Abstract is missing.
- Computing Nash Equilibria in Multiplayer DAG-Structured Stochastic Games with Persistent Imperfect InformationSam Ganzfried. 3-16 [doi]
- Two Algorithms for Computing Exact and Approximate Nash Equilibria in Bimatrix GamesJianzong Pi, Joseph L. Heyman, Abhishek Gupta 0002. 17-36 [doi]
- Separable Network Games with Compact Strategy SetsTomás Kroupa, Sara Vannucci, Tomás Votroubek. 37-56 [doi]
- Countering Attacker Data Manipulation in Security GamesAndrew R. Butler, Thanh H. Nguyen, Arunesh Sinha. 59-79 [doi]
- Scalable Optimal Classifiers for Adversarial Settings Under UncertaintyBenjamin Roussillon, Patrick Loiseau. 80-97 [doi]
- Learning Generative Deception Strategies in Combinatorial Masking GamesJunlin Wu, Charles A. Kamhoua, Murat Kantarcioglu, Yevgeniy Vorobeychik. 98-117 [doi]
- Network Games with Strategic Machine LearningKun Jin, Tongxin Yin, Charles A. Kamhoua, Mingyan Liu. 118-137 [doi]
- No Time to Lie: Bounds on the Learning Rate of a Defender for Inferring Attacker Target PreferencesMark Bilinski, Joseph DiVita, Kimberly Ferguson-Walter, Sunny Fugate, Ryan Gabrys, Justin Mauger, Brian Souza. 138-157 [doi]
- When Should You Defend Your Classifier? - - A Game-Theoretical Analysis of Countermeasures Against Adversarial ExamplesMaximilian Samsinger, Florian Merkle, Pascal Schöttle, Tomás Pevný. 158-177 [doi]
- A Mechanism Design Approach to Solve Ransomware DilemmasIman Vakilinia, Mohammad Mahdi Khalili, Ming Li 0006. 181-194 [doi]
- Winning the Ransomware Lottery - A Game-Theoretic Approach to Preventing Ransomware AttacksErick Galinkin. 195-207 [doi]
- Combating Ransomware in Internet of Things: A Games-in-Games Approach for Cross-Layer Cyber Defense and Security InvestmentYuhan Zhao, Yunfei Ge, Quanyan Zhu. 208-228 [doi]
- A Game-Theoretic Framework for Controlled Islanding in the Presence of AdversariesLuyao Niu, Dinuka Sahabandu, Andrew Clark, Radha Poovendran. 231-250 [doi]
- Game Theoretic Hardware Trojan Testing Under Cost ConsiderationsSwastik Brahma, Laurent Njilla, Satyaki Nan. 251-270 [doi]
- Strategic Remote Attestation: Testbed for Internet-of-Things Devices and Stackelberg Security Game for Optimal StrategiesShanto Roy, Salah Uddin Kadir, Yevgeniy Vorobeychik, Aron Laszka. 271-290 [doi]
- Bet and Attack: Incentive Compatible Collaborative Attacks Using Smart ContractsZahra Motaqy, Ghada Almashaqbeh, Behnam Bahrak, Naser Yazdani. 293-313 [doi]
- Combating Informational Denial-of-Service (IDoS) Attacks: Modeling and Mitigation of Attentional Human VulnerabilityLinan Huang, Quanyan Zhu. 314-333 [doi]
- Password Strength Signaling: A Counter-Intuitive Defense Against Password CrackingWenjie Bai, Jeremiah Blocki, Benjamin Harsha. 334-353 [doi]
- Evaluating Attacker Risk Behavior in an Internet of Things EcosystemErick Galinkin, John Carter, Spiros Mancoridis. 354-364 [doi]
- Paying Firms to Share Cyber Threat IntelligenceBrandon C. Collins, Shouhuai Xu, Philip N. Brown. 365-377 [doi]