Decision and Game Theory for Security

4th International Conference, GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013. Proceedings

  • Sajal K. Das
  • Cristina Nita-Rotaru
  • Murat Kantarcioglu

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8252)

Table of contents

  1. Front Matter
  2. Mohsen Alimomeni, Reihaneh Safavi-Naini, Setareh Sharifian
    Pages 10-28
  3. S. Anand, Ofer Arazy, Narayan B. Mandayam, Oded Nov
    Pages 29-44
  4. Carlos Barreto, Alvaro A. Cárdenas, Nicanor Quijano
    Pages 45-64
  5. Jeremiah Blocki, Nicolas Christin, Anupam Datta, Arunesh Sinha
    Pages 65-84
  6. Lanah Evers, Ana Isabel Barros, Herman Monsuur
    Pages 85-98
  7. Yi Han, Tansu Alpcan, Jeffrey Chan, Christopher Leckie
    Pages 99-118
  8. Albert Xin Jiang, Thanh H. Nguyen, Milind Tambe, Ariel D. Procaccia
    Pages 119-139
  9. Aron Laszka, Benjamin Johnson, Jens Grossklags
    Pages 175-191
  10. Wenlian Lu, Shouhuai Xu, Xinlei Yi
    Pages 206-225
  11. John Ross Wallrabenstein, Chris Clifton
    Pages 226-245
  12. Back Matter

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 4th International Conference on Decision and Game Theory for Security, GameSec 2013, held in Fort Worth, TX, USA, in November 2013. The 15 revised full papers presented were carefully reviewed and selected from numerous submissions. The conference focuses on analytical models based on game, information, communication, optimization, decision, and control theories that are applied to diverse security topics. At the same time, the connection between theoretical models and real world security problems are emphasized to establish the important feedback loop between theory and practice. Observing the scarcity of venues for researchers who try to develop a deeper theoretical understanding of the underlying incentive and resource allocation issues in security, we believe that GameSec will fill an important void and serve as a distinguished forum of highest standards for years to come.

Keywords

active cyber defense cloud computing cyber security model probabilistic modeling rational multiparty computation

Editors and affiliations

  • Sajal K. Das
    • 1
  • Cristina Nita-Rotaru
    • 2
  • Murat Kantarcioglu
    • 3
  1. 1.Department of Computer ScienceMissouri University of Science and TechnologyRollaUSA
  2. 2.Department of Computer SciencePurdue UniversityWest LafayetteUSA
  3. 3.Data Seurity and Privacs LabUniversity of Texas at DallasRichardsonUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-02786-9
  • Copyright Information Springer International Publishing Switzerland 2013
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-02785-2
  • Online ISBN 978-3-319-02786-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book