Abstract is missing.
- Optimizing Traffic Enforcement: From the Lab to the RoadsAriel Rosenfeld, Oleg Maksimov, Sarit Kraus. 3-20 [doi]
- Incentive Compatibility of Pay Per Last N Shares in Bitcoin Mining PoolsYevhen Zolotavkin, Julián García, Carsten Rudolph. 21-39 [doi]
- Adaptivity in Network InterdictionBastián Bahamondes, José R. Correa, Jannik Matuschke, Gianpaolo Oriolo. 40-52 [doi]
- Efficient Rational Proofs for Space Bounded ComputationsMatteo Campanelli, Rosario Gennaro. 53-73 [doi]
- Game-Theoretical Analysis of PLC System Performance in the Presence of Jamming AttacksYun Ai, Manav R. Bhatnagar, Michael Cheffena, Aashish Mathur, Artem Sedakov. 74-90 [doi]
- Secure Sensor Design for Cyber-Physical Systems Against Advanced Persistent ThreatsMuhammed O. Sayin, Tamer Basar. 91-111 [doi]
- An Ultimatum Game Model for the Evolution of Privacy in Jointly Managed ContentSarah Michele Rajtmajer, Anna Cinzia Squicciarini, Jose M. Such, Justin Semonsen, Andrew Belmonte. 112-130 [doi]
- The U.S. Vulnerabilities Equities Process: An Economic PerspectiveTristan Caulfield, Christos Ioannidis, David J. Pym. 131-150 [doi]
- A Stackelberg Game Model for Botnet Data ExfiltrationThanh Nguyen, Michael P. Wellman, Satinder P. Singh. 151-170 [doi]
- Optimal Strategies for Detecting Data Exfiltration by Internal and External AttackersKarel Durkota, Viliam Lisý, Christopher Kiekintveld, Karel Horák, Branislav Bosanský, Tomás Pevný. 171-192 [doi]
- Building Real Stackelberg Security Games for Border PatrolsVictor Bucarey, Carlos Casorrán, Óscar Figueroa, Karla Rosas, Hugo F. Navarrete, Fernando Ordóñez. 193-212 [doi]
- Strategic Defense Against Deceptive Civilian GPS Spoofing of Unmanned Aerial VehiclesTao Zhang 0011, Quanyan Zhu. 213-233 [doi]
- A Game Theoretical Model for Optimal Distribution of Network Security ResourcesZiad Ismail, Christophe Kiennert, Jean Leneutre, Lin Chen 0002. 234-255 [doi]
- Game-Theoretic Goal Recognition Models with Applications to Security DomainsSamuel Ang, Hau Chan, Albert Xin Jiang, William Yeoh 0001. 256-272 [doi]
- Manipulating Adversary's Belief: A Dynamic Game Approach to Deception by Design for Proactive Network SecurityKarel Horák, Quanyan Zhu, Branislav Bosanský. 273-294 [doi]
- A Stochastic Game-Theoretic Model for Smart Grid Communication NetworksXiaobing He, Hermann de Meer. 295-314 [doi]
- A Stackelberg Game and Markov Modeling of Moving Target DefenseXiaotao Feng, Zizhan Zheng, Prasant Mohapatra, Derya Cansever. 315-335 [doi]
- Proactive Defense Against Physical Denial of Service Attacks Using Poisson Signaling GamesJeffrey Pawlick, Quanyan Zhu. 336-356 [doi]
- A Large-Scale Markov Game Approach to Dynamic Protection of Interdependent Infrastructure NetworksLinan Huang, Juntao Chen, Quanyan Zhu. 357-376 [doi]
- VIOLA: Video Labeling Application for Security DomainsElizabeth Bondi, Fei Fang, Debarun Kar, Venil Loyd Noronha, Donnabell Dmello, Milind Tambe, Arvind Iyer, Robert Hannaford. 377-396 [doi]
- On the Economics of RansomwareAron Laszka, Sadegh Farhang, Jens Grossklags. 397-417 [doi]
- Deterrence of Cyber Attackers in a Three-Player Behavioral GameJinshu Cui, Heather Rosoff, Richard S. John. 418-436 [doi]
- Information Leakage GamesMário S. Alvim, Konstantinos Chatzikokolakis 0001, Yusuke Kawamoto 0001, Catuscia Palamidessi. 437-457 [doi]
- Optimal Patrol Planning for Green Security Games with Black-Box AttackersHaifeng Xu, Benjamin J. Ford, Fei Fang, Bistra Dilkina, Andrew J. Plumptre, Milind Tambe, Margaret Driciru, Fred Wanyama, Aggrey Rwetsiba, Mustapha Nsubaga, Joshua Mabonga. 458-477 [doi]
- Security Games with Probabilistic Constraints on the Agent's StrategyCorine M. Laan, Ana Isabel Barros, Richard J. Boucherie, Herman Monsuur. 481-493 [doi]
- On the Cost of Game Playing: How to Control the Expenses in Mixed StrategiesStefan Rass, Sandra König, Stefan Schauer. 494-505 [doi]
- Dynamics of Strategic Protection Against Virus Propagation in Heterogeneous Complex NetworksYezekael Hayel, Quanyan Zhu. 506-518 [doi]
- Three Layer Game Theoretic Decision Framework for Cyber-Investment and Cyber-InsuranceDeepak K. Tosh, Iman Vakilinia, Sachin Shetty, Shamik Sengupta, Charles A. Kamhoua, Laurent Njilla, Kevin A. Kwiat. 519-532 [doi]