


default search action
10th GameSec 2019: Stockholm, Sweden
- Tansu Alpcan, Yevgeniy Vorobeychik, John S. Baras, György Dán:

Decision and Game Theory for Security - 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings. Lecture Notes in Computer Science 11836, Springer 2019, ISBN 978-3-030-32429-2 - Carlos A. Barreto, Xenofon D. Koutsoukos:

Design of Load Forecast Systems Resilient Against Cyber-Attacks. 1-20 - Anjon Basak, Charles A. Kamhoua, Sridhar Venkatesan, Marcus Gutierrez, Ahmed H. Anwar

, Christopher Kiekintveld:
Identifying Stealthy Attackers in a Game Theoretic Framework Using Deception. 21-32 - Yoav Ben Yaakov, Xinrun Wang, Joachim Meyer, Bo An:

Choosing Protection: User Investments in Security Measures for Cyber Risk Management. 33-44 - Radhika Bhargava, Chris Clifton:

When Is a Semi-honest Secure Multiparty Computation Valuable? 45-64 - Mark Bilinski

, Kimberly Ferguson-Walter
, Sunny Fugate
, Ryan Gabrys
, Justin Mauger
, Brian Souza
:
You only Lie Twice: A Multi-round Cyber Deception Game of Questionable Veracity. 65-84 - Nadia Boumkheld, Sakshyam Panda

, Stefan Rass
, Emmanouil Panaousis
:
Honeypot Type Selection Games for Smart Grid Networks. 85-96 - Victor Bucarey

, Martine Labbé:
Discussion of Fairness and Implementability in Stackelberg Security Games. 97-117 - Taylor J. Canann

:
Toward a Theory of Vulnerability Disclosure Policy: A Hacker's Game. 118-134 - Anna Cartwright

, Edward J. Cartwright
, Lian Xue
:
Investing in Prevention or Paying for Recovery - Attitudes to Cyber Risk. 135-151 - Yvo Desmedt, Arkadii Slinko

:
Realistic versus Rational Secret Sharing. 152-163 - Noah Dunstatter

, Alireza Tahsini
, Mina Guirguis
, Jelena Tesic
:
Solving Cyber Alert Allocation Markov Games with Deep Reinforcement Learning. 164-183 - Christopher Griffin

, Sarah Michele Rajtmajer, Prasanna Umar, Anna Cinzia Squicciarini:
Power Law Public Goods Game for Personal Information Sharing in News Commentaries. 184-195 - Linan Huang

, Quanyan Zhu:
Adaptive Honeypot Engagement Through Reinforcement Learning of Semi-Markov Decision Processes. 196-216 - Yunhan Huang

, Quanyan Zhu
:
Deceptive Reinforcement Learning Under Adversarial Manipulations on Cost Signals. 217-237 - Nitin Kamra

, Umang Gupta, Kai Wang, Fei Fang
, Yan Liu, Milind Tambe:
DeepFP for Finding Nash Equilibrium in Continuous Action Spaces. 238-258 - Mohammad Mahdi Khalili, Xueru Zhang, Mingyan Liu:

Effective Premium Discrimination for Designing Cyber Insurance Policies with Rare Losses. 259-275 - Kavita Kumari

, Murtuza Jadliwala
, Anindya Maiti
, Mohammad Hossein Manshaei
:
Analyzing Defense Strategies Against Mobile Information Leakages: A Game-Theoretic Approach. 276-296 - Zuxing Li

, György Dán
:
Dynamic Cheap Talk for Robust Adversarial Learning. 297-309 - Jonathan S. A. Merlevede

, Benjamin Johnson
, Jens Grossklags
, Tom Holvoet
:
Time-Dependent Strategies in Games of Timing. 310-330 - Thanh Hong Nguyen, Amulya Yadav, Branislav Bosanský

, Yu Liang
:
Tackling Sequential Attacks in Security Games. 331-351 - Luyao Niu, Andrew Clark:

A Framework for Joint Attack Detection and Control Under False Data Injection. 352-363 - Lisa Oakley, Alina Oprea:

\mathsf QFlip : An Adaptive Reinforcement Learning Strategy for the \mathsf FlipIt Security Game. 364-384 - Bhaskar Ramasubramanian, Luyao Niu, Andrew Clark, Linda Bushnell

, Radha Poovendran
:
Linear Temporal Logic Satisfaction in Adversarial Environments Using Secure Control Barrier Certificates. 385-403 - Stefan Rass

, Sandra König
, Emmanouil Panaousis
:
Cut-The-Rope: A Game of Stealthy Intrusion. 404-416 - Dinuka Sahabandu, Shana Moothedath, Joey Allen, Linda Bushnell

, Wenke Lee, Radha Poovendran
:
Stochastic Dynamic Information Flow Tracking Game with Reinforcement Learning. 417-438 - Serkan Saritas

, Ezzeldin Shereen
, Henrik Sandberg
, György Dán
:
Adversarial Attacks on Continuous Authentication Security: A Dynamic Game Approach. 439-458 - Muhammed O. Sayin

, Tamer Basar:
On the Optimality of Linear Signaling to Deceive Kalman Filters over Finite/Infinite Horizons. 459-478 - Sailik Sengupta, Tathagata Chakraborti, Subbarao Kambhampati:

MTDeep: Boosting the Security of Deep Neural Nets Against Adversarial Attacks with Moving Target Defense. 479-491 - Sailik Sengupta, Ankur Chowdhary, Dijiang Huang

, Subbarao Kambhampati:
General Sum Markov Games for Strategic Detection of Advanced Persistent Threats Using Moving Target Defense in Cloud Networks. 492-512 - Arkadii Slinko

:
Operations over Linear Secret Sharing Schemes. 513-524 - Omkar Thakoor, Milind Tambe, Phebe Vayanos, Haifeng Xu, Christopher Kiekintveld, Fei Fang

:
Cyber Camouflage Games for Strategic Deception. 525-541 - Xinrun Wang, Milind Tambe, Branislav Bosanský

, Bo An:
When Players Affect Target Values: Modeling and Solving Dynamic Partially Observable Security Games. 542-562 - Kenji Yasunaga

, Takeshi Koshiba
:
Perfectly Secure Message Transmission Against Independent Rational Adversaries. 563-582 - Anthony Scavarelli

, Ali Arya, Robert J. Teather
:
Circles: exploring multi-platform accessible, socially scalable VR in the classroom. 1-4 - Kathleen Ruiz, Krystyna Kornecki

:
Eco-resilience: Games, art, science. 1-11 - Jonah Warren:

Tiny online game engines. 1-7 - Wen Huang:

Exploring players' user experience in a high-embodied virtual reality game. 1-8

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.



Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







last updated on 2026-05-15 23:23 CEST by the 







