A survey of interdependent information security games
Risks faced by information system operators and users are not only determined by their own
security posture, but are also heavily affected by the security-related decisions of others …
security posture, but are also heavily affected by the security-related decisions of others …
Intrinsic robustness of the price of anarchy
T Roughgarden - Journal of the ACM (JACM), 2015 - dl.acm.org
The price of anarchy, defined as the ratio of the worst-case objective function value of a
Nash equilibrium of a game and that of an optimal outcome, quantifies the inefficiency of …
Nash equilibrium of a game and that of an optimal outcome, quantifies the inefficiency of …
Power-traffic network equilibrium incorporating behavioral theory: A potential game perspective
This paper examines the interconnections between the power and transportation networks
from a game theoretic perspective. Electric vehicle travelers choose the lowest-cost routes in …
from a game theoretic perspective. Electric vehicle travelers choose the lowest-cost routes in …
Regret minimization and the price of total anarchy
We propose weakening the assumption made when studying the price of anarchy: Rather
than assume that self-interested players will play according to a Nash equilibrium (which …
than assume that self-interested players will play according to a Nash equilibrium (which …
Jamming games in wireless networks with incomplete information
YE Sagduyu, RA Berry… - IEEE Communications …, 2011 - ieeexplore.ieee.org
Due to their broadcast nature, wireless networks are highly susceptible to jamming attacks
resulting in denial of service. Game theory provides powerful tools to model and analyze …
resulting in denial of service. Game theory provides powerful tools to model and analyze …
Altruism, selfishness, and spite in traffic routing
In this paper, we study the price of anarchy of traffic routing, under the assumption that users
are partially altruistic or spiteful. We model such behavior by positing that the" cost" …
are partially altruistic or spiteful. We model such behavior by positing that the" cost" …
MAC games for distributed wireless network security with incomplete information of selfish and malicious user types
YE Sagduyu, R Berry… - … Conference on Game …, 2009 - ieeexplore.ieee.org
We consider game theoretic models of wireless medium access control (MAC) in which each
transmitter makes individual decisions regarding their power level or transmission …
transmitter makes individual decisions regarding their power level or transmission …
Algorithms and complexity for computing nash equilibria in adversarial team games
Adversarial team games model multiplayer strategic interactions in which a team of
identically-interested players is competing against an adversarial player in a zero-sum …
identically-interested players is competing against an adversarial player in a zero-sum …
Altruism and its impact on the price of anarchy
We study the inefficiency of equilibria for congestion games when players are (partially)
altruistic. We model altruistic behavior by assuming that player i's perceived cost is a convex …
altruistic. We model altruistic behavior by assuming that player i's perceived cost is a convex …
The myth of the folk theorem
A well-known result in game theory known as" the Folk Theorem" suggests that finding Nash
equilibria in repeated games should be easier than in one-shot games. In contrast, we show …
equilibria in repeated games should be easier than in one-shot games. In contrast, we show …