researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
2025
Filter by Tag
OR
AND
NOT
1
C++
Meta-Environment
control systems
design
meta-model
meta-objects
mobile
security
systematic-approach
testing
wireless sensor networks
Filter by Author
[+]
OR
AND
NOT
1
Ahmed H. Anwar
Andrew Clark
Aron Laszka
Arunesh Sinha
Branislav Bosanský
Charles A. Kamhoua
Christopher Kiekintveld
Fei Fang
Jens Grossklags
Mark Bilinski
Milind Tambe
Mohammad Hossein Manshaei
Murat Kantarcioglu
Quanyan Zhu
Radha Poovendran
Stefan Rass
Tamer Basar
Tansu Alpcan
Thanh Hong Nguyen
Yevgeniy Vorobeychik
Filter by Top terms
[+]
OR
AND
NOT
1
adversarial
approach
attacks
cyber
deception
decision
defense
game
games
information
learning
model
multi
network
networks
optimal
security
theoretic
theory
using
GameSec (GameSec)
Editions
Publications
Viewing Publication 1 - 100 from 353
2025
Decision and Game Theory for Security - 15th International Conference, GameSec 2024, New York City, NY, USA, October 16-18, 2024, Proceedings
Arunesh Sinha
,
Jie Fu 0002
,
Quanyan Zhu
,
Tao Zhang 0011
, editors,
Volume 14908 of
Lecture Notes in Computer Science
, Springer,
2025.
[doi]
2024
FlipDyn in Graphs: Resource Takeover Games in Graphs
Sandeep Banik
,
Shaunak D. Bopardikar
,
Naira Hovakimyan
.
GameSec 2025
:
220-239
[doi]
Contested Logistics: A Game-Theoretic Approach
Jakub Cerný
,
Chun Kai Ling
,
Darshan Chakrabarti
,
Jingwen Zhang
,
Gabriele Farina
,
Christian Kroer
,
Garud Iyengar
.
GameSec 2025
:
124-146
[doi]
Extended Horizons: Multi-hop Awareness in Network Games
Raman Ebrahimi
,
Parinaz Naghizadeh
.
GameSec 2025
:
201-219
[doi]
Effective Anonymous Messaging: The Role of Altruism
Marcell Frank
,
Balázs Pejó
,
Gergely Biczók
.
GameSec 2025
:
240-259
[doi]
The Price of Pessimism for Automated Defense
Erick Galinkin
,
Emmanouil Pountourakis
,
Spiros Mancoridis
.
GameSec 2025
:
45-64
[doi]
Fast Complete Algorithm for Multiplayer Nash Equilibrium
Sam Ganzfried
.
GameSec 2025
:
109-123
[doi]
MEGA-PT: A Meta-game Framework for Agile Penetration Testing
Yunfei Ge
,
Quanyan Zhu
.
GameSec 2025
:
24-44
[doi]
Intrusion Tolerance as a Two-Level Game
Kim Hammar
,
Rolf Stadler
.
GameSec 2025
:
3-23
[doi]
Towards a Game-Theoretic Understanding of Explanation-Based Membership Inference Attacks
Kavita Kumari
,
Murtuza Jadliwala
,
Sumit Kumar Jha 0001
,
Anindya Maiti
.
GameSec 2025
:
263-283
[doi]
How Much Should I Double Spend My Bitcoin? Game Theory of Quantum Mining
Zhen Li
,
Qi Liao
.
GameSec 2025
:
87-106
[doi]
On Countering Ransomware Attacks Using Strategic Deception
Roshan Lal Neupane
,
Bishnu Bhusal
,
Kiran Neupane
,
Preyea Regmi
,
Tam Dinh
,
Lilliana Marrero
,
Sayed M. Saghaian N. E.
,
Venkata Sriram Siddhardh Nadendla
,
Prasad Calyam
.
GameSec 2025
:
149-176
[doi]
Multimodal Anomaly Detection for Autonomous Cyber-Physical Systems Empowering Real-World Evaluation
Mahshid Noorani
,
Tharun V. Puthanveettil
,
Asim Zoulkarni
,
Jack Mirenzi
,
Charles D. Grody
,
John S. Baras
.
GameSec 2025
:
306-325
[doi]
Ransom Roulette: Learning the Games Behind Cyber Extortion
Eckhard Pflügel
,
Stefan Rass
.
GameSec 2025
:
67-86
[doi]
A Decentralized Shotgun Approach for Team Deception
Caleb Probine
,
Mustafa O. Karabag
,
Ufuk Topcu
.
GameSec 2025
:
177-197
[doi]
Defending Against APT Attacks in Robots: A Multi-phase Game-Theoretical Approach
Asim Zoulkarni
,
Sai Sandeep Damera
,
M. S. Praveen Kumar
,
John S. Baras
.
GameSec 2025
:
287-305
[doi]
2023
Decision and Game Theory for Security: 14th International Conference, GameSec 2023, Avignon, France, October 18-20, 2023, Proceedings
Jie Fu 0002
,
Tomás Kroupa
,
Yezekael Hayel
, editors,
Volume 14167 of
Lecture Notes in Computer Science
, Springe,
2023.
[doi]
Quantisation Effects in Adversarial Cyber-Physical Games
Takuma Adams
,
Andrew C. Cullen
,
Tansu Alpcan
.
GameSec 2023
:
153-171
[doi]
The Credential is Not Enough: Deception with Honeypots and Fake Credentials
Sonia Cromp
,
Mark Bilinski
,
Ryan Gabrys
,
Frederic Sala
.
GameSec 2023
:
234-254
[doi]
Decision and Game Theory for Security - 13th International Conference, GameSec 2022, Pittsburgh, PA, USA, October 26-28, 2022, Proceedings
Fei Fang
,
Haifeng Xu
,
Yezekael Hayel
, editors,
Volume 13727 of
Lecture Notes in Computer Science
, Springer,
2023.
[doi]
Observable Perfect Equilibrium
Sam Ganzfried
.
GameSec 2023
:
3-22
[doi]
Scalable Learning of Intrusion Response Through Recursive Decomposition
Kim Hammar
,
Rolf Stadler
.
GameSec 2023
:
172-192
[doi]
Modeling and Analysis of a Nonlinear Security Game with Mixed Armament
Jean Le Hénaff
,
Hélène Le Cadre
.
GameSec 2023
:
369-388
[doi]
Characterizing and Improving the Robustness of Predict-Then-Optimize Frameworks
Sonja Johnson-Yu
,
Jessie Finocchiaro
,
Kai Wang 0040
,
Yevgeniy Vorobeychik
,
Arunesh Sinha
,
Aparna Taneja
,
Milind Tambe
.
GameSec 2023
:
133-152
[doi]
Asymmetric Centrality Game Against Network Epidemic Propagation
Willie Kouam
,
Yezekael Hayel
,
Gabriel Deugoue
,
Olivier Tsemogne
,
Charles A. Kamhoua
.
GameSec 2023
:
86-109
[doi]
Does Cyber-Insurance Benefit the Insured or the Attacker? - A Game of Cyber-Insurance
Zhen Li
,
Qi Liao
.
GameSec 2023
:
23-42
[doi]
Optimal Resource Allocation for Proactive Defense with Deception in Probabilistic Attack Graphs
Haoxiang Ma
,
Shuo Han 0002
,
Charles A. Kamhoua
,
Jie Fu 0002
.
GameSec 2023
:
215-233
[doi]
Playing Repeated Coopetitive Polymatrix Games with Small Manipulation Cost
Shivakumar Mahesh
,
Nicholas Bishop
,
Le Cong Dinh
,
Long Tran-Thanh
.
GameSec 2023
:
257-276
[doi]
Double-Sided Information Asymmetry in Double Extortion Ransomware
Tom Meurs
,
Edward J. Cartwright
,
Anna Cartwright 0001
.
GameSec 2023
:
311-328
[doi]
FlipPath Game to Counter Stealthy Attacks in SDN-Based Tactical Networks
Fabrice Mvah
,
Vianney Kengne Tchendji
,
Clémentin Tayou Djamégni
,
Ahmed H. Anwar
,
Deepak K. Tosh
,
Charles A. Kamhoua
.
GameSec 2023
:
294-308
[doi]
Shades of Grey: Strategic Bimatrix Stopping Games for Modelling (Un)Ethical Hacking Roles
Eckhard Pflügel
.
GameSec 2023
:
110-129
[doi]
Honeypot Allocation for Cyber Deception in Dynamic Tactical Networks: A Game Theoretic Approach
Md. Abu Sayed
,
Ahmed H. Anwar
,
Christopher Kiekintveld
,
Charles A. Kamhoua
.
GameSec 2023
:
195-214
[doi]
Multi-defender Security Games with Schedules
Zimeng Song
,
Chun Kai Ling
,
Fei Fang 0001
.
GameSec 2023
:
65-85
[doi]
Rule Enforcing Through Ordering
David Sychrovsky
,
Sameer Desai
,
Martin Loebl
.
GameSec 2023
:
43-62
[doi]
Opacity-Enforcing Active Perception and Control Against Eavesdropping Attacks
Sumukha Udupa
,
Hazhar Rahmani
,
Jie Fu 0002
.
GameSec 2023
:
329-348
[doi]
Rational Broadcast Protocols Against Timid Adversaries
Keigo Yamashita
,
Kenji Yasunaga
.
GameSec 2023
:
277-293
[doi]
A Game-Theoretic Analysis of Auditing Differentially Private Algorithms with Epistemically Disparate Herd
Ya-Ting Yang
,
Tao Zhang 0011
,
Quanyan Zhu
.
GameSec 2023
:
349-368
[doi]
2022
Optimal Pursuit of Surveilling Agents Near a High Value Target
Shivam Bajaj
,
Shaunak D. Bopardikar
.
GameSec 2023
:
168-187
[doi]
Using Deception in Markov Game to Understand Adversarial Behaviors Through a Capture-The-Flag Environment
Siddhant Bhambri
,
Purv Chauhan
,
Frederico Araujo
,
Adam Doupé
,
Subbarao Kambhampati
.
GameSec 2023
:
87-106
[doi]
Voting Games to Model Protocol Stability and Security of Proof-of-Work Cryptocurrencies
Sanjay Bhattacherjee
,
Palash Sarkar 0001
.
GameSec 2023
:
297-318
[doi]
On Almost-Sure Intention Deception Planning that Exploits Imperfect Observers
Jie Fu
.
GameSec 2023
:
67-86
[doi]
Casino Rationale: Countering Attacker Deception in Zero-Sum Stackelberg Security Games of Bounded Rationality
Ryan Gabrys
,
Mark Bilinski
,
Justin Mauger
,
Daniel Silva 0012
,
Sunny Fugate
.
GameSec 2023
:
23-43
[doi]
An Exploration of Poisoning Attacks on Data-Based Decision Making
Sarah Eve Kinsey
,
Wong Wai Tuck
,
Arunesh Sinha
,
Thanh Hong Nguyen
.
GameSec 2023
:
231-252
[doi]
Multiple Oracle Algorithm to Solve Continuous Games
Tomás Kroupa
,
Tomás Votroubek
.
GameSec 2023
:
149-167
[doi]
Robust Moving Target Defense Against Unknown Attacks: A Meta-reinforcement Learning Approach
Henger Li
,
Zizhan Zheng
.
GameSec 2023
:
107-126
[doi]
The Risk of Attacker Behavioral Learning: Can Attacker Fool Defender Under Uncertainty?
Thanh Hong Nguyen
,
Amulya Yadav
.
GameSec 2023
:
3-22
[doi]
On Poisoned Wardrop Equilibrium in Congestion Games
Yunian Pan
,
Quanyan Zhu
.
GameSec 2023
:
191-211
[doi]
Synchronization in Security Games
Stefan Rass
,
Sandra König
.
GameSec 2023
:
129-148
[doi]
Reward Delay Attacks on Deep Reinforcement Learning
Anindya Sarkar
,
Jiarui Feng
,
Yevgeniy Vorobeychik
,
Christopher D. Gill
,
Ning Zhang 0017
.
GameSec 2023
:
212-230
[doi]
Cyber Deception Against Zero-Day Attacks: A Game Theoretic Approach
Md. Abu Sayed
,
Ahmed H. Anwar
,
Christopher Kiekintveld
,
Branislav Bosanský
,
Charles A. Kamhoua
.
GameSec 2023
:
44-63
[doi]
A Network Centrality Game for Epidemic Control
Olivier Tsemogne
,
Willie Kouam
,
Ahmed H. Anwar
,
Yezekael Hayel
,
Charles A. Kamhoua
,
Gabriel Deugoue
.
GameSec 2023
:
255-273
[doi]
Optimizing Intrusion Detection Systems Placement Against Network Virus Spreading Using a Partially Observable Stochastic Minimum-Threat Path Game
Olivier Tsemogne
,
Yezekael Hayel
,
Charles A. Kamhoua
,
Gabriel Deugoue
.
GameSec 2023
:
274-296
[doi]
2021
Password Strength Signaling: A Counter-Intuitive Defense Against Password Cracking
Wenjie Bai
,
Jeremiah Blocki
,
Benjamin Harsha
.
GameSec 2021
:
334-353
[doi]
No Time to Lie: Bounds on the Learning Rate of a Defender for Inferring Attacker Target Preferences
Mark Bilinski
,
Joseph DiVita
,
Kimberly Ferguson-Walter
,
Sunny Fugate
,
Ryan Gabrys
,
Justin Mauger
,
Brian Souza
.
GameSec 2021
:
138-157
[doi]
Decision and Game Theory for Security - 12th International Conference, GameSec 2021, Virtual Event, October 25-27, 2021, Proceedings
Branislav Bosanský
,
Cleotilde Gonzalez
,
Stefan Rass
,
Arunesh Sinha
, editors,
Volume 13061 of
Lecture Notes in Computer Science
, Springer,
2021.
[doi]
Game Theoretic Hardware Trojan Testing Under Cost Considerations
Swastik Brahma
,
Laurent Njilla
,
Satyaki Nan
.
GameSec 2021
:
251-270
[doi]
Countering Attacker Data Manipulation in Security Games
Andrew R. Butler
,
Thanh H. Nguyen
,
Arunesh Sinha
.
GameSec 2021
:
59-79
[doi]
Paying Firms to Share Cyber Threat Intelligence
Brandon C. Collins
,
Shouhuai Xu
,
Philip N. Brown
.
GameSec 2021
:
365-377
[doi]
Winning the Ransomware Lottery - A Game-Theoretic Approach to Preventing Ransomware Attacks
Erick Galinkin
.
GameSec 2021
:
195-207
[doi]
Evaluating Attacker Risk Behavior in an Internet of Things Ecosystem
Erick Galinkin
,
John Carter
,
Spiros Mancoridis
.
GameSec 2021
:
354-364
[doi]
Computing Nash Equilibria in Multiplayer DAG-Structured Stochastic Games with Persistent Imperfect Information
Sam Ganzfried
.
GameSec 2021
:
3-16
[doi]
Combating Informational Denial-of-Service (IDoS) Attacks: Modeling and Mitigation of Attentional Human Vulnerability
Linan Huang
,
Quanyan Zhu
.
GameSec 2021
:
314-333
[doi]
Network Games with Strategic Machine Learning
Kun Jin
,
Tongxin Yin
,
Charles A. Kamhoua
,
Mingyan Liu
.
GameSec 2021
:
118-137
[doi]
Separable Network Games with Compact Strategy Sets
Tomás Kroupa
,
Sara Vannucci
,
Tomás Votroubek
.
GameSec 2021
:
37-56
[doi]
Bet and Attack: Incentive Compatible Collaborative Attacks Using Smart Contracts
Zahra Motaqy
,
Ghada Almashaqbeh
,
Behnam Bahrak
,
Naser Yazdani
.
GameSec 2021
:
293-313
[doi]
A Game-Theoretic Framework for Controlled Islanding in the Presence of Adversaries
Luyao Niu
,
Dinuka Sahabandu
,
Andrew Clark
,
Radha Poovendran
.
GameSec 2021
:
231-250
[doi]
Two Algorithms for Computing Exact and Approximate Nash Equilibria in Bimatrix Games
Jianzong Pi
,
Joseph L. Heyman
,
Abhishek Gupta 0002
.
GameSec 2021
:
17-36
[doi]
Scalable Optimal Classifiers for Adversarial Settings Under Uncertainty
Benjamin Roussillon
,
Patrick Loiseau
.
GameSec 2021
:
80-97
[doi]
Strategic Remote Attestation: Testbed for Internet-of-Things Devices and Stackelberg Security Game for Optimal Strategies
Shanto Roy
,
Salah Uddin Kadir
,
Yevgeniy Vorobeychik
,
Aron Laszka
.
GameSec 2021
:
271-290
[doi]
When Should You Defend Your Classifier? - - A Game-Theoretical Analysis of Countermeasures Against Adversarial Examples
Maximilian Samsinger
,
Florian Merkle
,
Pascal Schöttle
,
Tomás Pevný
.
GameSec 2021
:
158-177
[doi]
A Mechanism Design Approach to Solve Ransomware Dilemmas
Iman Vakilinia
,
Mohammad Mahdi Khalili
,
Ming Li 0006
.
GameSec 2021
:
181-194
[doi]
Learning Generative Deception Strategies in Combinatorial Masking Games
Junlin Wu
,
Charles A. Kamhoua
,
Murat Kantarcioglu
,
Yevgeniy Vorobeychik
.
GameSec 2021
:
98-117
[doi]
Combating Ransomware in Internet of Things: A Games-in-Games Approach for Cross-Layer Cyber Defense and Security Investment
Yuhan Zhao
,
Yunfei Ge
,
Quanyan Zhu
.
GameSec 2021
:
208-228
[doi]
2020
A Game Theoretic Framework for Software Diversity for Network Security
Ahmed H. Anwar
,
Nandi O. Leslie
,
Charles A. Kamhoua
,
Christopher Kiekintveld
.
GameSec 2020
:
297-311
[doi]
Game Theory on Attack Graph for Cyber Deception
Ahmed H. Anwar
,
Charles A. Kamhoua
.
GameSec 2020
:
445-456
[doi]
Lie Another Day: Demonstrating Bias in a Multi-round Cyber Deception Game of Questionable Veracity
Mark Bilinski
,
Joe diVita
,
Kimberly Ferguson-Walter
,
Sunny Fugate
,
Ryan Gabrys
,
Justin Mauger
,
Brian Souza
.
GameSec 2020
:
80-100
[doi]
Security Games with Insider Threats
Derya Cansever
.
GameSec 2020
:
502-505
[doi]
Adversarial Deep Reinforcement Learning Based Adaptive Moving Target Defense
Taha Eghtesad
,
Yevgeniy Vorobeychik
,
Aron Laszka
.
GameSec 2020
:
58-79
[doi]
On the Characterization of Saddle Point Equilibrium for Security Games with Additive Utility
Hamid Emadi
,
Sourabh Bhattacharya
.
GameSec 2020
:
349-364
[doi]
A Realistic Approach for Network Traffic Obfuscation Using Adversarial Machine Learning
Alonso Granados
,
Mohammad Sujan Miah
,
Anthony Ortiz
,
Christopher Kiekintveld
.
GameSec 2020
:
45-57
[doi]
Farsighted Risk Mitigation of Lateral Movement Using Dynamic Cognitive Honeypots
Linan Huang
,
Quanyan Zhu
.
GameSec 2020
:
125-146
[doi]
Blocking Adversarial Influence in Social Networks
Feiran Jia
,
Kai Zhou
,
Charles A. Kamhoua
,
Yevgeniy Vorobeychik
.
GameSec 2020
:
257-276
[doi]
Distributed Generative Adversarial Networks for Anomaly Detection
Marc Katzef
,
Andrew C. Cullen
,
Tansu Alpcan
,
Christopher Leckie
,
Justin Kopacz
.
GameSec 2020
:
3-22
[doi]
Decoy Allocation Games on Graphs with Temporal Logic Objectives
Abhishek Ninad Kulkarni
,
Jie Fu
,
Huan Luo
,
Charles A. Kamhoua
,
Nandi O. Leslie
.
GameSec 2020
:
168-187
[doi]
Normalizing Flow Policies for Multi-agent Systems
Xiaobai Ma
,
Jayesh K. Gupta
,
Mykel J. Kochenderfer
.
GameSec 2020
:
277-296
[doi]
Detection of Dynamically Changing Leaders in Complex Swarms from Observed Dynamic Data
Christos N. Mavridis
,
Nilesh Suriyarachchi
,
John S. Baras
.
GameSec 2020
:
223-240
[doi]
Harnessing the Power of Deception in Attack Graph-Based Security Games
Stephanie Milani
,
Weiran Shen
,
Kevin S. Chan
,
Sridhar Venkatesan
,
Nandi O. Leslie
,
Charles A. Kamhoua
,
Fei Fang
.
GameSec 2020
:
147-167
[doi]
MASAGE: Model-Agnostic Sequential and Adaptive Game Estimation
Yunian Pan
,
Guanze Peng
,
Juntao Chen
,
Quanyan Zhu
.
GameSec 2020
:
365-384
[doi]
A Data-Driven Distributionally Robust Game Using Wasserstein Distance
Guanze Peng
,
Tao Zhang 0011
,
Quanyan Zhu
.
GameSec 2020
:
405-421
[doi]
Hardware Security and Trust: A New Battlefield of Information
Gang Qu
.
GameSec 2020
:
486-501
[doi]
Security Games over Lexicographic Orders
Stefan Rass
,
Angelika Wiegele
,
Sandra König
.
GameSec 2020
:
422-441
[doi]
Popular Imperceptibility Measures in Visual Adversarial Attacks are Far from Human Perception
Ayon Sen
,
Xiaojin Zhu 0001
,
Erin Marshall
,
Robert D. Nowak
.
GameSec 2020
:
188-199
[doi]
Moving Target Defense for Robust Monitoring of Electric Grid Transformers in Adversarial Environments
Sailik Sengupta
,
Kaustav Basu
,
Arunabha Sen
,
Subbarao Kambhampati
.
GameSec 2020
:
241-253
[doi]
Learning and Planning in the Feature Deception Problem
Zheyuan Ryan Shi
,
Ariel D. Procaccia
,
Kevin S. Chan
,
Sridhar Venkatesan
,
Noam Ben-Asher
,
Nandi O. Leslie
,
Charles A. Kamhoua
,
Fei Fang
.
GameSec 2020
:
23-44
[doi]
Securing Next-Generation Wireless Networks: Challenges and Opportunities (Extended Abstract)
Alex Sprintson
.
GameSec 2020
:
506-510
[doi]
Using One-Sided Partially Observable Stochastic Games for Solving Zero-Sum Security Games with Sequential Attacks
Petr Tomásek
,
Branislav Bosanský
,
Thanh Hong Nguyen
.
GameSec 2020
:
385-404
[doi]
Partially Observable Stochastic Games for Cyber Deception Against Network Epidemic
Olivier Tsemogne
,
Yezekael Hayel
,
Charles A. Kamhoua
,
Gabriel Deugoue
.
GameSec 2020
:
312-325
[doi]
Secure Discrete-Time Linear-Quadratic Mean-Field Games
Muhammad Aneeq uz Zaman
,
Sujay Bhatt
,
Tamer Basar
.
GameSec 2020
:
203-222
[doi]
Combating Online Counterfeits: A Game-Theoretic Analysis of Cyber Supply Chain Ecosystem
Yuhan Zhao
,
Quanyan Zhu
.
GameSec 2020
:
326-345
[doi]
Decision and Game Theory for Security - 11th International Conference, GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings
Quanyan Zhu
,
John S. Baras
,
Radha Poovendran
,
Juntao Chen
, editors,
Volume 12513 of
Lecture Notes in Computer Science
, Springer,
2020.
[doi]
Sign in
or
sign up
to see more results.