Abstract is missing.
- Design of Load Forecast Systems Resilient Against Cyber-AttacksCarlos A. Barreto, Xenofon D. Koutsoukos. 1-20 [doi]
- Eco-resilience: Games, art, scienceKathleen Ruiz, Krystyna Kornecki. 1-11 [doi]
- Exploring players' user experience in a high-embodied virtual reality gameWen Huang. 1-8 [doi]
- Tiny online game enginesJonah Warren. 1-7 [doi]
- Circles: exploring multi-platform accessible, socially scalable VR in the classroomAnthony Scavarelli, Ali Arya, Robert J. Teather. 1-4 [doi]
- Identifying Stealthy Attackers in a Game Theoretic Framework Using DeceptionAnjon Basak, Charles A. Kamhoua, Sridhar Venkatesan, Marcus Gutierrez, Ahmed H. Anwar, Christopher Kiekintveld. 21-32 [doi]
- Choosing Protection: User Investments in Security Measures for Cyber Risk ManagementYoav Ben Yaakov, Xinrun Wang, Joachim Meyer, Bo An. 33-44 [doi]
- When Is a Semi-honest Secure Multiparty Computation Valuable?Radhika Bhargava, Chris Clifton. 45-64 [doi]
- You only Lie Twice: A Multi-round Cyber Deception Game of Questionable VeracityMark Bilinski, Kimberly Ferguson-Walter, Sunny Fugate, Ryan Gabrys, Justin Mauger, Brian Souza. 65-84 [doi]
- Honeypot Type Selection Games for Smart Grid NetworksNadia Boumkheld, Sakshyam Panda, Stefan Rass, Emmanouil Panaousis. 85-96 [doi]
- Discussion of Fairness and Implementability in Stackelberg Security GamesVictor Bucarey, Martine Labbé. 97-117 [doi]
- Toward a Theory of Vulnerability Disclosure Policy: A Hacker's GameTaylor J. Canann. 118-134 [doi]
- Investing in Prevention or Paying for Recovery - Attitudes to Cyber RiskAnna Cartwright, Edward J. Cartwright, Lian Xue. 135-151 [doi]
- Realistic versus Rational Secret SharingYvo Desmedt, Arkadii Slinko. 152-163 [doi]
- Solving Cyber Alert Allocation Markov Games with Deep Reinforcement LearningNoah Dunstatter, Alireza Tahsini, Mina Guirguis, Jelena Tesic. 164-183 [doi]
- Power Law Public Goods Game for Personal Information Sharing in News CommentariesChristopher Griffin 0001, Sarah Michele Rajtmajer, Prasanna Umar, Anna Cinzia Squicciarini. 184-195 [doi]
- Adaptive Honeypot Engagement Through Reinforcement Learning of Semi-Markov Decision ProcessesLinan Huang, Quanyan Zhu. 196-216 [doi]
- Deceptive Reinforcement Learning Under Adversarial Manipulations on Cost SignalsYunhan Huang, Quanyan Zhu. 217-237 [doi]
- DeepFP for Finding Nash Equilibrium in Continuous Action SpacesNitin Kamra, Umang Gupta, Kai Wang, Fei Fang, Yan Liu 0002, Milind Tambe. 238-258 [doi]
- Effective Premium Discrimination for Designing Cyber Insurance Policies with Rare LossesMohammad Mahdi Khalili, Xueru Zhang, Mingyan Liu. 259-275 [doi]
- Analyzing Defense Strategies Against Mobile Information Leakages: A Game-Theoretic ApproachKavita Kumari, Murtuza Jadliwala, Anindya Maiti, Mohammad Hossein Manshaei. 276-296 [doi]
- Dynamic Cheap Talk for Robust Adversarial LearningZuxing Li, György Dán. 297-309 [doi]
- Time-Dependent Strategies in Games of TimingJonathan S. A. Merlevede, Benjamin Johnson 0001, Jens Grossklags, Tom Holvoet. 310-330 [doi]
- Tackling Sequential Attacks in Security GamesThanh Hong Nguyen, Amulya Yadav, Branislav Bosanský, Yu Liang. 331-351 [doi]
- A Framework for Joint Attack Detection and Control Under False Data InjectionLuyao Niu, Andrew Clark. 352-363 [doi]
- \mathsf QFlip : An Adaptive Reinforcement Learning Strategy for the \mathsf FlipIt Security GameLisa Oakley, Alina Oprea. 364-384 [doi]
- Linear Temporal Logic Satisfaction in Adversarial Environments Using Secure Control Barrier CertificatesBhaskar Ramasubramanian, Luyao Niu, Andrew Clark, Linda Bushnell, Radha Poovendran. 385-403 [doi]
- Cut-The-Rope: A Game of Stealthy IntrusionStefan Rass, Sandra König, Emmanouil Panaousis. 404-416 [doi]
- Stochastic Dynamic Information Flow Tracking Game with Reinforcement LearningDinuka Sahabandu, Shana Moothedath, Joey Allen, Linda Bushnell, Wenke Lee, Radha Poovendran. 417-438 [doi]
- Adversarial Attacks on Continuous Authentication Security: A Dynamic Game ApproachSerkan Saritas, Ezzeldin Shereen, Henrik Sandberg, György Dán. 439-458 [doi]
- On the Optimality of Linear Signaling to Deceive Kalman Filters over Finite/Infinite HorizonsMuhammed O. Sayin, Tamer Basar. 459-478 [doi]
- MTDeep: Boosting the Security of Deep Neural Nets Against Adversarial Attacks with Moving Target DefenseSailik Sengupta, Tathagata Chakraborti, Subbarao Kambhampati. 479-491 [doi]
- General Sum Markov Games for Strategic Detection of Advanced Persistent Threats Using Moving Target Defense in Cloud NetworksSailik Sengupta, Ankur Chowdhary, Dijiang Huang, Subbarao Kambhampati. 492-512 [doi]
- Operations over Linear Secret Sharing SchemesArkadii Slinko. 513-524 [doi]
- Cyber Camouflage Games for Strategic DeceptionOmkar Thakoor, Milind Tambe, Phebe Vayanos, Haifeng Xu, Christopher Kiekintveld, Fei Fang. 525-541 [doi]
- When Players Affect Target Values: Modeling and Solving Dynamic Partially Observable Security GamesXinrun Wang, Milind Tambe, Branislav Bosanský, Bo An. 542-562 [doi]
- Perfectly Secure Message Transmission Against Independent Rational AdversariesKenji Yasunaga, Takeshi Koshiba. 563-582 [doi]