Abstract is missing.
- Beyond Nash Equilibrium: Solution Concepts for the 21st CenturyJoseph Y. Halpern. 1-3 [doi]
- Network Security Games: Combining Game Theory, Behavioral Economics, and Network MeasurementsNicolas Christin. 4-6 [doi]
- Indices of Power in Optimal IDS Default Configuration: Theory and ExamplesQuanyan Zhu, Tamer Basar. 7-21 [doi]
- Exploiting Adversary's Risk Profiles in Imperfect Information Security GamesGabriel Fortunato Stocco, George Cybenko. 22-33 [doi]
- An Anti-jamming Strategy for Channel Access in Cognitive Radio NetworksShabnam Sodagari, T. Charles Clancy. 34-43 [doi]
- Node Capture Games: A Game Theoretic Approach to Modeling and Mitigating Node Capture AttacksTamara Bonaci, Linda Bushnell. 44-55 [doi]
- Multi-variate Quickest Detection of Significant Change ProcessKrzysztof Szajowski. 56-66 [doi]
- Interplay between Security Providers, Consumers, and Attackers: A Weighted Congestion Game ApproachPatrick Maillé, Peter Reichl, Bruno Tuffin. 67-86 [doi]
- Network Games with and without SynchroneityAhmad Termimi Ab Ghani, Kazuyuki Tanaka. 87-103 [doi]
- An Asymptotic Solution of Dresher's Guessing GameRobbert Fokkink, Misha Stassen. 104-116 [doi]
- Security Games with Market InsuranceBenjamin Johnson, Rainer Böhme, Jens Grossklags. 117-130 [doi]
- Aegis A Novel Cyber-Insurance ModelRanjan Pal, Leana Golubchik, Konstantinos Psounis. 131-150 [doi]
- Maximizing Influence in Competitive Environments: A Game-Theoretic ApproachAndrew Clark, Radha Poovendran. 151-162 [doi]
- Collaborative Location Privacy with Rational UsersFrancisco Santos, Mathias Humbert, Reza Shokri, Jean-Pierre Hubaux. 163-181 [doi]
- Digital Trust Games: An Experimental StudyTansu Alpcan, Albert Levi, Erkay Savas. 182-200 [doi]
- Colonel Blotto in the Phishing WarPern Hui Chia, John Chuang. 201-218 [doi]
- Investment in Privacy-Preserving Technologies under UncertaintyMurat Kantarcioglu, Alain Bensoussan, SingRu Celine Hoe. 219-238 [doi]
- Modeling Internet Security Investments: Tackling Topological Information UncertaintyRanjan Pal, Pan Hui. 239-257 [doi]