Skip to main content
  • Conference proceedings
  • © 2017

Decision and Game Theory for Security

8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 10575)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): GameSec: International Conference on Decision and Game Theory for Security

Conference proceedings info: GameSec 2017.

Buying options

eBook USD 79.99
Price excludes VAT (USA)
  • ISBN: 978-3-319-68711-7
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 99.99
Price excludes VAT (USA)

This is a preview of subscription content, access via your institution.

Table of contents (28 papers)

  1. Front Matter

    Pages I-XI
  2. Full Papers

    1. Front Matter

      Pages 1-1
    2. Optimizing Traffic Enforcement: From the Lab to the Roads

      • Ariel Rosenfeld, Oleg Maksimov, Sarit Kraus
      Pages 3-20
    3. Incentive Compatibility of Pay Per Last N Shares in Bitcoin Mining Pools

      • Yevhen Zolotavkin, Julian García, Carsten Rudolph
      Pages 21-39
    4. Adaptivity in Network Interdiction

      • Bastián Bahamondes, José Correa, Jannik Matuschke, Gianpaolo Oriolo
      Pages 40-52
    5. Efficient Rational Proofs for Space Bounded Computations

      • Matteo Campanelli, Rosario Gennaro
      Pages 53-73
    6. Game-Theoretical Analysis of PLC System Performance in the Presence of Jamming Attacks

      • Yun Ai, Manav R. Bhatnagar, Michael Cheffena, Aashish Mathur, Artem Sedakov
      Pages 74-90
    7. An Ultimatum Game Model for the Evolution of Privacy in Jointly Managed Content

      • Sarah Rajtmajer, Anna Squicciarini, Jose M. Such, Justin Semonsen, Andrew Belmonte
      Pages 112-130
    8. The U.S. Vulnerabilities Equities Process: An Economic Perspective

      • Tristan Caulfield, Christos Ioannidis, David Pym
      Pages 131-150
    9. A Stackelberg Game Model for Botnet Data Exfiltration

      • Thanh Nguyen, Michael P. Wellman, Satinder Singh
      Pages 151-170
    10. Optimal Strategies for Detecting Data Exfiltration by Internal and External Attackers

      • Karel Durkota, Viliam Lisý, Christopher Kiekintveld, Karel Horák, Branislav Bošanský, Tomáš Pevný
      Pages 171-192
    11. Building Real Stackelberg Security Games for Border Patrols

      • Victor Bucarey, Carlos Casorrán, Óscar Figueroa, Karla Rosas, Hugo Navarrete, Fernando Ordóñez
      Pages 193-212
    12. A Game Theoretical Model for Optimal Distribution of Network Security Resources

      • Ziad Ismail, Christophe Kiennert, Jean Leneutre, Lin Chen
      Pages 234-255
    13. Game-Theoretic Goal Recognition Models with Applications to Security Domains

      • Samuel Ang, Hau Chan, Albert Xin Jiang, William Yeoh
      Pages 256-272
    14. A Stackelberg Game and Markov Modeling of Moving Target Defense

      • Xiaotao Feng, Zizhan Zheng, Prasant Mohapatra, Derya Cansever
      Pages 315-335

Other Volumes

  1. Decision and Game Theory for Security

    8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings

About this book

This book constitutes the refereed proceedings of the 8th International Conference on Decision and Game Theory for Security, GameSec 2017, held in Vienna, Austria, in October 2017.

The 24 revised full papers presented together with 4 short papers were carefully reviewed and selected from 71 submissions.
The papers address topics such as Game theory and mechanism design for security and privacy; Pricing and economic incentives for building dependable and secure systems; Dynamic control, learning, and optimization and approximation techniques; Decision making and decision theory for cybersecurity and security requirements engineering; Socio-technological and behavioral approaches to security; Risk assessment and risk management; Security investment and cyber insurance; Security and privacy for the Internet-of-Things (IoT), cyber-physical systems, resilient control systems; New approaches for security and privacy in cloud computing and for critical infrastructure; Security and privacy of wireless and mobile communications, including user location privacy; Game theory for intrusion detection; and Empirical and experimental studies with game-theoretic or optimization analysis for security and privacy.

Keywords

  • game theory
  • decision making
  • security
  • privacy
  • risk assessment
  • risk management
  • network security
  • infrastructure security
  • green security
  • security investment
  • cyber insurance
  • Internet of Things (IoT)
  • data security
  • artificial intelligence
  • probability
  • telecommunication networks
  • computer crime
  • malwares
  • machine learning
  • learning algorithms

Editors and Affiliations

  • Universität Klagenfurt, Klagenfurt, Austria

    Stefan Rass

  • Nanyang Technological University, Singapore, Singapore

    Bo An

  • University of Texas at El Paso, El Paso, USA

    Christopher Kiekintveld

  • Carnegie Mellon University, Pittsburgh, USA

    Fei Fang

  • AIT Austrian Institute of Technology GmbH, Klagenfurt, Austria

    Stefan Schauer

Bibliographic Information

Buying options

eBook USD 79.99
Price excludes VAT (USA)
  • ISBN: 978-3-319-68711-7
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 99.99
Price excludes VAT (USA)