Decision and game theory for security : First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010 : proceedings

Security Investments and Planning.- Design of Network Topology in an Adversarial Environment.- Optimal Information Security Investment with Penetration Testing.- Privacy and Anonymity.- Tracking Games in Mobile Networks.- gPath: A Game-Theoretic Path Selection Algorithm to Protect Tor's Anonymity.- When Do Firms Invest in Privacy-Preserving Technologies?.- Adversarial and Robust Control.- Adversarial Control in a Delay Tolerant Network.- Security Interdependencies for Networked Control Systems with Identical Agents.- Robust Control in Sparse Mobile Ad-Hoc Networks.- Network Security and Botnets.- A Game-Theoretical Approach for Finding Optimal Strategies in a Botnet Defense Model.- ISPs and Ad Networks Against Botnet Ad Fraud.- A Localization Game in Wireless Sensor Networks.- Effective Multimodel Anomaly Detection Using Cooperative Negotiation.- Authorization and Authentication.- The Password Game: Negative Externalities from Weak Password Practices.- Towards a Game Theoretic Authorisation Model.- Theory and Algorithms for Security.- Disperse or Unite? A Mathematical Model of Coordinated Attack.- Uncertainty in Interdependent Security Games.- Attack-Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent.- Methods and Algorithms for Infinite Bayesian Stackelberg Security Games.