E-Books durchsuchen

Decision and Game Theory for Security [2014]

3
Defending Against Opportunistic Criminals: New Game-Theoretic Frameworks and Algorithms
23
Addressing Scalability and Robustness in Security Games with Multiple Boundedly Rational Adversaries
43
Empirical Game-Theoretic Analysis of an Adaptive Cyber-Defense Scenario (Preliminary Report)
59
Strategic Discovery and Sharing of Vulnerabilities in Competitive Environments
79
Optimal Contracts for Outsourced Computation
99
A Supervisory Control Approach to Dynamic Cyber-Security
118
Numerical Computation of Multi-goal Security Strategies
134
Realizable Rational Multiparty Cryptographic Protocols
155
Limiting Adversarial Budget in Quantitative Security Assessment
175
<Literal>FlipThem</Literal>: Modeling Targeted Attacks with <Literal>FlipIt</Literal> for Multiple Resources
195
Secure Message Delivery Games for Device-to-Device Communications
216
A Three-Stage Colonel Blotto Game: When to Provide More Information to an Adversary
234
Toward Optimal Network Topology Design for Fast and Secure Distributed Computation
246
An Economic Model and Simulation Results of App Adoption Decisions on Networks with Interdependent Privacy Consequences
266
Cybersecurity Games and Investments: A Decision Support Approach
287
Data Integrity and Availability Verification Game in Untrusted Cloud Storage
309
Empirical Comparisons of Descriptive Multi-objective Adversary Models in Stackelberg Security Games
319
A Dynamic Bayesian Security Game Framework for Strategic Defense Mechanism Design
329
Can Less Be More? A Game-Theoretic Analysis of Filtering vs. Investment
340
Online Learning Methods for Border Patrol Resource Allocation
350
A Distributed Optimization Algorithm for Attack-Resilient Wide-Area Monitoring of Power Systems: Theoretical and Experimental Methods
360
Testing for Hardware Trojans: A Game-Theoretic Approach
370
Surveillance for Security as a Pursuit-Evasion Game
Feedback