Sciweavers

Share
6 search results - page 1 / 2
» Exploring Information Asymmetry in Two-Stage Security Games
Sort
View
AAAI
2015
4 years 4 months ago
Exploring Information Asymmetry in Two-Stage Security Games
Stackelberg security games have been widely deployed to protect real-world assets. The main solution concept there is the Strong Stackelberg Equilibrium (SSE), which optimizes the...
Haifeng Xu, Zinovi Rabinovich, Shaddin Dughmi, Mil...
NOSSDAV
2005
Springer
10 years 1 months ago
Mitigating information exposure to cheaters in real-time strategy games
Cheating in on-line games is a prevalent problem for both game makers and players. The popular real-time strategy game genre is especially vulnerable to cheats, as it is frequentl...
Chris Chambers, Wu-chang Feng, Wu-chi Feng, Debanj...
CHI
2009
ACM
10 years 8 months ago
Lessons from brain age on persuasion for computer security
Users generally have difficulty understanding and managing computer security tasks. We examined Nintendo's Brain Age games for ways to help users remember more secure passwor...
Alain Forget, Sonia Chiasson, Robert Biddle
COLCOM
2008
IEEE
10 years 2 months ago
Incentive and Trust Issues in Assured Information Sharing
Assured information sharing among different organizations in a coalitional environment is an important first step in accomplishing many critical tasks. For example, different secur...
Ryan Layfield, Murat Kantarcioglu, Bhavani M. Thur...
GAMESEC
2010
244views Game Theory» more  GAMESEC 2010»
9 years 6 months ago
The Password Game: Negative Externalities from Weak Password Practices
The combination of username and password is widely used as a human authentication mechanism on the Web. Despite this universal adoption and despite their long tradition, password s...
Sören Preibusch, Joseph Bonneau
books