-
2
-
-
85160733561
-
-
Hackmageddon.com, accessed october 2013
-
Hackmageddon.com, http://hackmageddon.com/ (accessed october 2013)
-
-
-
-
3
-
-
3242743529
-
Losses, gains, and hyperbolic discounting: An experimental approach to information security attitudes and behavior
-
Acquisti, A., Grossklags, J.: Losses, gains, and hyperbolic discounting: An experimental approach to information security attitudes and behavior. In: Proc. of the 2nd AnnualWorkshop on Economics and Information Security (WEIS 2003), vol. 3 (2003)
-
(2003)
Proc. of the 2Nd Annualworkshop on Economics and Information Security (WEIS 2003)
, vol.3
-
-
Acquisti, A.1
Grossklags, J.2
-
5
-
-
57349198694
-
Secure or insure?: A game-theoretic analysis of information security games
-
ACM
-
Grossklags, J., Christin, N., Chuang, J.: Secure or insure?: a game-theoretic analysis of information security games. In: Proc. of the 17th International Conference on World Wide Web (WWW 2008), pp. 209–218. ACM (2008)
-
(2008)
Proc. of the 17Th International Conference on World Wide Web (WWW 2008)
, pp. 209-218
-
-
Grossklags, J.1
Christin, N.2
Chuang, J.3
-
6
-
-
84884645549
-
Payoffs, intensionality and abstraction in games
-
In: Coecke, B., Ong, L., Panangaden, P. (eds.), Springer, Heidelberg
-
Hankin, C., Malacaria, P.: Payoffs, intensionality and abstraction in games. In: Coecke, B., Ong, L., Panangaden, P. (eds.) Abramsky Festschrift. LNCS, vol. 7860, pp. 69–82. Springer, Heidelberg (2013)
-
(2013)
Abramsky Festschrift. LNCS
, vol.7860
, pp. 69-82
-
-
Hankin, C.1
Malacaria, P.2
-
7
-
-
84869594963
-
Nash equilibria for weakest target security games with heterogeneous agents
-
In: Jain, R., Kannan, R. (eds.), Springer, Heidelberg
-
Johnson, B., Grossklags, J., Christin, N., Chuang, J.: Nash equilibria for weakest target security games with heterogeneous agents. In: Jain, R., Kannan, R. (eds.) Gamenets 2011. LNICST, vol. 75, pp. 444–458. Springer, Heidelberg (2012)
-
(2012)
Gamenets 2011. LNICST
, vol.75
, pp. 444-458
-
-
Johnson, B.1
Grossklags, J.2
Christin, N.3
Chuang, J.4
-
8
-
-
75749151318
-
Games of fixed rank: A hierarchy of bimatrix games
-
Kannan, R., Theobald, T.: Games of fixed rank: A hierarchy of bimatrix games. Economic Theory 42(1), 157–173 (2005)
-
(2005)
Economic Theory
, vol.42
, Issue.1
, pp. 157-173
-
-
Kannan, R.1
Theobald, T.2
-
9
-
-
84888318163
-
Security games with interval uncertainty
-
International Foundation for Autonomous Agents and Multiagent Systems, Richland
-
Kiekintveld, C., Islam, T., Kreinovich, V.: Security games with interval uncertainty. In: Proc. of the 12th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2013), pp. 231–238. International Foundation for Autonomous Agents and Multiagent Systems, Richland (2013)
-
(2013)
Proc. of the 12Th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2013)
, pp. 231-238
-
-
Kiekintveld, C.1
Islam, T.2
Kreinovich, V.3
-
10
-
-
84899860443
-
Computing optimal randomized resource allocations for massive security games
-
Kiekintveld, C., Jain, M., Tsai, J., Pita, J., Ordóñez, F., Tambe, M.: Computing optimal randomized resource allocations for massive security games. In: Proc. of the 8th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2013), pp. 689–696 (2009)
-
(2009)
Proc. of the 8Th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2013)
, pp. 689-696
-
-
Kiekintveld, C.1
Jain, M.2
Tsai, J.3
Pita, J.4
Ordóñez, F.5
Tambe, M.6
-
11
-
-
80053417640
-
Stackelberg vs. Nash in security games: An extended investigation of interchangeability, equivalence, and uniqueness
-
Korzhyk, D., Yin, Z., Kiekintveld, C., Conitzer, V., Tambe, M.: Stackelberg vs. nash in security games: An extended investigation of interchangeability, equivalence, and uniqueness. Journal of Artificial Intelligence Research 41(2), 297–327 (2011)
-
(2011)
Journal of Artificial Intelligence Research
, vol.41
, Issue.2
, pp. 297-327
-
-
Korzhyk, D.1
Yin, Z.2
Kiekintveld, C.3
Conitzer, V.4
Tambe, M.5
-
12
-
-
85160691208
-
-
Ponemon Institute LLC
-
Ponemon Institute LLC. State of web application security, http://www.ponemon.org/library/2011-cost-of-data-breach-united-states
-
State of Web Application Security
-
-
-
14
-
-
84893156993
-
Game theory meets network security and privacy
-
Manshaei, M., Zhu, Q., Alpcan, T., Basar, T., Hubaux, J.: Game theory meets network security and privacy. ACM Transactions on Computational Logic, 251-253 (2011)
-
(2011)
ACM Transactions on Computational Logic
, pp. 251-253
-
-
Manshaei, M.1
Zhu, Q.2
Alpcan, T.3
Basar, T.4
Hubaux, J.5
|