Table of contents : Front Matter....Pages i-xii Game Theoretic Approaches to Attack Surface Shifting....Pages 1-13 Security Games Applied to Real-World: Research Contributions and Challenges....Pages 15-39 Adversarial Dynamics: The Conficker Case Study....Pages 41-71 From Individual Decisions from Experience to Behavioral Game Theory: Lessons for Cybersecurity....Pages 73-86 Cyber Maneuver Against External Adversaries and Compromised Nodes....Pages 87-96 Applying Self-Shielding Dynamics to the Network Architecture....Pages 97-115 Moving Target Defenses in the Helix Self-Regenerative Architecture....Pages 117-149 Diversifying the Software Stack Using Randomized NOP Insertion....Pages 151-173 Practical Software Diversification Using In-Place Code Randomization....Pages 175-202 Back Matter....Pages 203-203