Abstract is missing.
- Resilience of Routing in Parallel Link NetworksEitan Altman, Aniruddha Singhal, Corinne Touati, Jie Li. 3-17 [doi]
- Deception-Based Game Theoretical Approach to Mitigate DoS AttacksHayreddin Çeker, Jun Zhuang, Shambhu Upadhyaya, Quang Duy La, Boon-Hee Soong. 18-38 [doi]
- Data Exfiltration Detection and Prevention: Virtually Distributed POMDPs for Practically Safer NetworksSara Marie McCarthy, Arunesh Sinha, Milind Tambe, Pratyusa Manadhata. 39-61 [doi]
- On the Mitigation of Interference Imposed by Intruders in Passive RFID NetworksEirini-Eleni Tsiropoulou, John S. Baras, Symeon Papavassiliou, Gang Qu. 62-80 [doi]
- Risk Averse Stackelberg Security Games with Quantal ResponseRenaud Chicoisne, Fernando Ordóñez. 83-100 [doi]
- Optimal and Game-Theoretic Deployment of Security Investments in Interdependent AssetsAshish R. Hota, Abraham A. Clements, Shreyas Sundaram, Saurabh Bagchi. 101-113 [doi]
- Dynamics on Linear Influence Network Games Under Stochastic EnvironmentsZhengyuan Zhou, Nicholas Bambos, Peter W. Glynn. 114-126 [doi]
- Patrolling a PipelineSteve Alpern, Thomas Lidbetter, Alec Morton, Katerina Papadaki 0001. 129-138 [doi]
- Optimal Allocation of Police Patrol Resources Using a Continuous-Time Crime ModelAyan Mukhopadhyay, Chao Zhang, Yevgeniy Vorobeychik, Milind Tambe, Kenneth Pence, Paul Speer. 139-158 [doi]
- A Methodology to Apply a Game Theoretic Model of Security Risks Interdependencies Between ICT and Electric InfrastructuresZiad Ismail, Jean Leneutre, David Bateman, Lin Chen 0002. 159-171 [doi]
- On the Adoption of Privacy-enhancing TechnologiesTristan Caulfield, Christos Ioannidis, David J. Pym. 175-194 [doi]
- FlipLeakage: A Game-Theoretic Approach to Protect Against Stealthy Attackers in the Presence of Information LeakageSadegh Farhang, Jens Grossklags. 195-214 [doi]
- Scalar Quadratic-Gaussian Soft Watermarking GamesM. Kivanç Mihçak, Emrah Akyol, Tamer Basar, Cédric Langbort. 215-234 [doi]
- Strategies for Voter-Initiated Election AuditsChris Culnane, Vanessa Teague. 235-247 [doi]
- Combining Graph Contraction and Strategy Generation for Green Security GamesAnjon Basak, Fei Fang, Thanh Hong Nguyen, Christopher Kiekintveld. 251-271 [doi]
- Divide to Defend: Collusive Security GamesShahrzad Gholami, Bryan Wilder, Matthew Brown, Dana Thomas, Nicole Sintov, Milind Tambe. 272-293 [doi]
- A Game-Theoretic Approach to Respond to Attacker Lateral MovementMohammad A. Noureddine, Ahmed Fawaz, William H. Sanders, Tamer Basar. 294-313 [doi]
- GADAPT: A Sequential Game-Theoretic Framework for Designing Defense-in-Depth Strategies Against Advanced Persistent ThreatsStefan Rass, Quanyan Zhu. 314-326 [doi]
- Optimal Contract Design Under Asymmetric Information for Cloud-Enabled Internet of Controlled ThingsJuntao Chen, Quanyan Zhu. 329-348 [doi]
- Becoming Cybercriminals: Incentives in Networks with Interdependent Security - Incentives in Networks with Interdependent SecurityAron Laszka, Galina Schwartz. 349-369 [doi]
- A Logic for the Compliance BudgetGabrielle Anderson, Guy McCusker, David J. Pym. 370-381 [doi]
- A Game-Theoretic Analysis of Deception over Social Networks Using Fake AvatarsAmin Mohammadi, Mohammad Hossein Manshaei, Monireh Mohebbi Moghaddam, Quanyan Zhu. 382-394 [doi]
- Network Elicitation in Adversarial EnvironmentMarcin Dziubinski, Piotr Sankowski, Qiang Zhang. 397-414 [doi]
- Optimal Thresholds for Anomaly-Based Intrusion Detection in Dynamical EnvironmentsAmin Ghafouri, Waseem Abbas, Aron Laszka, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos. 415-434 [doi]
- A Point-Based Approximate Algorithm for One-Sided Partially Observable Pursuit-Evasion GamesKarel Horák, Branislav Bosanský. 435-454 [doi]
- Consensus Algorithm with Censored Data for Distributed Detection with Corrupted Measurements: A Game-Theoretic ApproachKassem Kallas, Benedetta Tondi, Riccardo Lazzeretti, Mauro Barni. 455-466 [doi]