Decision and Game Theory for Security

5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings

  • Radha Poovendran
  • Walid Saad
Conference proceedings GameSec 2014

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8840)

Table of contents

  1. Front Matter
  2. Full Papers

    1. Front Matter
      Pages 1-1
    2. Chao Zhang, Albert Xin Jiang, Martin B. Short, P. Jeffrey Brantingham, Milind Tambe
      Pages 3-22
    3. M. H. R. Khouzani, Viet Pham, Carlos Cid
      Pages 59-78
    4. Viet Pham, M. H. R. Khouzani, Carlos Cid
      Pages 79-98
    5. Mohammad Rasouli, Erik Miehling, Demosthenis Teneketzis
      Pages 99-117
    6. Stefan Rass, Benjamin Rainer
      Pages 118-133
    7. John Ross Wallrabenstein, Chris Clifton
      Pages 134-154
    8. Aleksandr Lenin, Ahto Buldas
      Pages 155-174
    9. Aron Laszka, Gabor Horvath, Mark Felegyhazi, Levente Buttyán
      Pages 175-194
    10. Emmanouil Panaousis, Tansu Alpcan, Hossein Fereidooni, Mauro Conti
      Pages 195-215
    11. Abhishek Gupta, Tamer Başar, Galina A. Schwartz
      Pages 216-233
    12. Emmanouil Panaousis, Andrew Fielder, Pasquale Malacaria, Chris Hankin, Fabrizio Smeraldi
      Pages 266-286
    13. Brahim Djebaili, Christophe Kiennert, Jean Leneutre, Lin Chen
      Pages 287-306
  3. Short Papers

    1. Front Matter
      Pages 307-307
    2. Sadegh Farhang, Mohammad Hossein Manshaei, Milad Nasr Esfahani, Quanyan Zhu
      Pages 319-328
    3. Armin Sarabi, Parinaz Naghizadeh, Mingyan Liu
      Pages 329-339
    4. Richard Klíma, Christopher Kiekintveld, Viliam Lisý
      Pages 340-349
    5. Charles A. Kamhoua, Manuel Rodriguez, Kevin A. Kwiat
      Pages 360-369
    6. Sourabh Bhattacharya, Tamer Başar, Maurizio Falcone
      Pages 370-379
  4. Back Matter

About these proceedings


This book constitutes the refereed proceedings of the 5th International Conference on Decision and Game Theory for Security, GameSec 2014, held in Los Angeles, CA, USA, in November 2014.

The 16 revised full papers presented together with 7 short papers were carefully reviewed and selected from numerous submissions. The covered topics cover multiple facets of cyber security that include: rationality of adversary, game-theoretic cryptographic techniques, vulnerability discovery and assessment, multi-goal security analysis, secure computation, economic-oriented security, and surveillance for security. Those aspects are covered in a multitude of domains that include networked systems, wireless communications, border patrol security, and control systems.


attacker-defender games cloud computing cyber defense cyber security model economic model game theory hardware trojan mobile networks multiparty computation online learning optimization security simulation social network sites

Editors and affiliations

  • Radha Poovendran
    • 1
  • Walid Saad
    • 2
  1. 1.Electrical Engineering Department, Network Securitiy LabUniversity of WashingtonSeattleUSA
  2. 2.Department of Electrical and Computer EngineeringVirginia TechBlacksburgUSA

Bibliographic information

  • DOI
  • Copyright Information Springer International Publishing Switzerland 2014
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-319-12600-5
  • Online ISBN 978-3-319-12601-2
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Chemical Manufacturing
Finance, Business & Banking
IT & Software
Consumer Packaged Goods
Energy, Utilities & Environment