Game Theory for Security

[1]  John S. Baras,et al.  Decision and Game Theory for Security , 2010, Lecture Notes in Computer Science.

[2]  N. Bambos,et al.  Security investment games of interdependent organizations , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.

[3]  Sajal K. Das,et al.  gPath: A Game-Theoretic Path Selection Algorithm to Protect Tor's Anonymity , 2010, GameSec.

[4]  Tansu Alpcan,et al.  Network Security , 2010 .

[5]  Tansu Alpcan,et al.  Adversarial behavior in network mechanism design , 2011, VALUETOOLS.

[6]  Aaron Roth,et al.  The Price of Malice in Linear Congestion Games , 2008, WINE.

[7]  Murat Kantarcioglu,et al.  Investment in Privacy-Preserving Technologies under Uncertainty , 2011, GameSec.

[8]  R. Srikant,et al.  Correlated Jamming on MIMO Gaussian Fading Channels , 2004, IEEE Trans. Inf. Theory.

[9]  Christopher Leckie,et al.  Using Virtual Machine Allocation Policies to Defend against Co-Resident Attacks in Cloud Computing , 2017, IEEE Transactions on Dependable and Secure Computing.

[10]  Jean C. Walrand,et al.  Design of Network Topology in an Adversarial Environment , 2010, GameSec.

[11]  Krzysztof Szajowski Multi-variate Quickest Detection of Significant Change Process , 2011, GameSec.

[12]  Quanyan Zhu,et al.  Game theory meets network security and privacy , 2013, CSUR.

[13]  Rong Yang,et al.  Improving resource allocation strategies against human adversaries in security games: An extended study , 2013, Artif. Intell..

[14]  Jean-Pierre Hubaux,et al.  Security and Cooperation in Wireless Networks , 2007, ESAS.

[15]  Murali S. Kodialam,et al.  Detecting network intrusions via sampling: a game theoretic approach , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[16]  M. Naceur Azaiez,et al.  Game Theoretic Risk Analysis of Security Threats , 2009 .

[17]  Tansu Alpcan,et al.  Dynamic Control and Mitigation of Interdependent IT Security Risks , 2010, 2010 IEEE International Conference on Communications.

[18]  Sarit Kraus,et al.  Using Game Theory for Los Angeles Airport Security , 2009, AI Mag..

[19]  Jens Zander,et al.  Jamming games in slotted Aloha packet radio networks , 1990, IEEE Conference on Military Communications.

[20]  Seth D. Guikema,et al.  Game Theory Models of Intelligent Actors in Reliability Analysis: An Overview of the State of the Art , 2009 .

[21]  Marimuthu Palaniswami,et al.  Security games for voltage control in smart grid , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[22]  Eitan Altman,et al.  Adversarial Control in a Delay Tolerant Network , 2010, GameSec.

[23]  Milind Tambe,et al.  Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned , 2011 .