List of Accepted Papers
- Digital Trust Games: An Experimental Study
Tansu Alpcan (Technical University of Berlin, Germany), Albert Levi (Sabanci University, Turkey) and Erkay Savas (Sabanci University, Turkey) - Node Capture Games: A Game Theoretic Approach to Modeling and Mitigating Node Capture Attacks
Tamara Bonaci (University of Washington, Seattle, WA, USA) and Linda Bushnell (University of Washington, Seattle, WA, USA) - Colonel Blotto in the Phishing War
Pern Hui Chia (Norwegian University of Science and Technology, Norway) and John Chuang (University of California, Berkeley, CA, USA) - An asymptotic solution of Dresher's guessing game
Robbert Fokkink (Delft University of Technology, Netherlands) and Misha Stassen (Delft University of Technology, Netherlands) - Network Games with and without Synchroneity
Ahmad Termimi Ab Ghani (Tohoku University, Japan) and Kazuyuki Tanaka (Tohoku University, Japan) - Security Games with Market Insurance
Benjamin Johnson (University of California, Berkeley, CA, USA), Rainer Boehme (Muenster University, Germany) and Jens Grossklags (Pennsylvania State University, PA, USA) - Investment in Privacy-Preserving Technologies under Uncertainty
Murat Kantarcioglu (University of Texas at Dallas, TX, USA), Alain Bensoussan(University of Texas at Dallas, TX, USA) and Celine Hoe (University of Texas at Dallas, TX, USA) - Interplay between security providers, consumers, and attackers: a weighted congestion game approach
Patrick Maille (Telecom Bretagne, France), Peter Reichl (Telecommunications Research Center Vienna, Austria) and Bruno Tuffin (INRIA, France) - Aegis: A Novel Cyber-Insurance Model
Ranjan Pal (University of Southern California, CA, USA), Leana Golubchik (University of Southern California, CA, USA) and Konstantinos Psounis (University of Southern California, CA, USA) - Modeling Internet Security Investments: Dealing With Topological Information Uncertainty
Ranjan Pal (University of Southern California, CA, USA) and Pan Hui (Deutsch Telekom, Germany) - Maximizing Influence in Competitive Environments: A Game-Theoretic Apporach
Radha Poovendran (University of Washington, Seattle, WA, USA) and Andrew Clark (University of Washington, Seattle, WA, USA) - Collaborative Location Privacy with Rational Users
Francisco Santos (Ecole Polytechnique Federale de Lausanne, Switzerland), Mathias Humbert (Ecole Polytechnique Federale de Lausanne, Switzerland), Reza Shokri (Ecole Polytechnique Federale de Lausanne, Switzerland) and Jean-Pierre Hubaux (Ecole Polytechnique Federale de Lausanne, Switzerland) - An Anti-Jamming Strategy for Channel Access in Cognitive Radio Networks
Shabnam Sodagari (Virginia Tech, VA, USA) and Charles Clancy (Virginia Tech, VA, USA) - Exploiting Adversary's Risk Profiles in Imperfect Information Security Games
Gabriel Stocco (Dartmouth College, NH, USA) and George Cybenko (Dartmouth College, NH, USA) - Multi-variate Quickest Detection of Significant Change Process
Krzysztof Szajowski (Wroclaw University of Technology, Poland) - Indices of Power in Optimal IDS Default Conguration: Theory and Examples
Quanyan Zhu (University of Illinois at Urbana-Champaign, IL, USA) and Tamer Basar (University of Illinois at Urbana-Champaign, IL, USA)