Abstract is missing.
- Game Theoretic Approaches to Attack Surface ShiftingPratyusa K. Manadhata. 1-13 [doi]
- Security Games Applied to Real-World: Research Contributions and ChallengesManish Jain, Bo An, Milind Tambe. 15-39 [doi]
- Adversarial Dynamics: The Conficker Case StudyDaniel Bilar, George Cybenko, John P. Murphy. 41-71 [doi]
- From Individual Decisions from Experience to Behavioral Game Theory: Lessons for CybersecurityCleotilde Gonzalez. 73-86 [doi]
- Cyber Maneuver Against External Adversaries and Compromised NodesDon Torrieri, Sencun Zhu, Sushil Jajodia. 87-96 [doi]
- Applying Self-Shielding Dynamics to the Network ArchitectureJustin Yackoski, Harry Bullen, Xiang Yu, Jason Li. 97-115 [doi]
- Moving Target Defenses in the Helix Self-Regenerative ArchitectureClaire Le Goues, Anh Nguyen-Tuong, Hao Chen, Jack W. Davidson, Stephanie Forrest, Jason Hiser, John C. Knight, Matthew Van Gundy. 117-149 [doi]
- Diversifying the Software Stack Using Randomized NOP InsertionTodd Jackson, Andrei Homescu, Stephen Crane, Per Larsen, Stefan Brunthaler, Michael Franz. 151-173 [doi]
- Practical Software Diversification Using In-Place Code RandomizationVasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis. 175-202 [doi]