Skip to main content
  • Conference proceedings
  • © 2018

Decision and Game Theory for Security

9th International Conference, GameSec 2018, Seattle, WA, USA, October 29–31, 2018, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 11199)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): GameSec: International Conference on Decision and Game Theory for Security

Conference proceedings info: GameSec 2018.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (36 papers)

  1. Front Matter

    Pages I-XIII
  2. Impact of Privacy on Free Online Service Markets

    • Chong Huang, Lalitha Sankar
    Pages 1-21
  3. Cyber-Warranties as a Quality Signal for Information Security Products

    • Daniel W. Woods, Andrew C. Simpson
    Pages 22-37
  4. Training Set Camouflage

    • Ayon Sen, Scott Alfeld, Xuezhou Zhang, Ara Vartanian, Yuzhe Ma, Xiaojin Zhu
    Pages 59-79
  5. Multi-stage Dynamic Information Flow Tracking Game

    • Shana Moothedath, Dinuka Sahabandu, Andrew Clark, Sangho Lee, Wenke Lee, Radha Poovendran
    Pages 80-101
  6. Optimal Placement of Honeypots for Network Defense

    • Mark Bilinski, Ryan Gabrys, Justin Mauger
    Pages 115-126
  7. Perfectly Secure Message Transmission Against Rational Timid Adversaries

    • Maiki Fujita, Kenji Yasunaga, Takeshi Koshiba
    Pages 127-144
  8. Reinforcement Learning for Autonomous Defence in Software-Defined Networking

    • Yi Han, Benjamin I. P. Rubinstein, Tamas Abraham, Tansu Alpcan, Olivier De Vel, Sarah Erfani et al.
    Pages 145-165
  9. Colonel Blotto Game with Coalition Formation for Sharing Resources

    • Joseph L. Heyman, Abhishek Gupta
    Pages 166-185
  10. Data Poisoning Attacks in Contextual Bandits

    • Yuzhe Ma, Kwang-Sung Jun, Lihong Li, Xiaojin Zhu
    Pages 186-204
  11. A Game-Theoretic Analysis of the Adversarial Boyd-Kuramoto Model

    • Antonin Demazy, Alexander Kalloniatis, Tansu Alpcan
    Pages 248-264
  12. A Game Theoretic Analysis of the Twitter Follow-Unfollow Mechanism

    • Jundong Chen, Md Shafaeat Hossain, Matthias R. Brust, Naomi Johnson
    Pages 265-276
  13. Distributed Aggregative Games on Graphs in Adversarial Environments

    • Bahare Kiumarsi, Tamer Başar
    Pages 296-313
  14. Disappointment-Aversion in Security Games

    • Jasmin Wachter, Stefan Rass, Sandra König, Stefan Schauer
    Pages 314-325
  15. Moving Target Defense for the Placement of Intrusion Detection Systems in the Cloud

    • Sailik Sengupta, Ankur Chowdhary, Dijiang Huang, Subbarao Kambhampati
    Pages 326-345

Other Volumes

  1. Decision and Game Theory for Security

About this book

The 28 revised full papers presented together with 8 short papers were carefully reviewed and selected from 44 submissions.
Among the topical areas covered were: use of game theory; control theory; and mechanism design for security and privacy; decision making for cybersecurity and security requirements engineering; security and privacy for the Internet-of-Things; cyber-physical systems; cloud computing; resilient control systems, and critical infrastructure; pricing; economic incentives; security investments, and cyber insurance for dependable and secure systems; risk assessment and security risk management; security and privacy of wireless and mobile communications, including user location privacy; sociotechnological and behavioral approaches to security; deceptive technologies in cybersecurity and privacy; empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy; and adversarial machine learning and crowdsourcing, and the role of artificial intelligence in system security.


Editors and Affiliations

  • University of Washington, Seattle, USA

    Linda Bushnell, Radha Poovendran

  • University of Illinois at Urbana–Champaign, Urbana, USA

    Tamer Başar

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access