E-Books durchsuchen
Decision and Game Theory for Security [2014]
- 3
-
Defending Against Opportunistic Criminals: New Game-Theoretic Frameworks and Algorithms
- 23
-
Addressing Scalability and Robustness in Security Games with Multiple Boundedly Rational Adversaries
- 43
-
Empirical Game-Theoretic Analysis of an Adaptive Cyber-Defense Scenario (Preliminary Report)
- 59
-
Strategic Discovery and Sharing of Vulnerabilities in Competitive Environments
- 79
-
Optimal Contracts for Outsourced Computation
- 99
-
A Supervisory Control Approach to Dynamic Cyber-Security
- 118
-
Numerical Computation of Multi-goal Security Strategies
- 134
-
Realizable Rational Multiparty Cryptographic Protocols
- 155
-
Limiting Adversarial Budget in Quantitative Security Assessment
- 175
-
<Literal>FlipThem</Literal>: Modeling Targeted Attacks with <Literal>FlipIt</Literal> for Multiple Resources
- 195
-
Secure Message Delivery Games for Device-to-Device Communications
- 216
-
A Three-Stage Colonel Blotto Game: When to Provide More Information to an Adversary
- 234
-
Toward Optimal Network Topology Design for Fast and Secure Distributed Computation
- 246
-
An Economic Model and Simulation Results of App Adoption Decisions on Networks with Interdependent Privacy Consequences
- 266
-
Cybersecurity Games and Investments: A Decision Support Approach
- 287
-
Data Integrity and Availability Verification Game in Untrusted Cloud Storage
- 309
-
Empirical Comparisons of Descriptive Multi-objective Adversary Models in Stackelberg Security Games
- 319
-
A Dynamic Bayesian Security Game Framework for Strategic Defense Mechanism Design
- 329
-
Can Less Be More? A Game-Theoretic Analysis of Filtering vs. Investment
- 340
-
Online Learning Methods for Border Patrol Resource Allocation
- 350
-
A Distributed Optimization Algorithm for Attack-Resilient Wide-Area Monitoring of Power Systems: Theoretical and Experimental Methods
- 360
-
Testing for Hardware Trojans: A Game-Theoretic Approach
- 370
-
Surveillance for Security as a Pursuit-Evasion Game