Search results

  • 2016

    End user cybercrime reporting: What we know and what we can do to improve it

    Bidgoli, M. & Grossklags, J., 9 Nov 2016, 2016 IEEE International Conference on Cybercrime and Computer Forensic, ICCCF 2016. Cartwright, B., Lau, L.Y.-C. & Weir, G. (eds.). Institute of Electrical and Electronics Engineers Inc., 7740424. (2016 IEEE International Conference on Cybercrime and Computer Forensic, ICCCF 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    22 Scopus citations
  • FlipLeakage: A game-theoretic approach to protect against stealthy attackers in the presence of information leakage

    Farhang, S. & Grossklags, J., 2016, Decision and Game Theory for Security - 7th International Conference, GameSec 2016, Proceedings. Panaousis, E., Tambe, M., Alpcan, T., Casey, W. & Zhu, Q. (eds.). Springer Verlag, p. 195-214 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9996 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    21 Scopus citations
  • Sharing is caring, or callous?

    Pu, Y. & Grossklags, J., 2016, Cryptology and Network Security - 15th International Conference, CANS 2016, Proceedings. Persiano, G. & Foresti, S. (eds.). Springer Verlag, p. 670-680 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10052 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • When cybercrimes strike undergraduates

    Bidgoli, M., Knijnenburg, B. P. & Grossklags, J., 8 Jun 2016, Proceedings of the 2016 APWG Symposium on Electronic Crime Research, eCrime 2016. IEEE Computer Society, p. 42-51 10 p. 7487948. (eCrime Researchers Summit, eCrime; vol. 2016-June).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    11 Scopus citations
  • 2015

    Adaptive steganography and steganalysis with fixed-size embedding

    Johnson, B., Schöttle, P., Laszka, A., Grossklags, J. & Böhme, R., 2015, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8948, p. 69-91 23 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    1 Scopus citations
  • A Game-Theoretic Study on Non-monetary Incentives in Data Analytics Projects with Privacy Implications

    Chessa, M., Grossklags, J. & Loiseau, P., 4 Sep 2015, Proceedings - 2015 IEEE 28th Computer Security Foundations Symposium, CSF 2015. Kellenberger, P. (ed.). IEEE Computer Society, p. 90-104 15 p. 7243727. (Proceedings of the Computer Security Foundations Workshop; vol. 2015-September).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    30 Scopus citations
  • An empirical study of web vulnerability discovery ecosystems

    Zhao, M., Grossklags, J. & Liu, P., 12 Oct 2015, CCS 2015 - Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1105-1117 13 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 2015-October).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    75 Scopus citations
  • A short paper on the incentives to share private information for population estimates

    Chessa, M., Grossklags, J. & Loiseau, P., 2015, Financial Cryptography and Data Security - 19th International Conference, FC 2015, Revised Selected Papers. Okamoto, T. & Bohme, R. (eds.). Springer Verlag, p. 427-436 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8975).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • Games of timing for security in dynamic environments

    Johnson, B., Laszka, A. & Grossklags, J., 2015, Decision and Game Theory for Security - 6th International Conference, GameSec 2015, Proceedings. Khouzani, M. H. R., Panaousis, E. & Theodorakopoulos, G. (eds.). Springer Verlag, p. 57-73 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9406).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Scopus citations
  • Human-computer interaction and international public policymaking: A framework for understanding and taking future actions

    Lazar, J., Abascal, J., Barbosa, S., Barksdale, J., Friedman, B., Grossklags, J., Gulliksen, J., Johnson, J., McEwan, T., Martínez-Normand, L., Michalk, W., Tsai, J., Van Der Veer, G., Von Axelson, H., Walldius, A., Whitney, G., Winckler, M., Wulf, V., Churchill, E. F. & Cranor, L. & 11 others, Davis, J., Hedge, A., Hochheiser, H., Hourcade, J. P., Lewis, C., Nathan, L., Paterno, F., Reid, B., Quesenbery, W., Selker, T. & Wentz, B., 2015, In: Foundations and Trends in Human-Computer Interaction. 9, 2, p. 69-149 81 p.

    Research output: Contribution to journalArticlepeer-review

    42 Scopus citations
  • Should Cyber-Insurance providers invest in software security?

    Laszka, A. & Grossklags, J., 2015, Computer Security – ESORICS 2015 - 20th European Symposium on Research in Computer Security, Proceedings. Ryan, P. Y. A., Pernul, G. & Weippl, E. (eds.). Springer Verlag, p. 483-502 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9326).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    16 Scopus citations
  • Using conjoint analysis to investigate the value of interdependent privacy in social app adoption scenarios

    Pu, Y. & Grossklags, J., 2015, 2015 International Conference on Information Systems: Exploring the Information Frontier, ICIS 2015. Association for Information Systems, (2015 International Conference on Information Systems: Exploring the Information Frontier, ICIS 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    35 Scopus citations
  • When bitcoin mining pools run dry: A game-theoretic analysis of the long-term impact of attacks between mining pools

    Laszka, A., Johnson, B. & Grossklags, J., 2015, Financial Cryptography and Data Security - FC 2015 International Workshops BITCOIN, WAHC, and Wearable, Revised Selected Papers. Christin, N., Rohloff, K., Brenner, M., Christin, N., Brenner, M., Johnson, B., Johnson, B. & Rohloff, K. (eds.). Springer Verlag, p. 63-77 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8976).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    64 Scopus citations
  • 2014

    An economic model and simulation results of App adoption decisions on networks with interdependent privacy consequences

    Pu, Y. & Grossklags, J., 2014, Decision and GameTheory for Security - 5th International Conference, GameSec 2014, Proceedings. Poovendran, R. & Saad, W. (eds.). Springer Verlag, p. 246-265 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8840).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    25 Scopus citations
  • An exploratory study of white hat behaviors in a web vulnerability disclosure program

    Zhao, M., Grossklags, J. & Chen, K., 7 Nov 2014, SIW 2014 - Proceedings of the 2014 ACM Workshop on Security Information Workers, Co-located with CCS 2014. November ed. Association for Computing Machinery, p. 51-58 8 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 2014-November, no. November).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    37 Scopus citations
  • An online experiment on consumers' susceptibility to fall for post-transaction marketing scams

    Nochenson, A. & Grossklags, J., 2014, ECIS 2014 Proceedings - 22nd European Conference on Information Systems. Association for Information Systems, (ECIS 2014 Proceedings - 22nd European Conference on Information Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • Bitspotting: Detecting optimal adaptive steganography

    Johnson, B., Schöttle, P., Laszka, A., Grossklags, J. & Böhme, R., 2014, Digital-Forensics and Watermarking - 12th International Workshop, IWDW 2013, Revised Selected Papers. Springer Verlag, p. 3-18 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8389 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    2 Scopus citations
  • Designing the default privacy settings for facebook applications

    Wang, N., Wisniewski, P., Xu, H. & Grossklags, J., 2014, CSCW 2014 - Companion Publication of the 17th ACM Conference on Computer Supported Cooperative Work and Social Computing. Association for Computing Machinery, p. 249-252 4 p. (Proceedings of the ACM Conference on Computer Supported Cooperative Work, CSCW).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    27 Scopus citations
  • Estimating systematic risk in real-world networks

    Laszka, A., Johnson, B., Grossklags, J. & Felegyhazi, M., 2014, Financial Cryptography and Data Security - 18th International Conference, FC 2014, Revised Selected Papers. Christin, N. & Safavi-Naini, R. (eds.). Springer Verlag, p. 417-435 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8437).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    13 Scopus citations
  • Game-theoretic analysis of DDoS attacks against bitcoin mining pools

    Johnson, B., Laszka, A., Grossklags, J., Vasek, M. & Moore, T., 2014, Financial Cryptography and Data Security - FC 2014 Workshops, BITCOIN and WAHC 2014, Revised Selected Papers. Brenner, M., Smith, M., Böhme, R. & Moore, T. (eds.). Springer Verlag, p. 72-86 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8438).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    143 Scopus citations
  • How loss profiles reveal behavioural biases in interdependent security decisions

    Nochenson, A., Grossklags, J. & Heimann, C. F. L., 2014, In: International Journal of Internet Technology and Secured Transactions. 5, 2, p. 105-116 12 p.

    Research output: Contribution to journalArticlepeer-review

    1 Scopus citations
  • How many down? Toward understanding systematic risk in networks

    Johnson, B., Laszka, A. & Grossklags, J., 4 Jun 2014, ASIA CCS 2014 - Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security. Association for Computing Machinery, Inc, p. 495-500 6 p. (ASIA CCS 2014 - Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    10 Scopus citations
  • How task familiarity and cognitive predispositions impact behavior in a security game of timing

    Grossklags, J. & Reitter, D., 13 Nov 2014, Proceedings - 2014 IEEE 27th Computer Security Foundations Symposium, CSF 2014. IEEE Computer Society, p. 111-122 12 p. 6957106. (Proceedings of the Computer Security Foundations Workshop; vol. 2014-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    16 Scopus citations
  • Secure team composition to thwart insider threats and cyber-espionage

    Laszka, A., Johnson, B., Schöttle, P., Grossklags, J. & Böhme, R., 1 Oct 2014, In: ACM Transactions on Internet Technology. 14, 2-3, 2663499.

    Research output: Contribution to journalArticlepeer-review

    8 Scopus citations
  • Social status and the demand for security and privacy

    Grossklags, J. & Barradale, N. J., 2014, Privacy Enhancing Technologies - 14th International Symposium, PETS 2014, Proceedings. Springer Verlag, p. 83-101 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8555 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • The complexity of estimating systematic risk in networks

    Johnson, B., Laszka, A. & Grossklags, J., 13 Nov 2014, Proceedings - 2014 IEEE 27th Computer Security Foundations Symposium, CSF 2014. IEEE Computer Society, p. 325-336 12 p. 6957120. (Proceedings of the Computer Security Foundations Workshop; vol. 2014-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    11 Scopus citations
  • 2013

    Ad-Blocking games: Monetizing online content under the threat of ad avoidance

    Vratonjic, N., Manshaei, M. H., Grossklags, J. & Hubaux, J. P., 1 Jan 2013, The Economics of Information Security and Privacy. Springer Berlin Heidelberg, p. 49-73 25 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    Open Access
    15 Scopus citations
  • A game-theoretic analysis of content-adaptive steganography with independent embedding

    Schottle, P., Laszka, A., Johnson, B., Grossklags, J. & Bohme, R., 2013, 2013 Proceedings of the 21st European Signal Processing Conference, EUSIPCO 2013. European Signal Processing Conference, EUSIPCO, 6811726. (European Signal Processing Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • An online experiment of privacy authorization dialogues for social applications

    Wang, N., Grossklags, J. & Xu, H., 2013, CSCW 2013 - Proceedings of the 2013 ACM Conference on Computer Supported Cooperative Work. p. 261-272 12 p. (Proceedings of the ACM Conference on Computer Supported Cooperative Work, CSCW).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    44 Scopus citations
  • Managing the weakest link: A game-theoretic approach for the mitigation of insider threats

    Laszka, A., Johnson, B., Schöttle, P., Grossklags, J. & Böhme, R., 2013, Computer Security, ESORICS 2013 - 18th European Symposium on Research in Computer Security, Proceedings. p. 273-290 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8134 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    6 Scopus citations
  • Mitigating covert compromises: A game-theoretic model of targeted and non-targeted covert attacks

    Laszka, A., Johnson, B. & Grossklags, J., 2013, Web and Internet Economics - 9th International Conference, WINE 2013, Proceedings. p. 319-332 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8289 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    22 Scopus citations
  • Mitigation of targeted and non-targeted covert attacks as a timing game

    Laszka, A., Johnson, B. & Grossklags, J., 2013, Decision and Game Theory for Security - 4th International Conference, GameSec 2013, Proceedings. Springer Verlag, p. 175-191 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8252 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    19 Scopus citations
  • Trading agent kills market information: Evidence from online social lending

    Böhme, R. & Grossklags, J., 2013, Web and Internet Economics - 9th International Conference, WINE 2013, Proceedings. p. 68-81 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8289 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • 2012

    It's all about the Benjamins: An empirical study on incentivizing users to ignore security advice

    Christin, N., Egelman, S., Vidas, T. & Grossklags, J., 2012, Financial Cryptography and Data Security - 15th International Conference, FC 2011, Revised Selected Papers. p. 16-30 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7035 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    26 Scopus citations
  • Metrics for measuring ISP badness: The case of spam

    Johnson, B., Chuang, J., Grossklags, J. & Christin, N., 2012, Financial Cryptography and Data Security - 16th International Conference, FC 2012, Revised Selected Papers. p. 89-97 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7397 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • Nash equilibria for weakest target security games with heterogeneous agents

    Johnson, B., Grossklags, J., Christin, N. & Chuang, J., 2012, Game Theory for Networks - Second International ICST Conference, GAMENETS 2011, Revised Selected Papers. p. 444-458 15 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; vol. 75 LNICST).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    5 Scopus citations
  • Privacy by redesign: Alleviating privacy concerns for third-party applications

    Xu, H., Wang, N. & Grossklags, J., 2012, International Conference on Information Systems, ICIS 2012. p. 3851-3858 8 p. (International Conference on Information Systems, ICIS 2012; vol. 5).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    10 Scopus citations
  • Young adults' online participation behaviors: An exploratory study of web 2.0 use for political engagement

    Bridges, F., Appel, L. & Grossklags, J., 2012, In: Information Polity. 17, 2, p. 163-176 14 p.

    Research output: Contribution to journalArticlepeer-review

    30 Scopus citations
  • 2011

    Security games with market insurance

    Johnson, B., Böhme, R. & Grossklags, J., 2011, Decision and Game Theory for Security - Second International Conference, GameSec 2011, Proceedings. p. 117-130 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7037 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    36 Scopus citations
  • The security cost of cheap user interaction

    Böhme, R. & Grossklags, J., 2011, NSPW'11 - Proceedings of the 2011 New Security Paradigms Workshop. p. 67-82 16 p. (Proceedings New Security Paradigms Workshop).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    41 Scopus citations
  • Third-party apps on Facebook: Privacy and the illusion of control

    Wang, N., Xu, H. & Grossklags, J., 2011, Proceedings of the 5th ACM Symposium on Computer Human Interaction for Management of Information Technology, CHIMIT'11. 4. (Proceedings of the 5th ACM Symposium on Computer Human Interaction for Management of Information Technology, CHIMIT'11).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    94 Scopus citations
  • Young adults and online political participation: Search strategies and the role of social media

    Grossklags, J., Appel, L. & Bridges, F., 2011, dg.o 2011 - Proceedings of the 12th Annual International Digital Government Research Conference: Digital Government Innovation in Challenging Times. p. 302-306 5 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • 2010

    Are security experts useful? Bayesian Nash equilibria for network security games with limited information

    Johnson, B., Grossklags, J., Christin, N. & Chuang, J., 2010, Computer Security, ESORICS 2010 - 15th European Symposium on Research in Computer Security, Proceedings. Springer Verlag, p. 588-606 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6345 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    19 Scopus citations
  • Nudge: Intermediaries' role in interdependent network security

    Grossklags, J., Radosavac, S., Cárdenas, A. A. & Chuang, J., 2010, Trust and Trustworthy Computing - Third International Conference, TRUST 2010, Proceedings. p. 323-336 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6101 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    20 Scopus citations
  • Nudge: Intermediaries' role in interdependent network security

    Grossklags, J., Radosavac, S., Cárdenas, A. A. & Chuang, J., 2010, APPLIED COMPUTING 2010 - The 25th Annual ACM Symposium on Applied Computing. p. 1879-1880 2 p. (Proceedings of the ACM Symposium on Applied Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • Uncertainty in interdependent security games

    Johnson, B., Grossklags, J., Christin, N. & Chuang, J., 2010, Decision and Game Theory for Security - First International Conference, GameSec 2010, Proceedings. p. 234-244 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6442 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    31 Scopus citations
  • When information improves information security

    Grossklags, J., Johnson, B. & Christin, N., 2010, Financial Cryptography and Data Security - 14th International Conference, FC 2010, Revised Selected Papers. p. 416-423 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6052 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    11 Scopus citations
  • 2009

    Blue versus red: Towards a model of distributed security attacks

    Fultz, N. & Grossklags, J., 2009, Financial Cryptography and Data Security - 13th International Conference, FC 2009, Revised Selected Papers. p. 167-183 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5628 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    42 Scopus citations
  • Uncertainty in the weakest-link security game

    Grossklags, J. & Johnson, B., 2009, Proceedings of the 2009 International Conference on Game Theory for Networks, GameNets '09. p. 673-682 10 p. 5137460. (Proceedings of the 2009 International Conference on Game Theory for Networks, GameNets '09).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    17 Scopus citations