Abstract is missing.
- The Risk of Attacker Behavioral Learning: Can Attacker Fool Defender Under Uncertainty?Thanh Hong Nguyen, Amulya Yadav. 3-22 [doi]
- Casino Rationale: Countering Attacker Deception in Zero-Sum Stackelberg Security Games of Bounded RationalityRyan Gabrys, Mark Bilinski, Justin Mauger, Daniel Silva 0012, Sunny Fugate. 23-43 [doi]
- Cyber Deception Against Zero-Day Attacks: A Game Theoretic ApproachMd. Abu Sayed, Ahmed H. Anwar, Christopher Kiekintveld, Branislav Bosanský, Charles A. Kamhoua. 44-63 [doi]
- On Almost-Sure Intention Deception Planning that Exploits Imperfect ObserversJie Fu. 67-86 [doi]
- Using Deception in Markov Game to Understand Adversarial Behaviors Through a Capture-The-Flag EnvironmentSiddhant Bhambri, Purv Chauhan, Frederico Araujo, Adam Doupé, Subbarao Kambhampati. 87-106 [doi]
- Robust Moving Target Defense Against Unknown Attacks: A Meta-reinforcement Learning ApproachHenger Li, Zizhan Zheng. 107-126 [doi]
- Synchronization in Security GamesStefan Rass, Sandra König. 129-148 [doi]
- Multiple Oracle Algorithm to Solve Continuous GamesTomás Kroupa, Tomás Votroubek. 149-167 [doi]
- Optimal Pursuit of Surveilling Agents Near a High Value TargetShivam Bajaj, Shaunak D. Bopardikar. 168-187 [doi]
- On Poisoned Wardrop Equilibrium in Congestion GamesYunian Pan, Quanyan Zhu. 191-211 [doi]
- Reward Delay Attacks on Deep Reinforcement LearningAnindya Sarkar, Jiarui Feng, Yevgeniy Vorobeychik, Christopher D. Gill, Ning Zhang 0017. 212-230 [doi]
- An Exploration of Poisoning Attacks on Data-Based Decision MakingSarah Eve Kinsey, Wong Wai Tuck, Arunesh Sinha, Thanh Hong Nguyen. 231-252 [doi]
- A Network Centrality Game for Epidemic ControlOlivier Tsemogne, Willie Kouam, Ahmed H. Anwar, Yezekael Hayel, Charles A. Kamhoua, Gabriel Deugoue. 255-273 [doi]
- Optimizing Intrusion Detection Systems Placement Against Network Virus Spreading Using a Partially Observable Stochastic Minimum-Threat Path GameOlivier Tsemogne, Yezekael Hayel, Charles A. Kamhoua, Gabriel Deugoue. 274-296 [doi]
- Voting Games to Model Protocol Stability and Security of Proof-of-Work CryptocurrenciesSanjay Bhattacherjee, Palash Sarkar 0001. 297-318 [doi]