Sciweavers

GAMESEC
2010
244views Game Theory» more  GAMESEC 2010»
13 years 2 months ago
The Password Game: Negative Externalities from Weak Password Practices
The combination of username and password is widely used as a human authentication mechanism on the Web. Despite this universal adoption and despite their long tradition, password s...
Sören Preibusch, Joseph Bonneau
GAMESEC
2010
150views Game Theory» more  GAMESEC 2010»
13 years 2 months ago
Adversarial Control in a Delay Tolerant Network
We consider a multi-criteria control problem that arises in a delay tolerant network with two adversarial controllers: the source and the jammer. The source's objective is to ...
Eitan Altman, Tamer Basar, Veeraruna Kavitha
GAMESEC
2010
139views Game Theory» more  GAMESEC 2010»
13 years 2 months ago
Design of Network Topology in an Adversarial Environment
We study the strategic interaction between a network manager whose goal is to choose (as communication infrastructure) a spanning tree of a network given as an undirected graph, an...
Assane Gueye, Jean C. Walrand, Venkat Anantharam
GAMESEC
2010
136views Game Theory» more  GAMESEC 2010»
13 years 2 months ago
Effective Multimodel Anomaly Detection Using Cooperative Negotiation
Abstract. Many computer protection tools incorporate learning techniques that build mathematical models to capture the characteristics of system's activity and then check whet...
Alberto Volpatto, Federico Maggi, Stefano Zanero
GAMESEC
2010
119views Game Theory» more  GAMESEC 2010»
13 years 2 months ago
Uncertainty in Interdependent Security Games
Abstract. Even the most well-motivated models of information security have application limitations due to the inherent uncertainties involving risk. This paper exemplifies a formal...
Benjamin Johnson, Jens Grossklags, Nicolas Christi...
GAMESEC
2010
13 years 2 months ago
ISPs and Ad Networks Against Botnet Ad Fraud
Botnets are a serious threat on the Internet and require huge resources to be thwarted. ISPs are in the best position to fight botnets and there are a number of recently proposed i...
Nevena Vratonjic, Mohammad Hossein Manshaei, Maxim...
GAMESEC
2010
128views Game Theory» more  GAMESEC 2010»
13 years 2 months ago
Tracking Games in Mobile Networks
Abstract. Users of mobile networks can change their identifiers in regions called mix zones in order to defeat the attempt of third parties to track their location. Mix zones must ...
Mathias Humbert, Mohammad Hossein Manshaei, Julien...
GAMESEC
2010
117views Game Theory» more  GAMESEC 2010»
13 years 2 months ago
Attack-Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent
Attack
Barbara Kordy, Sjouke Mauw, Matthijs Melissen, Pat...
VSGAMES
2010
139views Game Theory» more  VSGAMES 2010»
13 years 2 months ago
Attentional Cueing in Serious Games
—Games, and serious games especially, revolve around learning new material and integrating this into a mental model. However, playing games can be cognitively demanding and novic...
Erik D. Van der Spek, Herre van Oostendorp, Pieter...
VSGAMES
2010
129views Game Theory» more  VSGAMES 2010»
13 years 2 months ago
Validation of Serious Games Attributes Using the Technology Acceptance Model
—The paper introduces a conceptual model for the design of serious games and uses the Technology Acceptance Model (TAM) for its validation. A specially developed game introduced ...
Amri Yusoff, Richard Crowder, Lester Gilbert