default search action
12th GameSec 2021: Virtual Event
- Branislav Bosanský, Cleotilde Gonzalez, Stefan Rass, Arunesh Sinha:
Decision and Game Theory for Security - 12th International Conference, GameSec 2021, Virtual Event, October 25-27, 2021, Proceedings. Lecture Notes in Computer Science 13061, Springer 2021, ISBN 978-3-030-90369-5
Theoretical Foundations in Equilibrium Computation
- Sam Ganzfried:
Computing Nash Equilibria in Multiplayer DAG-Structured Stochastic Games with Persistent Imperfect Information. 3-16 - Jianzong Pi, Joseph L. Heyman, Abhishek Gupta:
Two Algorithms for Computing Exact and Approximate Nash Equilibria in Bimatrix Games. 17-36 - Tomás Kroupa, Sara Vannucci, Tomás Votroubek:
Separable Network Games with Compact Strategy Sets. 37-56
Machine Learning and Game Theory
- Andrew R. Butler, Thanh Hong Nguyen, Arunesh Sinha:
Countering Attacker Data Manipulation in Security Games. 59-79 - Benjamin Roussillon, Patrick Loiseau:
Scalable Optimal Classifiers for Adversarial Settings Under Uncertainty. 80-97 - Junlin Wu, Charles A. Kamhoua, Murat Kantarcioglu, Yevgeniy Vorobeychik:
Learning Generative Deception Strategies in Combinatorial Masking Games. 98-117 - Kun Jin, Tongxin Yin, Charles A. Kamhoua, Mingyan Liu:
Network Games with Strategic Machine Learning. 118-137 - Mark Bilinski, Joseph DiVita, Kimberly Ferguson-Walter, Sunny Fugate, Ryan Gabrys, Justin Mauger, Brian Souza:
No Time to Lie: Bounds on the Learning Rate of a Defender for Inferring Attacker Target Preferences. 138-157 - Maximilian Samsinger, Florian Merkle, Pascal Schöttle, Tomás Pevný:
When Should You Defend Your Classifier? - - A Game-Theoretical Analysis of Countermeasures Against Adversarial Examples. 158-177
Ransomware
- Iman Vakilinia, Mohammad Mahdi Khalili, Ming Li:
A Mechanism Design Approach to Solve Ransomware Dilemmas. 181-194 - Erick Galinkin:
Winning the Ransomware Lottery - A Game-Theoretic Approach to Preventing Ransomware Attacks. 195-207 - Yuhan Zhao, Yunfei Ge, Quanyan Zhu:
Combating Ransomware in Internet of Things: A Games-in-Games Approach for Cross-Layer Cyber Defense and Security Investment. 208-228
Cyber-physical Systems Security
- Luyao Niu, Dinuka Sahabandu, Andrew Clark, Radha Poovendran:
A Game-Theoretic Framework for Controlled Islanding in the Presence of Adversaries. 231-250 - Swastik Brahma, Laurent Njilla, Satyaki Nan:
Game Theoretic Hardware Trojan Testing Under Cost Considerations. 251-270 - Shanto Roy, Salah Uddin Kadir, Yevgeniy Vorobeychik, Aron Laszka:
Strategic Remote Attestation: Testbed for Internet-of-Things Devices and Stackelberg Security Game for Optimal Strategies. 271-290
Innovations in Attacks and Defenses
- Zahra Motaqy, Ghada Almashaqbeh, Behnam Bahrak, Naser Yazdani:
Bet and Attack: Incentive Compatible Collaborative Attacks Using Smart Contracts. 293-313 - Linan Huang, Quanyan Zhu:
Combating Informational Denial-of-Service (IDoS) Attacks: Modeling and Mitigation of Attentional Human Vulnerability. 314-333 - Wenjie Bai, Jeremiah Blocki, Benjamin Harsha:
Password Strength Signaling: A Counter-Intuitive Defense Against Password Cracking. 334-353 - Erick Galinkin, John Carter, Spiros Mancoridis:
Evaluating Attacker Risk Behavior in an Internet of Things Ecosystem. 354-364 - Brandon C. Collins, Shouhuai Xu, Philip N. Brown:
Paying Firms to Share Cyber Threat Intelligence. 365-377
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.