Skip to main content
  • Conference proceedings
  • © 2015

Decision and Game Theory for Security

6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 9406)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): GameSec: International Conference on Decision and Game Theory for Security

Conference proceedings info: GameSec 2015.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (21 papers)

  1. Front Matter

    Pages I-X
  2. Full Papers

    1. Front Matter

      Pages 1-1
    2. A Game-Theoretic Approach to IP Address Randomization in Decoy-Based Cyber Defense

      • Andrew Clark, Kun Sun, Linda Bushnell, Radha Poovendran
      Pages 3-21
    3. Beware the Soothsayer: From Attack Prediction Accuracy to Predictive Reliability in Security Games

      • Benjamin Ford, Thanh Nguyen, Milind Tambe, Nicole Sintov, Francesco Delle Fave
      Pages 35-56
    4. Games of Timing for Security in Dynamic Environments

      • Benjamin Johnson, Aron Laszka, Jens Grossklags
      Pages 57-73
    5. Threshold FlipThem: When the Winner Does Not Need to Take All

      • David Leslie, Chris Sherfield, Nigel P. Smart
      Pages 74-92
    6. A Game Theoretic Model for Defending Against Stealthy Attacks with Limited Resources

      • Ming Zhang, Zizhan Zheng, Ness B. Shroff
      Pages 93-112
    7. Passivity-Based Distributed Strategies for Stochastic Stackelberg Security Games

      • Phillip Lee, Andrew Clark, Basel Alomair, Linda Bushnell, Radha Poovendran
      Pages 113-129
    8. Combining Online Learning and Equilibrium Computation in Security Games

      • Richard Klíma, Viliam Lisý, Christopher Kiekintveld
      Pages 130-149
    9. Interdependent Security Games Under Behavioral Probability Weighting

      • Ashish R. Hota, Shreyas Sundaram
      Pages 150-169
    10. Making the Most of Our Regrets: Regret-Based Solutions to Handle Payoff Uncertainty and Elicitation in Green Security Games

      • Thanh H. Nguyen, Francesco M. Delle Fave, Debarun Kar, Aravind S. Lakshminarayanan, Amulya Yadav, Milind Tambe et al.
      Pages 170-191
    11. A Security Game Model for Environment Protection in the Presence of an Alarm System

      • Nicola Basilico, Giuseppe De Nittis, Nicola Gatti
      Pages 192-207
    12. Approximate Solutions for Attack Graph Games with Imperfect Information

      • Karel Durkota, Viliam Lisý, Branislav BoÅ¡anský, Christopher Kiekintveld
      Pages 228-249
    13. When the Winning Move is Not to Play: Games of Deterrence in Cyber Security

      • Chad Heitzenrater, Greg Taylor, Andrew Simpson
      Pages 250-269
    14. Sequentially Composable Rational Proofs

      • Matteo Campanelli, Rosario Gennaro
      Pages 270-288
  3. Short Papers

    1. Front Matter

      Pages 309-309
    2. Genetic Approximations for the Failure-Free Security Games

      • Aleksandr Lenin, Jan Willemson, Anton Charnamord
      Pages 311-321

Other Volumes

  1. Decision and Game Theory for Security

About this book

This book constitutes the refereed proceedings of the 6th International Conference on Decision and Game Theory for Security, GameSec 2015, held in London, UK, in November 2015.

The 16 revised full papers presented together with 5 short papers were carefully reviewed and selected from 37 submissions. Game and decision theory has emerged as a valuable systematic framework with powerful analytical tools in dealing with the intricacies involved in making sound and sensible security decisions. For instance, game theory provides methodical approaches to account for interdependencies of security decisions, the role of hidden and asymmetric information, the perception of risks and costs in human behaviour, the incentives/limitations of the attackers, and much more. Combined with our classical approach to computer and network security, and drawing from various fields such as economic, social and behavioural sciences, game and decision theory is playing a fundamental role in the development of the pillars of the "science of security".


Editors and Affiliations

  • Queen Mary University of London, London, United Kingdom

    MHR Khouzani

  • University of Brighton, Brighton, United Kingdom

    Emmanouil Panaousis

  • Cardiff University, Cardiff, United Kingdom

    George Theodorakopoulos

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access