Abstract is missing.
- A Game-Theoretic Approach to IP Address Randomization in Decoy-Based Cyber DefenseAndrew Clark, Kun Sun, Linda Bushnell, Radha Poovendran. 3-21 [doi]
- Attack-Aware Cyber Insurance for Risk Sharing in Computer NetworksYezekael Hayel, Quanyan Zhu. 22-34 [doi]
- Beware the Soothsayer: From Attack Prediction Accuracy to Predictive Reliability in Security GamesBenjamin J. Ford, Thanh Nguyen, Milind Tambe, Nicole Sintov, Francesco Maria Delle Fave. 35-56 [doi]
- Games of Timing for Security in Dynamic EnvironmentsBenjamin Johnson, Aron Laszka, Jens Grossklags. 57-73 [doi]
- Threshold FlipThem: When the Winner Does Not Need to Take AllDavid Leslie, Chris Sherfield, Nigel P. Smart. 74-92 [doi]
- A Game Theoretic Model for Defending Against Stealthy Attacks with Limited ResourcesMing Zhang, Zizhan Zheng, Ness B. Shroff. 93-112 [doi]
- Passivity-Based Distributed Strategies for Stochastic Stackelberg Security GamesPhillip Lee, Andrew Clark, Basel Alomair, Linda Bushnell, Radha Poovendran. 113-129 [doi]
- Combining Online Learning and Equilibrium Computation in Security GamesRichard Klíma, Viliam Lisý, Christopher Kiekintveld. 130-149 [doi]
- Interdependent Security Games Under Behavioral Probability WeightingAshish R. Hota, Shreyas Sundaram. 150-169 [doi]
- Making the Most of Our Regrets: Regret-Based Solutions to Handle Payoff Uncertainty and Elicitation in Green Security GamesThanh Hong Nguyen, Francesco Maria Delle Fave, Debarun Kar, Aravind S. Lakshminarayanan, Amulya Yadav, Milind Tambe, Noa Agmon, Andrew J. Plumptre, Margaret Driciru, Fred Wanyama, Aggrey Rwetsiba. 170-191 [doi]
- A Security Game Model for Environment Protection in the Presence of an Alarm SystemNicola Basilico, Giuseppe De Nittis, Nicola Gatti. 192-207 [doi]
- Determining a Discrete Set of Site-Constrained Privacy Options for Users in Social Networks Through Stackelberg GamesSarah Michele Rajtmajer, Christopher Griffin, Anna Cinzia Squicciarini. 208-227 [doi]
- Approximate Solutions for Attack Graph Games with Imperfect InformationKarel Durkota, Viliam Lisý, Branislav Bosanský, Christopher Kiekintveld. 228-249 [doi]
- When the Winning Move is Not to Play: Games of Deterrence in Cyber SecurityChad Heitzenrater, Greg Taylor, Andrew Simpson. 250-269 [doi]
- Sequentially Composable Rational ProofsMatteo Campanelli, Rosario Gennaro. 270-288 [doi]
- Flip the Cloud: Cyber-Physical Signaling Games in the Presence of Advanced Persistent ThreatsJeffrey Pawlick, Sadegh Farhang, Quanyan Zhu. 289-308 [doi]
- Genetic Approximations for the Failure-Free Security GamesAleksandr Lenin, Jan Willemson, Anton Charnamord. 311-321 [doi]
- To Trust or Not: A Security Signaling Game Between Service Provider and ClientMonireh Mohebbi Moghaddam, Mohammad Hossein Manshaei, Quanyan Zhu. 322-333 [doi]
- Game Theory and Security: Recent History and Future DirectionsJonathan S. A. Merlevede, Tom Holvoet. 334-345 [doi]
- Uncertainty in Games: Using Probability-Distributions as PayoffsStefan Rass, Sandra König, Stefan Schauer. 346-357 [doi]
- Incentive Schemes for Privacy-Sensitive ConsumersChong Huang, Lalitha Sankar, Anand D. Sarwate. 358-369 [doi]