Skip to main content
  • Conference proceedings
  • © 2017

Decision and Game Theory for Security

8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 10575)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): GameSec: International Conference on Decision and Game Theory for Security

Conference proceedings info: GameSec 2017.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (28 papers)

  1. Front Matter

    Pages I-XI
  2. Full Papers

    1. Front Matter

      Pages 1-1
    2. Optimizing Traffic Enforcement: From the Lab to the Roads

      • Ariel Rosenfeld, Oleg Maksimov, Sarit Kraus
      Pages 3-20
    3. Incentive Compatibility of Pay Per Last N Shares in Bitcoin Mining Pools

      • Yevhen Zolotavkin, Julian García, Carsten Rudolph
      Pages 21-39
    4. Adaptivity in Network Interdiction

      • Bastián Bahamondes, José Correa, Jannik Matuschke, Gianpaolo Oriolo
      Pages 40-52
    5. Efficient Rational Proofs for Space Bounded Computations

      • Matteo Campanelli, Rosario Gennaro
      Pages 53-73
    6. Game-Theoretical Analysis of PLC System Performance in the Presence of Jamming Attacks

      • Yun Ai, Manav R. Bhatnagar, Michael Cheffena, Aashish Mathur, Artem Sedakov
      Pages 74-90
    7. An Ultimatum Game Model for the Evolution of Privacy in Jointly Managed Content

      • Sarah Rajtmajer, Anna Squicciarini, Jose M. Such, Justin Semonsen, Andrew Belmonte
      Pages 112-130
    8. The U.S. Vulnerabilities Equities Process: An Economic Perspective

      • Tristan Caulfield, Christos Ioannidis, David Pym
      Pages 131-150
    9. A Stackelberg Game Model for Botnet Data Exfiltration

      • Thanh Nguyen, Michael P. Wellman, Satinder Singh
      Pages 151-170
    10. Optimal Strategies for Detecting Data Exfiltration by Internal and External Attackers

      • Karel Durkota, Viliam Lisý, Christopher Kiekintveld, Karel Horák, Branislav Bošanský, Tomáš Pevný
      Pages 171-192
    11. Building Real Stackelberg Security Games for Border Patrols

      • Victor Bucarey, Carlos Casorrán, Óscar Figueroa, Karla Rosas, Hugo Navarrete, Fernando Ordóñez
      Pages 193-212
    12. A Game Theoretical Model for Optimal Distribution of Network Security Resources

      • Ziad Ismail, Christophe Kiennert, Jean Leneutre, Lin Chen
      Pages 234-255
    13. Game-Theoretic Goal Recognition Models with Applications to Security Domains

      • Samuel Ang, Hau Chan, Albert Xin Jiang, William Yeoh
      Pages 256-272
    14. A Stackelberg Game and Markov Modeling of Moving Target Defense

      • Xiaotao Feng, Zizhan Zheng, Prasant Mohapatra, Derya Cansever
      Pages 315-335

Other Volumes

  1. Decision and Game Theory for Security

About this book

This book constitutes the refereed proceedings of the 8th International Conference on Decision and Game Theory for Security, GameSec 2017, held in Vienna, Austria, in October 2017.


The 24 revised full papers presented together with 4 short papers were carefully reviewed and selected from 71 submissions.
The papers address topics such as Game theory and mechanism design for security and privacy; Pricing and economic incentives for building dependable and secure systems; Dynamic control, learning, and optimization and approximation techniques; Decision making and decision theory for cybersecurity and security requirements engineering; Socio-technological and behavioral approaches to security; Risk assessment and risk management; Security investment and cyber insurance; Security and privacy for the Internet-of-Things (IoT), cyber-physical systems, resilient control systems; New approaches for security and privacy in cloud computing and for critical infrastructure; Security and privacy of wireless and mobile communications, including user location privacy; Game theory for intrusion detection; and Empirical and experimental studies with game-theoretic or optimization analysis for security and privacy.

Editors and Affiliations

  • Universität Klagenfurt, Klagenfurt, Austria

    Stefan Rass

  • Nanyang Technological University, Singapore, Singapore

    Bo An

  • University of Texas at El Paso, El Paso, USA

    Christopher Kiekintveld

  • Carnegie Mellon University, Pittsburgh, USA

    Fei Fang

  • AIT Austrian Institute of Technology GmbH, Klagenfurt, Austria

    Stefan Schauer

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access