Abstract is missing.
- Where to Hide the Bits ?Benjamin Johnson, Pascal Schöttle, Rainer Böhme. 1-17 [doi]
- Socio-Rational Secret Sharing as a New Direction in Rational CryptographyMehrdad Nojoumian, Douglas R. Stinson. 18-37 [doi]
- Audit Mechanisms for Provable Risk Management and Accountable Data GovernanceJeremiah Blocki, Nicolas Christin, Anupam Datta, Arunesh Sinha. 38-59 [doi]
- A Game Theoretical Analysis of Lemonizing Cybercriminal Black MarketsSingRu Celine Hoe, Murat Kantarcioglu, Alain Bensoussan. 60-77 [doi]
- Computing the Nash Equilibria of Intruder Classification GamesLemonia Dritsoula, Patrick Loiseau, John Musacchio. 78-97 [doi]
- Upper Bounds for Adversaries' Utility in Attack TreesAhto Buldas, Roman Stepanenko. 98-117 [doi]
- Using Signaling Games to Model the Multi-step Attack-Defense Scenarios on ConfidentialityJingqiang Lin, Peng Liu 0005, Jiwu Jing. 118-137 [doi]
- Simulation and Game-Theoretic Analysis of an Attacker-Defender GameAlan Nochenson, C. F. Larry Heimann. 138-151 [doi]
- Linear Loss Function for the Network Blocking Game: An Efficient Model for Measuring Network Robustness and Link CriticalityAron Laszka, Dávid Szeszlér, Levente Buttyán. 152-170 [doi]
- Deceptive Routing in Relay NetworksAndrew Clark, Quanyan Zhu, Radha Poovendran, Tamer Basar. 171-185 [doi]
- A Game-Theoretic Framework for Network Security Vulnerability Assessment and MitigationAssane Gueye, Vladimir Marbukh. 186-200 [doi]
- Game Theoretic Model of Strategic Honeypot Selection in Computer NetworksRadek Píbil, Viliam Lisý, Christopher Kiekintveld, Branislav Bosanský, Michal Pechoucek. 201-220 [doi]
- A Cost-Based Mechanism for Evaluating the Effectiveness of Moving Target DefensesM. Patrick Collins. 221-233 [doi]
- Are We Compromised? Modelling Security Assessment GamesViet Pham, Carlos Cid. 234-247 [doi]
- Defending against the Unknown Enemy: Applying FlipIt to System SecurityKevin D. Bowers, Marten van Dijk, Robert Griffin, Ari Juels, Alina Oprea, Ronald L. Rivest, Nikos Triandopoulos. 248-263 [doi]
- Incentives and Security in Electricity Distribution NetworksSaurabh Amin, Galina A. Schwartz, Hamidou Tembine. 264-280 [doi]
- Security Games and Risk Minimization for Automatic Generation Control in Smart GridYee Wei Law, Tansu Alpcan, Marimuthu Palaniswami, Subhrakanti Dey. 281-295 [doi]
- Contractual Agreement Design for Enforcing Honesty in Cloud OutsourcingRobert Nix, Murat Kantarcioglu. 296-308 [doi]