Decision and Game Theory for Security

First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings

Editors:

ISBN: 978-3-642-17196-3 (Print) 978-3-642-17197-0 (Online)

Table of contents (18 chapters)

  1. Front Matter

    Pages -

  2. Security Investments and Planning

    1. No Access

      Book Chapter

      Pages 1-20

      Design of Network Topology in an Adversarial Environment

    2. No Access

      Book Chapter

      Pages 21-37

      Optimal Information Security Investment with Penetration Testing

  3. Privacy and Anonymity

    1. No Access

      Book Chapter

      Pages 38-57

      Tracking Games in Mobile Networks

    2. No Access

      Book Chapter

      Pages 58-71

      gPath: A Game-Theoretic Path Selection Algorithm to Protect Tor’s Anonymity

    3. No Access

      Book Chapter

      Pages 72-86

      When Do Firms Invest in Privacy-Preserving Technologies?

  4. Adversarial and Robust Control

    1. No Access

      Book Chapter

      Pages 87-106

      Adversarial Control in a Delay Tolerant Network

    2. No Access

      Book Chapter

      Pages 107-122

      Security Interdependencies for Networked Control Systems with Identical Agents

    3. No Access

      Book Chapter

      Pages 123-134

      Robust Control in Sparse Mobile Ad-Hoc Networks

  5. Network Security and Botnets

    1. No Access

      Book Chapter

      Pages 135-148

      A Game-Theoretical Approach for Finding Optimal Strategies in a Botnet Defense Model

    2. No Access

      Book Chapter

      Pages 149-167

      ISPs and Ad Networks Against Botnet Ad Fraud

    3. No Access

      Book Chapter

      Pages 168-179

      A Localization Game in Wireless Sensor Networks

    4. No Access

      Book Chapter

      Pages 180-191

      Effective Multimodel Anomaly Detection Using Cooperative Negotiation

  6. Authorization and Authentication

    1. No Access

      Book Chapter

      Pages 192-207

      The Password Game: Negative Externalities from Weak Password Practices

    2. No Access

      Book Chapter

      Pages 208-219

      Towards a Game Theoretic Authorisation Model

  7. Theory and Algorithms for Security

    1. No Access

      Book Chapter

      Pages 220-233

      Disperse or Unite? A Mathematical Model of Coordinated Attack

    2. No Access

      Book Chapter

      Pages 234-244

      Uncertainty in Interdependent Security Games

    3. No Access

      Book Chapter

      Pages 245-256

      Attack–Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent

    4. No Access

      Book Chapter

      Pages 257-265

      Methods and Algorithms for Infinite Bayesian Stackelberg Security Games

  8. Back Matter

    Pages -