Uncertainty in Interdependent Security Games (English)
- New search for: Johnson, B.
- New search for: Grossklags, J.
- New search for: Christin, N.
- New search for: Chuang, J.
- New search for: Johnson, B.
- New search for: Grossklags, J.
- New search for: Christin, N.
- New search for: Chuang, J.
- New search for: Alpcan, Tansu
- New search for: Buttyan, Levente
- New search for: Baras, John S.
In:
GameSec; Decision and game theory for security: first international conference
6442
;
234-244
;
2010
-
ISBN:
-
ISSN:
- Conference paper / Print
-
Title:Uncertainty in Interdependent Security Games
-
Contributors:Johnson, B. ( author ) / Grossklags, J. ( author ) / Christin, N. ( author ) / Chuang, J. ( author ) / Alpcan, Tansu / Buttyan, Levente / Baras, John S.
-
Conference:International conference; 1st, GameSec; Decision and game theory for security: first international conference ; 2010 ; Berlin
-
Published in:LECTURE NOTES IN ARTIFICIAL INTELLIGENCE , 6442 ; 234-244
-
Publisher:
- New search for: Springer
-
Place of publication:Berlin
-
Publication date:2010-01-01
-
Size:11 pages
-
Remarks:Includes bibliographical references and index
-
ISBN:
-
ISSN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Design of Network Topology in an Adversarial EnvironmentGueye, A. / Walrand, J.C. / Anantharam, V. et al. | 2010
- 21
-
Optimal Information Security Investment with Penetration TestingBohme, R. / Felegyhazi, M. et al. | 2010
- 38
-
Tracking Games in Mobile NetworksHumbert, M. / Manshaei, M.H. / Freudiger, J. / Hubaux, J.-P. et al. | 2010
- 58
-
gPath: A Game-Theoretic Path Selection Algorithm to Protect Tor's AnonymityZhang, N. / Yu, W. / Fu, X. / Das, S.K. et al. | 2010
- 72
-
When Do Firms Invest in Privacy-Preserving Technologies?Kantarcioglu, M. / Bensoussan, A. / Hoe, S. et al. | 2010
- 87
-
Adversarial Control in a Delay Tolerant NetworkAltman, E. / Basar, T. / Kavitha, V. et al. | 2010
- 107
-
Security Interdependencies for Networked Control Systems with Identical AgentsAmin, S. / Schwartz, G.A. / Sastry, S.S. et al. | 2010
- 123
-
Robust Control in Sparse Mobile Ad-Hoc NetworksAltman, E. / Aram, A. / Basar, T. / Touati, C. / Sarkar, S. et al. | 2010
- 135
-
A Game-Theoretical Approach for Finding Optimal Strategies in a Botnet Defense ModelBensoussan, A. / Kantarcioglu, M. / Hoe, S. et al. | 2010
- 149
-
ISPs and Ad Networks against Botnet Ad FraudVratonjic, N. / Manshaei, M.H. / Raya, M. / Hubaux, J.-P. et al. | 2010
- 168
-
A Localization Game in Wireless Sensor NetworksGatti, N. / Monga, M. / Sicari, S. et al. | 2010
- 180
-
Effective Multimodel Anomaly Detection Using Cooperative NegotiationVolpatto, A. / Maggi, F. / Zanero, S. et al. | 2010
- 192
-
The Password Game: Negative Externalities from Weak Password PracticesPreibusch, S. / Bonneau, J. et al. | 2010
- 208
-
Towards a Game Theoretic Authorisation ModelSalim, F. / Reid, J. / Dulleck, U. / Dawson, E. et al. | 2010
- 220
-
Disperse or Unite? A Mathematical Model of Coordinated AttackAlpern, S. / Fokkink, R. / Kelder, J.o.d. / Lidbetter, T. et al. | 2010
- 234
-
Uncertainty in Interdependent Security GamesJohnson, B. / Grossklags, J. / Christin, N. / Chuang, J. et al. | 2010
- 245
-
Attack-Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are EquivalentKordy, B. / Mauw, S. / Melissen, M. / Schweitzer, P. et al. | 2010
- 257
-
Methods and Algorithms for Infinite Bayesian Stackelberg Security Games (Extended Abstract)Kiekintveld, C. / Marecki, J. / Tambe, M. et al. | 2010