cartwright:
Double-Sided Information Asymmetry in Double Extortion Ransomware. 311-328 - Sumukha Udupa, Hazhar Rahmani, Jie Fu:
Opacity-Enforcing Active Perception and Control Against Eavesdropping Attacks. 329-348 - Ya-Ting Yang, Tao Zhang, Quanyan Zhu:
A Game-Theoretic Analysis of Auditing Differentially Private Algorithms with Epistemically Disparate Herd. 349-368 - Jean Le Hénaff, Hélène Le Cadre:
Modeling and Analysis of a Nonlinear Security Game with Mixed Armament. 369-388
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.