© 2018

Decision and Game Theory for Security

9th International Conference, GameSec 2018, Seattle, WA, USA, October 29–31, 2018, Proceedings

  • Linda Bushnell
  • Radha Poovendran
  • Tamer Başar
Conference proceedings GameSec 2018

Part of the Lecture Notes in Computer Science book series (LNCS, volume 11199)

Also part of the Security and Cryptology book sub series (LNSC, volume 11199)

Table of contents

  1. Front Matter
    Pages I-XIII
  2. Chong Huang, Lalitha Sankar
    Pages 1-21
  3. Daniel W. Woods, Andrew C. Simpson
    Pages 22-37
  4. Ayon Sen, Scott Alfeld, Xuezhou Zhang, Ara Vartanian, Yuzhe Ma, Xiaojin Zhu
    Pages 59-79
  5. Shana Moothedath, Dinuka Sahabandu, Andrew Clark, Sangho Lee, Wenke Lee, Radha Poovendran
    Pages 80-101
  6. Mark Bilinski, Ryan Gabrys, Justin Mauger
    Pages 115-126
  7. Maiki Fujita, Kenji Yasunaga, Takeshi Koshiba
    Pages 127-144
  8. Yi Han, Benjamin I. P. Rubinstein, Tamas Abraham, Tansu Alpcan, Olivier De Vel, Sarah Erfani et al.
    Pages 145-165
  9. Joseph L. Heyman, Abhishek Gupta
    Pages 166-185
  10. Yuzhe Ma, Kwang-Sung Jun, Lihong Li, Xiaojin Zhu
    Pages 186-204
  11. Antonin Demazy, Alexander Kalloniatis, Tansu Alpcan
    Pages 248-264
  12. Jundong Chen, Md Shafaeat Hossain, Matthias R. Brust, Naomi Johnson
    Pages 265-276
  13. Bahare Kiumarsi, Tamer Başar
    Pages 296-313
  14. Jasmin Wachter, Stefan Rass, Sandra König, Stefan Schauer
    Pages 314-325
  15. Sailik Sengupta, Ankur Chowdhary, Dijiang Huang, Subbarao Kambhampati
    Pages 326-345

About these proceedings


The 28 revised full papers presented together with 8 short papers were carefully reviewed and selected from 44 submissions.
Among the topical areas covered were: use of game theory; control theory; and mechanism design for security and privacy; decision making for cybersecurity and security requirements engineering; security and privacy for the Internet-of-Things; cyber-physical systems; cloud computing; resilient control systems, and critical infrastructure; pricing; economic incentives; security investments, and cyber insurance for dependable and secure systems; risk assessment and security risk management; security and privacy of wireless and mobile communications, including user location privacy; sociotechnological and behavioral approaches to security; deceptive technologies in cybersecurity and privacy; empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy; and adversarial machine learning and crowdsourcing, and the role of artificial intelligence in system security.


game theory security privacy decision making control and mechanism design optimization probability risk assessment risk management data security telecommunication networks nash equilibrium internet computer networks problem solving learning algorithms World Wide Web cryptography

Editors and affiliations

  1. 1.University of WashingtonSeattleUSA
  2. 2.University of WashingtonSeattleUSA
  3. 3.University of Illinois at Urbana–ChampaignUrbanaUSA

Bibliographic information