-
1
-
Observable Perfect Equilibrium
-
1
-
The Risk of Attacker Behavioral Learning: Can Attacker Fool Defender Under Uncertainty?
-
2
-
Casino Rationale: Countering Attacker Deception in Zero-Sum Stackelberg Security Games of Bounded Rationality
-
2
-
Does Cyber-Insurance Benefit the Insured or the Attacker? – A Game of Cyber-Insurance
-
3
-
Rule Enforcing Through Ordering
-
3
-
Cyber Deception Against Zero-Day Attacks: A Game Theoretic Approach
-
4
-
Multi-defender Security Games with Schedules
-
4
-
On Almost-Sure Intention Deception Planning that Exploits Imperfect Observers
-
5
-
Asymmetric Centrality Game Against Network Epidemic Propagation
-
5
-
Using Deception in Markov Game to Understand Adversarial Behaviors Through a Capture-The-Flag Environment
-
6
-
Robust Moving Target Defense Against Unknown Attacks: A Meta-reinforcement Learning Approach
-
6
-
Shades of Grey: Strategic Bimatrix Stopping Games for Modelling (Un)Ethical Hacking Roles
-
7
-
Synchronization in Security Games
-
7
-
Characterizing and Improving the Robustness of Predict-Then-Optimize Frameworks
-
8
-
Multiple Oracle Algorithm to Solve Continuous Games
-
8
-
Quantisation Effects in Adversarial Cyber-Physical Games
-
9
-
Optimal Pursuit of Surveilling Agents Near a High Value Target
-
9
-
Scalable Learning of Intrusion Response Through Recursive Decomposition
-
10
-
On Poisoned Wardrop Equilibrium in Congestion Games
-
10
-
Honeypot Allocation for Cyber Deception in Dynamic Tactical Networks: A Game Theoretic Approach
-
11
-
Reward Delay Attacks on Deep Reinforcement Learning
-
11
-
Optimal Resource Allocation for Proactive Defense with Deception in Probabilistic Attack Graphs
-
12
-
An Exploration of Poisoning Attacks on Data-Based Decision Making
-
12
-
The Credential is Not Enough: Deception with Honeypots and Fake Credentials
-
13
-
A Network Centrality Game for Epidemic Control
-
13
-
Playing Repeated Coopetitive Polymatrix Games with Small Manipulation Cost
-
14
-
Optimizing Intrusion Detection Systems Placement Against Network Virus Spreading Using a Partially Observable Stochastic Minimum-Threat Path Game
-
14
-
Rational Broadcast Protocols Against Timid Adversaries
-
15
-
FlipPath Game to Counter Stealthy Attacks in SDN-Based Tactical Networks
-
15
-
Voting Games to Model Protocol Stability and Security of Proof-of-Work Cryptocurrencies
-
16
-
Double-Sided Information Asymmetry in Double Extortion Ransomware
-
17
-
Opacity-Enforcing Active Perception and Control Against Eavesdropping Attacks
-
18
-
A Game-Theoretic Analysis of Auditing Differentially Private Algorithms with Epistemically Disparate Herd
-
19
-
Modeling and Analysis of a Nonlinear Security Game with Mixed Armament