default search action
2nd GameSec 2011: College Park, Maryland, USA
- John S. Baras, Jonathan Katz, Eitan Altman:
Decision and Game Theory for Security - Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011. Proceedings. Lecture Notes in Computer Science 7037, Springer 2011, ISBN 978-3-642-25279-2
Plenary Keynotes
- Joseph Y. Halpern:
Beyond Nash Equilibrium: Solution Concepts for the 21st Century. 1-3 - Nicolas Christin:
Network Security Games: Combining Game Theory, Behavioral Economics, and Network Measurements. 4-6
Attacks, Adversaries, and Game Theory
- Quanyan Zhu, Tamer Basar:
Indices of Power in Optimal IDS Default Configuration: Theory and Examples. 7-21 - Gabriel Fortunato Stocco, George Cybenko:
Exploiting Adversary's Risk Profiles in Imperfect Information Security Games. 22-33
Wireless Adhoc and Sensor Networks
- Shabnam Sodagari, T. Charles Clancy:
An Anti-jamming Strategy for Channel Access in Cognitive Radio Networks. 34-43 - Tamara Bonaci, Linda Bushnell:
Node Capture Games: A Game Theoretic Approach to Modeling and Mitigating Node Capture Attacks. 44-55 - Krzysztof Szajowski:
Multi-variate Quickest Detection of Significant Change Process. 56-66
Network Games
- Patrick Maillé, Peter Reichl, Bruno Tuffin:
Interplay between Security Providers, Consumers, and Attackers: A Weighted Congestion Game Approach. 67-86 - Ahmad Termimi Ab Ghani, Kazuyuki Tanaka:
Network Games with and without Synchroneity. 87-103 - Robbert Fokkink, Misha Stassen:
An Asymptotic Solution of Dresher's Guessing Game. 104-116
Security Insurance
- Benjamin Johnson, Rainer Böhme, Jens Grossklags:
Security Games with Market Insurance. 117-130 - Ranjan Pal, Leana Golubchik, Konstantinos Psounis:
Aegis A Novel Cyber-Insurance Model. 131-150
Security and Trust in Social Networks
- Andrew Clark, Radha Poovendran:
Maximizing Influence in Competitive Environments: A Game-Theoretic Approach. 151-162 - Francisco Santos, Mathias Humbert, Reza Shokri, Jean-Pierre Hubaux:
Collaborative Location Privacy with Rational Users. 163-181 - Tansu Alpcan, Albert Levi, Erkay Savas:
Digital Trust Games: An Experimental Study. 182-200 - Pern Hui Chia, John Chuang:
Colonel Blotto in the Phishing War. 201-218
Security Investments
- Murat Kantarcioglu, Alain Bensoussan, SingRu Celine Hoe:
Investment in Privacy-Preserving Technologies under Uncertainty. 219-238 - Ranjan Pal, Pan Hui:
Modeling Internet Security Investments: Tackling Topological Information Uncertainty. 239-257
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.