Abstract is missing.
- Defending Against Opportunistic Criminals: New Game-Theoretic Frameworks and AlgorithmsChao Zhang, Albert Xin Jiang, Martin B. Short, P. Jeffrey Brantingham, Milind Tambe. 3-22 [doi]
- Addressing Scalability and Robustness in Security Games with Multiple Boundedly Rational AdversariesMatthew Brown, William B. Haskell, Milind Tambe. 23-42 [doi]
- Empirical Game-Theoretic Analysis of an Adaptive Cyber-Defense Scenario (Preliminary Report)Michael P. Wellman, Achintya Prakash. 43-58 [doi]
- Strategic Discovery and Sharing of Vulnerabilities in Competitive EnvironmentsM. H. R. Khouzani, Viet Pham, Carlos Cid. 59-78 [doi]
- Optimal Contracts for Outsourced ComputationViet Pham, M. H. R. Khouzani, Carlos Cid. 79-98 [doi]
- A Supervisory Control Approach to Dynamic Cyber-SecurityMohammad Rasouli, Erik Miehling, Demosthenis Teneketzis. 99-117 [doi]
- Numerical Computation of Multi-goal Security StrategiesStefan Rass, Benjamin Rainer. 118-133 [doi]
- Realizable Rational Multiparty Cryptographic ProtocolsJohn Ross Wallrabenstein, Chris Clifton. 134-154 [doi]
- Limiting Adversarial Budget in Quantitative Security AssessmentAleksandr Lenin, Ahto Buldas. 155-174 [doi]
- FlipThem: Modeling Targeted Attacks with FlipIt for Multiple ResourcesAron Laszka, Gabor Horvath, Márk Félegyházi, Levente Buttyán. 175-194 [doi]
- Secure Message Delivery Games for Device-to-Device CommunicationsEmmanouil Panaousis, Tansu Alpcan, Hossein Fereidooni, Mauro Conti. 195-215 [doi]
- A Three-Stage Colonel Blotto Game: When to Provide More Information to an AdversaryAbhishek Gupta, Tamer Basar, Galina A. Schwartz. 216-233 [doi]
- Toward Optimal Network Topology Design for Fast and Secure Distributed ComputationJi Liu, Tamer Basar. 234-245 [doi]
- An Economic Model and Simulation Results of App Adoption Decisions on Networks with Interdependent Privacy ConsequencesYu Pu, Jens Grossklags. 246-265 [doi]
- Cybersecurity Games and Investments: A Decision Support ApproachEmmanouil Panaousis, Andrew Fielder, Pasquale Malacaria, Chris Hankin, Fabrizio Smeraldi. 266-286 [doi]
- Data Integrity and Availability Verification Game in Untrusted Cloud StorageBrahim Djebaili, Christophe Kiennert, Jean Leneutre, Lin Chen. 287-306 [doi]
- Empirical Comparisons of Descriptive Multi-objective Adversary Models in Stackelberg Security GamesJinshu Cui, Richard S. John. 309-318 [doi]
- A Dynamic Bayesian Security Game Framework for Strategic Defense Mechanism DesignSadegh Farhang, Mohammad Hossein Manshaei, Milad Nasr Esfahani, Quanyan Zhu. 319-328 [doi]
- Can Less Be More? A Game-Theoretic Analysis of Filtering vs. InvestmentArmin Sarabi, Parinaz Naghizadeh, Mingyan Liu. 329-339 [doi]
- Online Learning Methods for Border Patrol Resource AllocationRichard Klíma, Christopher Kiekintveld, Viliam Lisý. 340-349 [doi]
- A Distributed Optimization Algorithm for Attack-Resilient Wide-Area Monitoring of Power Systems: Theoretical and Experimental MethodsJianhua Zhang, Prateek Jaipuria, Aranya Chakrabortty, Alefiya Hussain. 350-359 [doi]
- Testing for Hardware Trojans: A Game-Theoretic ApproachCharles A. Kamhoua, Manuel Rodriguez, Kevin A. Kwiat. 360-369 [doi]
- Surveillance for Security as a Pursuit-Evasion GameSourabh Bhattacharya, Tamer Basar, Maurizio Falcone. 370-379 [doi]