A survey of interdependent information security games

A Laszka, M Felegyhazi, L Buttyan - ACM Computing Surveys (CSUR), 2014 - dl.acm.org
Risks faced by information system operators and users are not only determined by their own
security posture, but are also heavily affected by the security-related decisions of others …

Intrinsic robustness of the price of anarchy

T Roughgarden - Journal of the ACM (JACM), 2015 - dl.acm.org
The price of anarchy, defined as the ratio of the worst-case objective function value of a
Nash equilibrium of a game and that of an optimal outcome, quantifies the inefficiency of …

Power-traffic network equilibrium incorporating behavioral theory: A potential game perspective

Z Zhou, SJ Moura, H Zhang, X Zhang, Q Guo, H Sun - Applied Energy, 2021 - Elsevier
This paper examines the interconnections between the power and transportation networks
from a game theoretic perspective. Electric vehicle travelers choose the lowest-cost routes in …

Regret minimization and the price of total anarchy

A Blum, MT Hajiaghayi, K Ligett, A Roth - Proceedings of the fortieth …, 2008 - dl.acm.org
We propose weakening the assumption made when studying the price of anarchy: Rather
than assume that self-interested players will play according to a Nash equilibrium (which …

Jamming games in wireless networks with incomplete information

YE Sagduyu, RA Berry… - IEEE Communications …, 2011 - ieeexplore.ieee.org
Due to their broadcast nature, wireless networks are highly susceptible to jamming attacks
resulting in denial of service. Game theory provides powerful tools to model and analyze …

Altruism, selfishness, and spite in traffic routing

PA Chen, D Kempe - Proceedings of the 9th ACM Conference on …, 2008 - dl.acm.org
In this paper, we study the price of anarchy of traffic routing, under the assumption that users
are partially altruistic or spiteful. We model such behavior by positing that the" cost" …

MAC games for distributed wireless network security with incomplete information of selfish and malicious user types

YE Sagduyu, R Berry… - … Conference on Game …, 2009 - ieeexplore.ieee.org
We consider game theoretic models of wireless medium access control (MAC) in which each
transmitter makes individual decisions regarding their power level or transmission …

Algorithms and complexity for computing nash equilibria in adversarial team games

I Anagnostides, F Kalogiannis, I Panageas… - arXiv preprint arXiv …, 2023 - arxiv.org
Adversarial team games model multiplayer strategic interactions in which a team of
identically-interested players is competing against an adversarial player in a zero-sum …

Altruism and its impact on the price of anarchy

PA Chen, BD Keijzer, D Kempe, G Schäfer - ACM Transactions on …, 2014 - dl.acm.org
We study the inefficiency of equilibria for congestion games when players are (partially)
altruistic. We model altruistic behavior by assuming that player i's perceived cost is a convex …

The myth of the folk theorem

C Borgs, J Chayes, N Immorlica, AT Kalai… - Proceedings of the …, 2008 - dl.acm.org
A well-known result in game theory known as" the Folk Theorem" suggests that finding Nash
equilibria in repeated games should be easier than in one-shot games. In contrast, we show …