Comparing Strategic Secrecy and Stackelberg Commitment in Security Games
暂无分享,去创建一个
Branislav Bosanský | Bo An | Christopher Kiekintveld | Qingyu Guo | Bo An | Christopher Kiekintveld | B. Bosanský | Qingyu Guo
[1] L. Goddard,et al. Operations Research (OR) , 2007 .
[2] M. Spence. Job Market Signaling , 1973 .
[3] J. Tobin,et al. ハンセンと公共政策 (ハンセンとその業績(The Quarterly Journal of Economics,1976年2月号)) , 1976 .
[4] G. Leitmann. On generalized Stackelberg strategies , 1978 .
[5] A. Rubinstein. A BARGAINING MODEL WITH INCOMPLETE INFORMATION ABOUT TIME PREFERENCES , 1985 .
[6] Jstor. The journal of economic perspectives , 1987 .
[7] R. Lathe. Phd by thesis , 1988, Nature.
[8] Alice M. Obenchain-Leeson,et al. Volume 6 , 1998 .
[9] John A. Major. Advanced Techniques for Modeling Terrorism Risk , 2002 .
[10] Daniel F. Spulber. Journal of Economics and Management Strategy: Introduction , 2004 .
[11] Gerald G. Brown,et al. A Two-Sided Optimization for Theater Ballistic Missile Defense , 2005, Oper. Res..
[12] David L. Banks,et al. Combining Game Theory and Risk Analysis in Counterterrorism: A Smallpox Example , 2006 .
[13] Chuanyi Ji,et al. Modeling and defending against internet worm attacks , 2007 .
[14] G. Saridis,et al. Journal of Optimization Theory and Applications Approximate Solutions to the Time-invariant Hamilton-jacobi-bellman Equation 1 , 1998 .
[15] Tansu Alpcan,et al. Security Games with Incomplete Information , 2009, 2009 IEEE International Conference on Communications.
[16] Tansu Alpcan,et al. Stochastic games for security in networks with interdependent nodes , 2009, 2009 International Conference on Game Theory for Networks.
[17] Manish Jain,et al. Computing optimal randomized resource allocations for massive security games , 2009, AAMAS 2009.
[18] Sarit Kraus,et al. Robust solutions to Stackelberg games: Addressing bounded rationality and limited observations in human cognition , 2010, Artif. Intell..
[19] Vincent Conitzer,et al. A double oracle algorithm for zero-sum security games on graphs , 2011, AAMAS.
[20] V. Bier,et al. SECRECY AND DECEPTION AT EQUILIBRIUM, WITH APPLICATIONS TO ANTI‐TERRORISM RESOURCE ALLOCATION , 2011 .
[21] Bo An,et al. PROTECT: An Application of Computational Game Theory for the Security of the Ports of the United States , 2012, AAAI.
[22] Bo An,et al. Security games with surveillance cost and optimal timing of attack execution , 2013, AAMAS.
[23] Bo An,et al. Game-Theoretic Resource Allocation for Protecting Large Public Events , 2014, AAAI.
[24] Milind Tambe,et al. Robust Protection of Fisheries with COmPASS , 2014, AAAI.
[25] Branislav Bosanský,et al. Approximate Solutions for Attack Graph Games with Imperfect Information , 2015, GameSec.
[26] Haifeng Xu,et al. Exploring Information Asymmetry in Two-Stage Security Games , 2015, AAAI.
[27] Haifeng Xu,et al. Information Disclosure as a Means to Security , 2015, AAMAS.
[28] Bo An,et al. Security Games with Protection Externalities , 2015, AAAI.
[29] Zhen Wang,et al. Computing Optimal Monitoring Strategy for Detecting Terrorist Plots , 2016, AAAI.
[30] Bo An,et al. Optimizing Personalized Email Filtering Thresholds to Mitigate Sequential Spear Phishing Attacks , 2016, AAAI.
[31] Bo An,et al. Optimally Protecting Elections , 2016, IJCAI.
[32] Bo An,et al. Efficient Resource Allocation for Protecting Coral Reef Ecosystems , 2016, IJCAI.
[33] Chunyan Miao,et al. Optimal Interdiction of Illegal Network Flow , 2016, IJCAI.
[34] Bo An,et al. Deploying PAWS: Field Optimization of the Protection Assistant for Wildlife Security , 2016, AAAI.