GameSec 2011

Conference on Decision and Game Theory for Security

November 14-15, 2011, College Park, Maryland, USA

List of Accepted Papers

  • Digital Trust Games: An Experimental Study
    Tansu Alpcan (Technical University of Berlin, Germany), Albert Levi (Sabanci University, Turkey) and Erkay Savas (Sabanci University, Turkey)

  • Node Capture Games: A Game Theoretic Approach to Modeling and Mitigating Node Capture Attacks
    Tamara Bonaci (University of Washington, Seattle, WA, USA) and Linda Bushnell (University of Washington, Seattle, WA, USA)

  • Colonel Blotto in the Phishing War
    Pern Hui Chia (Norwegian University of Science and Technology, Norway) and John Chuang (University of California, Berkeley, CA, USA)

  • An asymptotic solution of Dresher's guessing game
    Robbert Fokkink (Delft University of Technology, Netherlands) and Misha Stassen (Delft University of Technology, Netherlands)

  • Network Games with and without Synchroneity
    Ahmad Termimi Ab Ghani (Tohoku University, Japan) and Kazuyuki Tanaka (Tohoku University, Japan)

  • Security Games with Market Insurance
    Benjamin Johnson (University of California, Berkeley, CA, USA), Rainer Boehme (Muenster University, Germany) and Jens Grossklags (Pennsylvania State University, PA, USA)

  • Investment in Privacy-Preserving Technologies under Uncertainty
    Murat Kantarcioglu (University of Texas at Dallas, TX, USA), Alain Bensoussan(University of Texas at Dallas, TX, USA) and Celine Hoe (University of Texas at Dallas, TX, USA)

  • Interplay between security providers, consumers, and attackers: a weighted congestion game approach
    Patrick Maille (Telecom Bretagne, France), Peter Reichl (Telecommunications Research Center Vienna, Austria) and Bruno Tuffin (INRIA, France)

  • Aegis: A Novel Cyber-Insurance Model
    Ranjan Pal (University of Southern California, CA, USA), Leana Golubchik (University of Southern California, CA, USA) and Konstantinos Psounis (University of Southern California, CA, USA)

  • Modeling Internet Security Investments: Dealing With Topological Information Uncertainty
    Ranjan Pal (University of Southern California, CA, USA) and Pan Hui (Deutsch Telekom, Germany)

  • Maximizing Influence in Competitive Environments: A Game-Theoretic Apporach
    Radha Poovendran (University of Washington, Seattle, WA, USA) and Andrew Clark (University of Washington, Seattle, WA, USA)

  • Collaborative Location Privacy with Rational Users
    Francisco Santos (Ecole Polytechnique Federale de Lausanne, Switzerland), Mathias Humbert (Ecole Polytechnique Federale de Lausanne, Switzerland), Reza Shokri (Ecole Polytechnique Federale de Lausanne, Switzerland) and Jean-Pierre Hubaux (Ecole Polytechnique Federale de Lausanne, Switzerland)

  • An Anti-Jamming Strategy for Channel Access in Cognitive Radio Networks
    Shabnam Sodagari (Virginia Tech, VA, USA) and Charles Clancy (Virginia Tech, VA, USA)

  • Exploiting Adversary's Risk Profiles in Imperfect Information Security Games
    Gabriel Stocco (Dartmouth College, NH, USA) and George Cybenko (Dartmouth College, NH, USA)

  • Multi-variate Quickest Detection of Significant Change Process
    Krzysztof Szajowski (Wroclaw University of Technology, Poland)

  • Indices of Power in Optimal IDS Default Conguration: Theory and Examples
    Quanyan Zhu (University of Illinois at Urbana-Champaign, IL, USA) and Tamer Basar (University of Illinois at Urbana-Champaign, IL, USA)