Advertisement

Decision and Game Theory for Security

7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings

  • Quanyan Zhu
  • Tansu Alpcan
  • Emmanouil Panaousis
  • Milind Tambe
  • William Casey

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9996)

Also part of the Security and Cryptology book sub series (LNSC, volume 9996)

Table of contents

  1. Front Matter
    Pages I-XI
  2. Network Security

    1. Front Matter
      Pages 1-1
    2. Eitan Altman, Aniruddha Singhal, Corinne Touati, Jie Li
      Pages 3-17
    3. Hayreddin Çeker, Jun Zhuang, Shambhu Upadhyaya, Quang Duy La, Boon-Hee Soong
      Pages 18-38
    4. Sara Marie Mc Carthy, Arunesh Sinha, Milind Tambe, Pratyusa Manadhata
      Pages 39-61
    5. Eirini Eleni Tsiropoulou, John S. Baras, Symeon Papavassiliou, Gang Qu
      Pages 62-80
  3. Security Risks and Investments

    1. Front Matter
      Pages 81-81
    2. Renaud Chicoisne, Fernando Ordóñez
      Pages 83-100
    3. Ashish R. Hota, Abraham A. Clements, Shreyas Sundaram, Saurabh Bagchi
      Pages 101-113
    4. Zhengyuan Zhou, Nicholas Bambos, Peter Glynn
      Pages 114-126
  4. Special Track-Validating Models

    1. Front Matter
      Pages 127-127
    2. Steve Alpern, Thomas Lidbetter, Alec Morton, Katerina Papadaki
      Pages 129-138
    3. Ayan Mukhopadhyay, Chao Zhang, Yevgeniy Vorobeychik, Milind Tambe, Kenneth Pence, Paul Speer
      Pages 139-158
  5. Decision Making for Privacy

    1. Front Matter
      Pages 173-173
    2. Tristan Caulfield, Christos Ioannidis, David Pym
      Pages 175-194
    3. M. Kıvanç Mıhçak, Emrah Akyol, Tamer Başar, Cédric Langbort
      Pages 215-234
    4. Chris Culnane, Vanessa Teague
      Pages 235-247
  6. Security Games

    1. Front Matter
      Pages 249-249
    2. Anjon Basak, Fei Fang, Thanh Hong Nguyen, Christopher Kiekintveld
      Pages 251-271
    3. Shahrzad Gholami, Bryan Wilder, Matthew Brown, Dana Thomas, Nicole Sintov, Milind Tambe
      Pages 272-293
    4. Mohammad A. Noureddine, Ahmed Fawaz, William H. Sanders, Tamer Başar
      Pages 294-313
  7. Incentives and Cybersecurity Mechanisms

    1. Front Matter
      Pages 327-327
    2. Gabrielle Anderson, Guy McCusker, David Pym
      Pages 370-381
    3. Amin Mohammadi, Mohammad Hossein Manshaei, Monireh Mohebbi Moghaddam, Quanyan Zhu
      Pages 382-394
  8. Intrusion Detection and Information Limitations in Security

    1. Front Matter
      Pages 395-395
    2. Marcin Dziubiński, Piotr Sankowski, Qiang Zhang
      Pages 397-414
    3. Amin Ghafouri, Waseem Abbas, Aron Laszka, Yevgeniy Vorobeychik, Xenofon Koutsoukos
      Pages 415-434
    4. Kassem Kallas, Benedetta Tondi, Riccardo Lazzeretti, Mauro Barni
      Pages 455-466
  9. Back Matter
    Pages 467-478

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 7th International Conference on Decision and Game Theory for Security, GameSec 2016, held in New York, NY, USA, in November 2016.

The 18 revised full papers presented together with 8 short papers and 5 poster papers were carefully reviewed and selected from 40 submissions. The papers are organized in topical sections on network security; security risks and investments; special track-validating models; decision making for privacy; security games; incentives and cybersecurity mechanisms; and intrusion detection and information limitations in security.

Keywords

adversarial modeling decision making for privacy intrusion detection security games security risk assessment cloud security cyber-physical systems DoS attacks game theory honeypot human behavior model internet of controlled things network security physical surveillance privacy enhancing technology risk minimization security economics social network survival analysis validating models

Editors and affiliations

  • Quanyan Zhu
    • 1
  • Tansu Alpcan
    • 2
  • Emmanouil Panaousis
    • 3
  • Milind Tambe
    • 4
  • William Casey
    • 5
  1. 1.New York University New YorkUSA
  2. 2.The University of Melbourne MelbourneAustralia
  3. 3.University of Brighton BrightonUnited Kingdom
  4. 4.University of Southern California Los AngelesUSA
  5. 5.Carnegie Mellon University PittsburghUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-47413-7
  • Copyright Information Springer International Publishing AG 2016
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-47412-0
  • Online ISBN 978-3-319-47413-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site