↓ Skip to main content

Decision and Game Theory for Security

Overview of attention for book
Cover of 'Decision and Game Theory for Security'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Optimizing Traffic Enforcement: From the Lab to the Roads
  3. Altmetric Badge
    Chapter 2 Incentive Compatibility of Pay Per Last N Shares in Bitcoin Mining Pools
  4. Altmetric Badge
    Chapter 3 Adaptivity in Network Interdiction
  5. Altmetric Badge
    Chapter 4 Efficient Rational Proofs for Space Bounded Computations
  6. Altmetric Badge
    Chapter 5 Game-Theoretical Analysis of PLC System Performance in the Presence of Jamming Attacks
  7. Altmetric Badge
    Chapter 6 Secure Sensor Design for Cyber-Physical Systems Against Advanced Persistent Threats
  8. Altmetric Badge
    Chapter 7 An Ultimatum Game Model for the Evolution of Privacy in Jointly Managed Content
  9. Altmetric Badge
    Chapter 8 The U.S. Vulnerabilities Equities Process: An Economic Perspective
  10. Altmetric Badge
    Chapter 9 A Stackelberg Game Model for Botnet Data Exfiltration
  11. Altmetric Badge
    Chapter 10 Optimal Strategies for Detecting Data Exfiltration by Internal and External Attackers
  12. Altmetric Badge
    Chapter 11 Building Real Stackelberg Security Games for Border Patrols
  13. Altmetric Badge
    Chapter 12 Strategic Defense Against Deceptive Civilian GPS Spoofing of Unmanned Aerial Vehicles
  14. Altmetric Badge
    Chapter 13 A Game Theoretical Model for Optimal Distribution of Network Security Resources
  15. Altmetric Badge
    Chapter 14 Game-Theoretic Goal Recognition Models with Applications to Security Domains
  16. Altmetric Badge
    Chapter 15 Manipulating Adversary’s Belief: A Dynamic Game Approach to Deception by Design for Proactive Network Security
  17. Altmetric Badge
    Chapter 16 A Stochastic Game-Theoretic Model for Smart Grid Communication Networks
  18. Altmetric Badge
    Chapter 17 A Stackelberg Game and Markov Modeling of Moving Target Defense
  19. Altmetric Badge
    Chapter 18 Proactive Defense Against Physical Denial of Service Attacks Using Poisson Signaling Games
  20. Altmetric Badge
    Chapter 19 A Large-Scale Markov Game Approach to Dynamic Protection of Interdependent Infrastructure Networks
  21. Altmetric Badge
    Chapter 20 VIOLA: Video Labeling Application for Security Domains
  22. Altmetric Badge
    Chapter 21 On the Economics of Ransomware
  23. Altmetric Badge
    Chapter 22 Deterrence of Cyber Attackers in a Three-Player Behavioral Game
  24. Altmetric Badge
    Chapter 23 Information Leakage Games
  25. Altmetric Badge
    Chapter 24 Optimal Patrol Planning for Green Security Games with Black-Box Attackers
  26. Altmetric Badge
    Chapter 25 Security Games with Probabilistic Constraints on the Agent’s Strategy
  27. Altmetric Badge
    Chapter 26 On the Cost of Game Playing: How to Control the Expenses in Mixed Strategies
  28. Altmetric Badge
    Chapter 27 Dynamics of Strategic Protection Against Virus Propagation in Heterogeneous Complex Networks
  29. Altmetric Badge
    Chapter 28 Three Layer Game Theoretic Decision Framework for Cyber-Investment and Cyber-Insurance
Attention for Chapter 10: Optimal Strategies for Detecting Data Exfiltration by Internal and External Attackers
Altmetric Badge

Mentioned by

twitter
1 X user

Citations

dimensions_citation
3 Dimensions

Readers on

mendeley
12 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Optimal Strategies for Detecting Data Exfiltration by Internal and External Attackers
Chapter number 10
Book title
Decision and Game Theory for Security
Published by
Springer, Cham, October 2017
DOI 10.1007/978-3-319-68711-7_10
Book ISBNs
978-3-31-968710-0, 978-3-31-968711-7
Authors

Karel Durkota, Viliam Lisý, Christopher Kiekintveld, Karel Horák, Branislav Bošanský, Tomáš Pevný

X Demographics

X Demographics

The data shown below were collected from the profile of 1 X user who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 12 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 12 100%

Demographic breakdown

Readers by professional status Count As %
Student > Bachelor 3 25%
Student > Master 3 25%
Student > Ph. D. Student 1 8%
Lecturer > Senior Lecturer 1 8%
Unspecified 1 8%
Other 0 0%
Unknown 3 25%
Readers by discipline Count As %
Computer Science 5 42%
Unspecified 1 8%
Biochemistry, Genetics and Molecular Biology 1 8%
Engineering 1 8%
Unknown 4 33%