Abstract is missing.
- Impact of Privacy on Free Online Service MarketsChong Huang, Lalitha Sankar. 1-21 [doi]
- Cyber-Warranties as a Quality Signal for Information Security ProductsDaniel W. Woods, Andrew C. Simpson. 22-37 [doi]
- Game Theoretic Security Framework for Quantum Key DistributionWalter O. Krawec, Fei Miao. 38-58 [doi]
- Training Set CamouflageAyon Sen, Scott Alfeld, Xuezhou Zhang, Ara Vartanian, Yuzhe Ma, Xiaojin Zhu 0001. 59-79 [doi]
- Multi-stage Dynamic Information Flow Tracking GameShana Moothedath, Dinuka Sahabandu, Andrew Clark, Sangho Lee 0001, Wenke Lee, Radha Poovendran. 80-101 [doi]
- Less is More: Culling the Training Set to Improve Robustness of Deep Neural NetworksYongshuai Liu, Jiyu Chen, Hao Chen. 102-114 [doi]
- Optimal Placement of Honeypots for Network DefenseMark Bilinski, Ryan Gabrys, Justin Mauger. 115-126 [doi]
- Perfectly Secure Message Transmission Against Rational Timid AdversariesMaiki Fujita, Kenji Yasunaga, Takeshi Koshiba. 127-144 [doi]
- Reinforcement Learning for Autonomous Defence in Software-Defined NetworkingYi Han 0003, Benjamin I. P. Rubinstein, Tamas Abraham, Tansu Alpcan, Olivier Y. de Vel, Sarah M. Erfani, David Hubczenko, Christopher Leckie, Paul Montague. 145-165 [doi]
- Colonel Blotto Game with Coalition Formation for Sharing ResourcesJoseph L. Heyman, Abhishek Gupta 0002. 166-185 [doi]
- Data Poisoning Attacks in Contextual BanditsYuzhe Ma, Kwang-Sung Jun, Lihong Li 0001, Xiaojin Zhu 0001. 186-204 [doi]
- Analysis and Computation of Adaptive Defense Strategies Against Advanced Persistent Threats for Cyber-Physical SystemsLinan Huang, Quanyan Zhu. 205-226 [doi]
- Multi-sided Advertising Markets: Dynamic Mechanisms and Incremental User CompensationsMoran Feldman, Gonen Frim, Rica Gonen. 227-247 [doi]
- A Game-Theoretic Analysis of the Adversarial Boyd-Kuramoto ModelAntonin Demazy, Alexander Kalloniatis, Tansu Alpcan. 248-264 [doi]
- A Game Theoretic Analysis of the Twitter Follow-Unfollow MechanismJundong Chen, Md Shafaeat Hossain, Matthias R. Brust, Naomi Johnson. 265-276 [doi]
- Game Theoretic Analysis of a Byzantine Attacker in Vehicular Mix-ZonesNick Plewtong, Bruce DeBruhl. 277-295 [doi]
- Distributed Aggregative Games on Graphs in Adversarial EnvironmentsBahare Kiumarsi, Tamer Basar. 296-313 [doi]
- Disappointment-Aversion in Security GamesJasmin Wachter, Stefan Rass, Sandra König, Stefan Schauer. 314-325 [doi]
- Moving Target Defense for the Placement of Intrusion Detection Systems in the CloudSailik Sengupta, Ankur Chowdhary, Dijiang Huang, Subbarao Kambhampati. 326-345 [doi]
- Approximating Power Indices to Assess Cybersecurity CriticalityDaniel Clouse, David Burke. 346-365 [doi]
- A Differentially Private and Truthful Incentive Mechanism for Traffic Offload to Public TransportationLuyao Niu, Andrew Clark. 366-385 [doi]
- Deep Learning Based Game-Theoretical Approach to Evade Jamming AttacksSandamal Weerasinghe, Tansu Alpcan, Sarah M. Erfani, Christopher Leckie, Peyam Pourbeik, Jack Riddle. 386-397 [doi]
- Towards Scientific Incident ResponseJonathan M. Spring, David J. Pym. 398-417 [doi]
- Rational Trust ModelingMehrdad Nojoumian. 418-431 [doi]
- Scaling-Up Stackelberg Security Games Applications Using ApproximationsArunesh Sinha, Aaron Schlenker, Donnabell Dmello, Milind Tambe. 432-452 [doi]
- A Learning and Masking Approach to Secure LearningLinh Nguyen, Sky Wang, Arunesh Sinha. 453-464 [doi]
- Towards True Decentralization: A Blockchain Consensus Protocol Based on Game Theory and RandomnessNaif Alzahrani, Nirupama Bulusu. 465-485 [doi]
- A Game Theoretical Framework for Inter-process Adversarial Intervention DetectionMuhammed O. Sayin, Hossein Hosseini, Radha Poovendran, Tamer Basar. 486-507 [doi]
- Cyber-Insurance as a Signaling Game: Self-reporting and External Security AuditsAron Laszka, Emmanouil Panaousis, Jens Grossklags. 508-520 [doi]
- A Bayesian Multi-armed Bandit Approach for Identifying Human VulnerabilitiesErik Miehling, Baicen Xiao, Radha Poovendran, Tamer Basar. 521-539 [doi]
- Hypothesis Testing Game for Cyber DeceptionTao Zhang 0011, Quanyan Zhu. 540-555 [doi]
- Algorithms for Subgame Abstraction with Applications to Cyber DefenseAnjon Basak, Marcus Gutierrez, Christopher Kiekintveld. 556-568 [doi]
- A Two-Stage Deception Game for Network DefenseWei Wang, Bo Zeng. 569-582 [doi]
- Imbalanced Collusive Security GamesHan-Ching Ou, Milind Tambe, Bistra Dilkina, Phebe Vayanos. 583-602 [doi]
- A Robust Optimization Approach to Designing Near-Optimal Strategies for Constant-Sum Monitoring GamesAida Rahmattalabi, Phebe Vayanos, Milind Tambe. 603-622 [doi]
- An Initial Study of Targeted Personality Models in the FlipIt GameAnjon Basak, Jakub Cerný, Marcus Gutierrez, Shelby Curtis, Charles Kamhoua, Daniel Jones 0003, Branislav Bosanský, Christopher Kiekintveld. 623-636 [doi]