Abstract is missing.
- Observable Perfect EquilibriumSam Ganzfried. 3-22 [doi]
- Does Cyber-Insurance Benefit the Insured or the Attacker? - A Game of Cyber-InsuranceZhen Li, Qi Liao. 23-42 [doi]
- Rule Enforcing Through OrderingDavid Sychrovsky, Sameer Desai, Martin Loebl. 43-62 [doi]
- Multi-defender Security Games with SchedulesZimeng Song, Chun Kai Ling, Fei Fang 0001. 65-85 [doi]
- Asymmetric Centrality Game Against Network Epidemic PropagationWillie Kouam, Yezekael Hayel, Gabriel Deugoue, Olivier Tsemogne, Charles A. Kamhoua. 86-109 [doi]
- Shades of Grey: Strategic Bimatrix Stopping Games for Modelling (Un)Ethical Hacking RolesEckhard Pflügel. 110-129 [doi]
- Characterizing and Improving the Robustness of Predict-Then-Optimize FrameworksSonja Johnson-Yu, Jessie Finocchiaro, Kai Wang 0040, Yevgeniy Vorobeychik, Arunesh Sinha, Aparna Taneja, Milind Tambe. 133-152 [doi]
- Quantisation Effects in Adversarial Cyber-Physical GamesTakuma Adams, Andrew C. Cullen, Tansu Alpcan. 153-171 [doi]
- Scalable Learning of Intrusion Response Through Recursive DecompositionKim Hammar, Rolf Stadler. 172-192 [doi]
- Honeypot Allocation for Cyber Deception in Dynamic Tactical Networks: A Game Theoretic ApproachMd. Abu Sayed, Ahmed H. Anwar, Christopher Kiekintveld, Charles A. Kamhoua. 195-214 [doi]
- Optimal Resource Allocation for Proactive Defense with Deception in Probabilistic Attack GraphsHaoxiang Ma, Shuo Han 0002, Charles A. Kamhoua, Jie Fu 0002. 215-233 [doi]
- The Credential is Not Enough: Deception with Honeypots and Fake CredentialsSonia Cromp, Mark Bilinski, Ryan Gabrys, Frederic Sala. 234-254 [doi]
- Playing Repeated Coopetitive Polymatrix Games with Small Manipulation CostShivakumar Mahesh, Nicholas Bishop, Le Cong Dinh, Long Tran-Thanh. 257-276 [doi]
- Rational Broadcast Protocols Against Timid AdversariesKeigo Yamashita, Kenji Yasunaga. 277-293 [doi]
- FlipPath Game to Counter Stealthy Attacks in SDN-Based Tactical NetworksFabrice Mvah, Vianney Kengne Tchendji, Clémentin Tayou Djamégni, Ahmed H. Anwar, Deepak K. Tosh, Charles A. Kamhoua. 294-308 [doi]
- Double-Sided Information Asymmetry in Double Extortion RansomwareTom Meurs, Edward J. Cartwright, Anna Cartwright 0001. 311-328 [doi]
- Opacity-Enforcing Active Perception and Control Against Eavesdropping AttacksSumukha Udupa, Hazhar Rahmani, Jie Fu 0002. 329-348 [doi]
- A Game-Theoretic Analysis of Auditing Differentially Private Algorithms with Epistemically Disparate HerdYa-Ting Yang, Tao Zhang 0011, Quanyan Zhu. 349-368 [doi]
- Modeling and Analysis of a Nonlinear Security Game with Mixed ArmamentJean Le Hénaff, Hélène Le Cadre. 369-388 [doi]