Abstract is missing.
- On Communication over Gaussian Sensor Networks with Adversaries: Further ResultsEmrah Akyol, Kenneth Rose, Tamer Basar. 1-9 [doi]
- A True Random Generator Using Human GameplayMohsen Alimomeni, Reihaneh Safavi-Naini, Setareh Sharifian. 10-28 [doi]
- A Game Theoretic Analysis of Collaboration in WikipediaS. Anand, Ofer Arazy, Narayan B. Mandayam, Oded Nov. 29-44 [doi]
- Controllability of Dynamical Systems: Threat Models and Reactive SecurityCarlos Barreto, Alvaro A. Cárdenas, Nicanor Quijano. 45-64 [doi]
- Adaptive Regret Minimization in Bounded-Memory GamesJeremiah Blocki, Nicolas Christin, Anupam Datta, Arunesh Sinha. 65-84 [doi]
- The Cooperative Ballistic Missile Defence GameLanah Evers, Ana Isabel Barros, Herman Monsuur. 85-98 [doi]
- Security Games for Virtual Machine Allocation in Cloud ComputingYi Han, Tansu Alpcan, Jeffrey Chan, Christopher Leckie. 99-118 [doi]
- Monotonic Maximin: A Robust Stackelberg Solution against Boundedly Rational FollowersAlbert Xin Jiang, Thanh Hong Nguyen, Milind Tambe, Ariel D. Procaccia. 119-139 [doi]
- Defeating Tyranny of the Masses in Crowdsourcing: Accounting for Low-Skilled and Adversarial WorkersAditya Kurve, David J. Miller 0001, George Kesidis. 140-153 [doi]
- Quantifying Network Topology Robustness under Budget Constraints: General Model and Computational ComplexityAron Laszka, Assane Gueye. 154-174 [doi]
- Mitigation of Targeted and Non-targeted Covert Attacks as a Timing GameAron Laszka, Benjamin Johnson, Jens Grossklags. 175-191 [doi]
- New Efficient Utility Upper Bounds for the Fully Adaptive Model of Attack TreesAhto Buldas, Aleksandr Lenin. 192-205 [doi]
- Optimizing Active Cyber DefenseWenlian Lu, Shouhuai Xu, Xinlei Yi. 206-225 [doi]
- Equilibrium Concepts for Rational Multiparty ComputationJohn Ross Wallrabenstein, Chris Clifton. 226-245 [doi]
- Game-Theoretic Approach to Feedback-Driven Multi-stage Moving Target DefenseQuanyan Zhu, Tamer Basar. 246-263 [doi]