default search action
14th GameSec 2023: Avignon, France
- Jie Fu
, Tomás Kroupa
, Yezekael Hayel
:
Decision and Game Theory for Security: 14th International Conference, GameSec 2023, Avignon, France, October 18-20, 2023, Proceedings. Lecture Notes in Computer Science 14167, Springe 2023, ISBN 978-3-031-50669-7 - Sam Ganzfried:
Observable Perfect Equilibrium. 3-22 - Zhen Li, Qi Liao:
Does Cyber-Insurance Benefit the Insured or the Attacker? - A Game of Cyber-Insurance. 23-42 - David Sychrovsky
, Sameer Desai
, Martin Loebl
:
Rule Enforcing Through Ordering. 43-62 - Zimeng Song, Chun Kai Ling, Fei Fang:
Multi-defender Security Games with Schedules. 65-85 - Willie Kouam
, Yezekael Hayel
, Gabriel Deugoue
, Olivier Tsemogne
, Charles A. Kamhoua
:
Asymmetric Centrality Game Against Network Epidemic Propagation. 86-109 - Eckhard Pflügel
:
Shades of Grey: Strategic Bimatrix Stopping Games for Modelling (Un)Ethical Hacking Roles. 110-129 - Sonja Johnson-Yu
, Jessie Finocchiaro
, Kai Wang, Yevgeniy Vorobeychik
, Arunesh Sinha
, Aparna Taneja
, Milind Tambe
:
Characterizing and Improving the Robustness of Predict-Then-Optimize Frameworks. 133-152 - Takuma Adams
, Andrew C. Cullen
, Tansu Alpcan
:
Quantisation Effects in Adversarial Cyber-Physical Games. 153-171 - Kim Hammar, Rolf Stadler:
Scalable Learning of Intrusion Response Through Recursive Decomposition. 172-192 - Md. Abu Sayed
, Ahmed H. Anwar
, Christopher Kiekintveld
, Charles A. Kamhoua
:
Honeypot Allocation for Cyber Deception in Dynamic Tactical Networks: A Game Theoretic Approach. 195-214 - Haoxiang Ma
, Shuo Han
, Charles A. Kamhoua
, Jie Fu
:
Optimal Resource Allocation for Proactive Defense with Deception in Probabilistic Attack Graphs. 215-233 - Sonia Cromp
, Mark Bilinski
, Ryan Gabrys
, Frederic Sala
:
The Credential is Not Enough: Deception with Honeypots and Fake Credentials. 234-254 - Shivakumar Mahesh, Nicholas Bishop, Le Cong Dinh, Long Tran-Thanh:
Playing Repeated Coopetitive Polymatrix Games with Small Manipulation Cost. 257-276 - Keigo Yamashita, Kenji Yasunaga:
Rational Broadcast Protocols Against Timid Adversaries. 277-293 - Fabrice Mvah
, Vianney Kengne Tchendji
, Clémentin Tayou Djamégni
, Ahmed H. Anwar
, Deepak K. Tosh
, Charles A. Kamhoua
:
FlipPath Game to Counter Stealthy Attacks in SDN-Based Tactical Networks. 294-308 - Tom Meurs
, Edward J. Cartwright
, Anna Cartwright
:
Double-Sided Information Asymmetry in Double Extortion Ransomware. 311-328 - Sumukha Udupa
, Hazhar Rahmani
, Jie Fu
:
Opacity-Enforcing Active Perception and Control Against Eavesdropping Attacks. 329-348 - Ya-Ting Yang, Tao Zhang, Quanyan Zhu:
A Game-Theoretic Analysis of Auditing Differentially Private Algorithms with Epistemically Disparate Herd. 349-368 - Jean Le Hénaff, Hélène Le Cadre:
Modeling and Analysis of a Nonlinear Security Game with Mixed Armament. 369-388
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.