-
2
-
-
84908219846
-
Security games applied to real-world: Research contributions and challenges
-
Springer
-
Jain, M., An, B., Tambe, M.: Security games applied to real-world: Research contributions and challenges. In: Moving Target Defense II, pp. 15–39. Springer (2013)
-
(2013)
Moving Target Defense II
, pp. 15-39
-
-
Jain, M.1
An, B.2
Tambe, M.3
-
3
-
-
84898021102
-
Modeling cooperative, selfish andmalicious behaviors for trajectory privacy preservation using bayesian game theory
-
IEEE
-
Jin, X., Pissinou, N., Pumpichet, S., Kamhoua, C.A., Kwiat, K.: Modeling cooperative, selfish andmalicious behaviors for trajectory privacy preservation using bayesian game theory. In: Local Computer Networks (LCN), pp. 835–842. IEEE (2013)
-
(2013)
Local Computer Networks (LCN)
, pp. 835-842
-
-
Jin, X.1
Pissinou, N.2
Pumpichet, S.3
Kamhoua, C.A.4
Kwiat, K.5
-
5
-
-
84869465454
-
Using signaling games to model the multi-step attackdefense scenarios on confidentiality
-
In: Grossklags, J., Walrand, J. (eds.), Springer, Heidelberg
-
Lin, J., Liu, P., Jing, J.: Using signaling games to model the multi-step attackdefense scenarios on confidentiality. In: Grossklags, J., Walrand, J. (eds.) GameSec 2012. LNCS, vol. 7638, pp. 118–137. Springer, Heidelberg (2012)
-
(2012)
GameSec 2012. LNCS
, vol.7638
, pp. 118-137
-
-
Lin, J.1
Liu, P.2
Jing, J.3
-
6
-
-
60649107168
-
A bayesian game approach for intrusion detection in wireless ad hoc networks
-
ACM
-
Liu, Y., Comaniciu, C., Man, H.: A bayesian game approach for intrusion detection in wireless ad hoc networks. In: Proceeding from the 2006 Workshop on Game Theory for Communications and Networks, p. 4. ACM (2006)
-
(2006)
Proceeding from the 2006 Workshop on Game Theory for Communications and Networks
, vol.4
-
-
Liu, Y.1
Comaniciu, C.2
Man, H.3
-
7
-
-
84874284297
-
Game theory meets network security and privacy
-
Manshaei, M.H., Zhu, Q., Alpcan, T., Baçsar, T., Hubaux, J.-P.: Game theory meets network security and privacy. ACM Comput. Surv. 45(3), 1–39 (2013)
-
(2013)
ACM Comput. Surv
, vol.45
, Issue.3
, pp. 1-39
-
-
Manshaei, M.H.1
Zhu, Q.2
Alpcan, T.3
Baçsar, T.4
Hubaux, J.-P.5
-
8
-
-
70449485072
-
Security games with incomplete information
-
Nguyen, K.C., Alpcan, T., Basar, T.: Security games with incomplete information. In: International Conference on Communications (ICC), pp. 1–6. IEEE (2009)
-
(2009)
International Conference on Communications (ICC) IEEE
, pp. 1-6
-
-
Nguyen, K.C.1
Alpcan, T.2
Basar, T.3
-
10
-
-
84899919065
-
Playing games for security: An efficient exact algorithm for solving bayesian stackelberg games
-
Paruchuri, P., Pearce, J.P., Marecki, J., Tambe, M., Ordonez, F., Kraus, S.: Playing games for security: An efficient exact algorithm for solving bayesian stackelberg games. In: Proceedings of AAMAS 2008, pp. 895–902 (2008)
-
(2008)
Proceedings of AAMAS 2008
, pp. 895-902
-
-
Paruchuri, P.1
Pearce, J.P.2
Marecki, J.3
Tambe, M.4
Ordonez, F.5
Kraus, S.6
-
11
-
-
84869444399
-
Are we compromised? Modelling security assessment games
-
In: Grossklags, J., Walrand, J. (eds.), Springer, Heidelberg
-
Pham, V., Cid, C.: Are we compromised? Modelling security assessment games. In: Grossklags, J., Walrand, J. (eds.) GameSec 2012. LNCS, vol. 7638, pp. 234–247. Springer, Heidelberg (2012)
-
(2012)
GameSec 2012. LNCS
, vol.7638
, pp. 234-247
-
-
Pham, V.1
Cid, C.2
-
12
-
-
84893599604
-
A game-theoretic approach for deceiving remote operating system fingerprinting
-
Rahman, M.A., Manshaei, M.H., Al-Shaer, E.: A game-theoretic approach for deceiving remote operating system fingerprinting. In: IEEE CNS, pp. 73–81 (2013)
-
(2013)
IEEE CNS
, pp. 73-81
-
-
Rahman, M.A.1
Manshaei, M.H.2
Al-Shaer, E.3
-
13
-
-
77954703233
-
-
Tsai, J., Kiekintveld, C., Ordonez, F., Tambe, M., Rathi, S.: Iris-a tool for strategic security allocation in transportation networks (2009)
-
(2009)
Iris-a tool for strategic security allocation in transportation networks
-
-
Tsai, J.1
Kiekintveld, C.2
Ordonez, F.3
Tambe, M.4
Rathi, S.5
|