Security Games with Market Insurance (English)
- New search for: Johnson, B.
- New search for: Bohme, R.
- New search for: Grossklags, J.
- New search for: Johnson, B.
- New search for: Bohme, R.
- New search for: Grossklags, J.
- New search for: Baras, J.S.
- New search for: Katz, J.
- New search for: Altman, E.
In:
Decision and game theory for security
7037
;
117-130
;
2011
-
ISBN:
-
ISSN:
- Conference paper / Print
-
Title:Security Games with Market Insurance
-
Contributors:Johnson, B. ( author ) / Bohme, R. ( author ) / Grossklags, J. ( author ) / Baras, J.S. / Katz, J. / Altman, E.
-
Conference:International Conference; 2nd, Decision and game theory for security ; 2011 ; College Park, MD
-
Published in:Decision and game theory for security , 7037 ; 117-130LECTURE NOTES IN COMPUTER SCIENCE , 7037 ; 117-130
-
Publisher:
- New search for: Springer
-
Place of publication:Heidelberg , London
-
Publication date:2011-01-01
-
Size:14 pages
-
Remarks:Includes bibliographical references and index
-
ISBN:
-
ISSN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Beyond Nash Equilibrium: Solution Concepts for the 21st CenturyHalpern, J.Y. et al. | 2011
- 4
-
Network Security Games: Combining Game Theory, Behavioral Economics, and Network MeasurementsChristin, N. et al. | 2011
- 7
-
Indices of Power in Optimal IDS Default Configuration: Theory and ExamplesZhu, Q. / Basar, T. et al. | 2011
- 22
-
Exploiting Adversary's Risk Profiles in Imperfect Information Security GamesStocco, G.F. / Cybenko, G. et al. | 2011
- 34
-
An Anti-jamming Strategy for Channel Access in Cognitive Radio NetworksSodagari, S. / Clancy, T.C. et al. | 2011
- 44
-
Node Capture Games: A Game Theoretic Approach to Modeling and Mitigating Node Capture AttacksBonaci, T. / Bushnell, L. et al. | 2011
- 56
-
Multi-variate Quickest Detection of Significant Change ProcessSzajowski, K. et al. | 2011
- 67
-
Interplay between Security Providers, Consumers, and Attackers: A Weighted Congestion Game ApproachMaille, P. / Reichl, P. / Tuffin, B. et al. | 2011
- 87
-
Network Games with and without SynchroneityGhani, A.T.A. / Tanaka, K. et al. | 2011
- 104
-
An Asymptotic Solution of Dresher's Guessing GameFokkink, R. / Stassen, M. et al. | 2011
- 117
-
Security Games with Market InsuranceJohnson, B. / Bohme, R. / Grossklags, J. et al. | 2011
- 131
-
Aegis: A Novel Cyber-Insurance ModelPal, R. / Golubchik, L. / Psounis, K. et al. | 2011
- 151
-
Maximizing Influence in Competitive Environments: A Game-Theoretic ApproachClark, A. / Poovendran, R. et al. | 2011
- 163
-
Collaborative Location Privacy with Rational UsersSantos, F. / Humbert, M. / Shokri, R. / Hubaux, J.-P. et al. | 2011
- 182
-
Digital Trust Games: An Experimental StudyAlpcan, T. / Levi, A. / Savas, E. et al. | 2011
- 201
-
Colonel Blotto in the Phishing WarChia, P.H. / Chuang, J. et al. | 2011
- 219
-
Investment in Privacy-Preserving Technologies under UncertaintyKantarcioglu, M. / Bensoussan, A. / Hoe, S. et al. | 2011
- 239
-
Modeling Internet Security Investments: Tackling Topological Information UncertaintyPal, R. / Hui, P. et al. | 2011