Skip to main content
main-content

About this book

This book constitutes the refereed proceedings of the 8th International Conference on Decision and Game Theory for Security, GameSec 2017, held in Vienna, Austria, in October 2017.
The 24 revised full papers presented together with 4 short papers were carefully reviewed and selected from 71 submissions.The papers address topics such as Game theory and mechanism design for security and privacy; Pricing and economic incentives for building dependable and secure systems; Dynamic control, learning, and optimization and approximation techniques; Decision making and decision theory for cybersecurity and security requirements engineering; Socio-technological and behavioral approaches to security; Risk assessment and risk management; Security investment and cyber insurance; Security and privacy for the Internet-of-Things (IoT), cyber-physical systems, resilient control systems; New approaches for security and privacy in cloud computing and for critical infrastructure; Security and privacy of wireless and mobile communications, including user location privacy; Game theory for intrusion detection; and Empirical and experimental studies with game-theoretic or optimization analysis for security and privacy.

Table of Contents

Frontmatter

Full Papers

Frontmatter

2017 | OriginalPaper | Chapter

Optimizing Traffic Enforcement: From the Lab to the Roads

Ariel Rosenfeld, Oleg Maksimov, Sarit Kraus

2017 | OriginalPaper | Chapter

Incentive Compatibility of Pay Per Last N Shares in Bitcoin Mining Pools

Yevhen Zolotavkin, Julian García, Carsten Rudolph

2017 | OriginalPaper | Chapter

Adaptivity in Network Interdiction

Bastián Bahamondes, José Correa, Jannik Matuschke, Gianpaolo Oriolo

2017 | OriginalPaper | Chapter

Efficient Rational Proofs for Space Bounded Computations

Matteo Campanelli, Rosario Gennaro

2017 | OriginalPaper | Chapter

Game-Theoretical Analysis of PLC System Performance in the Presence of Jamming Attacks

Yun Ai, Manav R. Bhatnagar, Michael Cheffena, Aashish Mathur, Artem Sedakov

2017 | OriginalPaper | Chapter

Secure Sensor Design for Cyber-Physical Systems Against Advanced Persistent Threats

Muhammed O. Sayin, Tamer Başar

2017 | OriginalPaper | Chapter

An Ultimatum Game Model for the Evolution of Privacy in Jointly Managed Content

Sarah Rajtmajer, Anna Squicciarini, Jose M. Such, Justin Semonsen, Andrew Belmonte

2017 | OriginalPaper | Chapter

The U.S. Vulnerabilities Equities Process: An Economic Perspective

Tristan Caulfield, Christos Ioannidis, David Pym

2017 | OriginalPaper | Chapter

A Stackelberg Game Model for Botnet Data Exfiltration

Thanh Nguyen, Michael P. Wellman, Satinder Singh

2017 | OriginalPaper | Chapter

Optimal Strategies for Detecting Data Exfiltration by Internal and External Attackers

Karel Durkota, Viliam Lisý, Christopher Kiekintveld, Karel Horák, Branislav Bošanský, Tomáš Pevný

2017 | OriginalPaper | Chapter

Building Real Stackelberg Security Games for Border Patrols

Victor Bucarey, Carlos Casorrán, Óscar Figueroa, Karla Rosas, Hugo Navarrete, Fernando Ordóñez

2017 | OriginalPaper | Chapter

Strategic Defense Against Deceptive Civilian GPS Spoofing of Unmanned Aerial Vehicles

Tao Zhang, Quanyan Zhu

2017 | OriginalPaper | Chapter

A Game Theoretical Model for Optimal Distribution of Network Security Resources

Ziad Ismail, Christophe Kiennert, Jean Leneutre, Lin Chen

2017 | OriginalPaper | Chapter

Game-Theoretic Goal Recognition Models with Applications to Security Domains

Samuel Ang, Hau Chan, Albert Xin Jiang, William Yeoh

2017 | OriginalPaper | Chapter

Manipulating Adversary’s Belief: A Dynamic Game Approach to Deception by Design for Proactive Network Security

Karel Horák, Quanyan Zhu, Branislav Bošanský

2017 | OriginalPaper | Chapter

A Stochastic Game-Theoretic Model for Smart Grid Communication Networks

Xiaobing He, Hermann de Meer

2017 | OriginalPaper | Chapter

A Stackelberg Game and Markov Modeling of Moving Target Defense

Xiaotao Feng, Zizhan Zheng, Prasant Mohapatra, Derya Cansever

2017 | OriginalPaper | Chapter

Proactive Defense Against Physical Denial of Service Attacks Using Poisson Signaling Games

Jeffrey Pawlick, Quanyan Zhu

2017 | OriginalPaper | Chapter

A Large-Scale Markov Game Approach to Dynamic Protection of Interdependent Infrastructure Networks

Linan Huang, Juntao Chen, Quanyan Zhu

2017 | OriginalPaper | Chapter

VIOLA: Video Labeling Application for Security Domains

Elizabeth Bondi, Fei Fang, Debarun Kar, Venil Noronha, Donnabell Dmello, Milind Tambe, Arvind Iyer, Robert Hannaford

2017 | OriginalPaper | Chapter

On the Economics of Ransomware

Aron Laszka, Sadegh Farhang, Jens Grossklags

2017 | OriginalPaper | Chapter

Deterrence of Cyber Attackers in a Three-Player Behavioral Game

Jinshu Cui, Heather Rosoff, Richard S. John

2017 | OriginalPaper | Chapter

Information Leakage Games

Mário S. Alvim, Konstantinos Chatzikokolakis, Yusuke Kawamoto, Catuscia Palamidessi

2017 | OriginalPaper | Chapter

Optimal Patrol Planning for Green Security Games with Black-Box Attackers

Haifeng Xu, Benjamin Ford, Fei Fang, Bistra Dilkina, Andrew Plumptre, Milind Tambe, Margaret Driciru, Fred Wanyama, Aggrey Rwetsiba, Mustapha Nsubaga, Joshua Mabonga

Short Papers

Frontmatter

2017 | OriginalPaper | Chapter

Security Games with Probabilistic Constraints on the Agent’s Strategy

Corine M. Laan, Ana Isabel Barros, Richard J. Boucherie, Herman Monsuur

2017 | OriginalPaper | Chapter

On the Cost of Game Playing: How to Control the Expenses in Mixed Strategies

Stefan Rass, Sandra König, Stefan Schauer

2017 | OriginalPaper | Chapter

Dynamics of Strategic Protection Against Virus Propagation in Heterogeneous Complex Networks

Yezekael Hayel, Quanyan Zhu

2017 | OriginalPaper | Chapter

Three Layer Game Theoretic Decision Framework for Cyber-Investment and Cyber-Insurance

Deepak K. Tosh, Iman Vakilinia, Sachin Shetty, Shamik Sengupta, Charles A. Kamhoua, Laurent Njilla, Kevin Kwiat

Backmatter

Additional information

Premium Partner

Neuer Inhalt
image credits