Addressing Scalability and Robustness in Security Games with Multiple Boundedly Rational Adversaries
暂无分享,去创建一个
[1] Rong Yang,et al. Scaling-up Security Games with Boundedly Rational Adversaries: A Cutting-plane Approach , 2013, IJCAI.
[2] John S. Baras,et al. Decision and Game Theory for Security , 2010, Lecture Notes in Computer Science.
[3] Arkadi Nemirovski,et al. Robust optimization – methodology and applications , 2002, Math. Program..
[4] R. McKelvey,et al. Quantal Response Equilibria for Normal Form Games , 1995 .
[5] ปิยดา สมบัติวัฒนา. Behavioral Game Theory: Experiments in Strategic Interaction , 2013 .
[6] Manish Jain,et al. Security Games with Arbitrary Schedules: A Branch and Price Approach , 2010, AAAI.
[7] Rong Yang,et al. Adaptive resource allocation for wildlife protection against illegal poachers , 2014, AAMAS.
[8] Milind Tambe,et al. Monotonic Maximin: A Robust Stackelberg Solution against Boundedly Rational Followers , 2013, GameSec.
[9] Quanyan Zhu,et al. Deceptive Routing in Relay Networks , 2012, GameSec.
[10] Amos Azaria,et al. Analyzing the Effectiveness of Adversary Modeling in Security Games , 2013, AAAI.
[11] Rong Yang,et al. Computing optimal strategy against quantal response in security games , 2012, AAMAS.
[12] Tansu Alpcan,et al. Stochastic games for security in networks with interdependent nodes , 2009, 2009 International Conference on Game Theory for Networks.
[13] Constantine Caramanis,et al. Theory and Applications of Robust Optimization , 2010, SIAM Rev..
[14] Quanyan Zhu,et al. Game theory meets network security and privacy , 2013, CSUR.
[15] Sarit Kraus,et al. Robust solutions to Stackelberg games: Addressing bounded rationality and limited observations in human cognition , 2010, Artif. Intell..
[16] Shouhuai Xu,et al. Optimizing Active Cyber Defense , 2013, GameSec.
[17] Milind Tambe,et al. Robust Protection of Fisheries with COmPASS , 2014, AAAI.
[18] Branislav Bosanský,et al. Game Theoretic Model of Strategic Honeypot Selection in Computer Networks , 2012, GameSec.
[19] Juliane Hahn,et al. Security And Game Theory Algorithms Deployed Systems Lessons Learned , 2016 .