Beyond Runtimes and Optimality: Challenges and Opportunities in Evaluating Deployed Security Systems
暂无分享,去创建一个
Milind Tambe | Matthew E. Taylor | Christopher Kiekintveld | Craig Western | Milind Tambe | Christopher Kiekintveld | Craig Western
[1] Milind Tambe,et al. Effective solutions for real-world Stackelberg games: when agents must deal with human uncertainties , 2009, AAMAS 2009.
[2] V. Bier. Choosing What to Protect , 2007, Risk analysis : an official publication of the Society for Risk Analysis.
[3] R. Lazarick. Airport vulnerability assessment-a methodology evaluation , 1999, Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat. No.99CH36303).
[4] Monica Costa Dias,et al. Alternative approaches to evaluation in empirical microeconomics , 2002, The Journal of Human Resources.
[5] Sarit Kraus,et al. Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS 2008.
[6] Alvin E. Roth,et al. P value and the usefulness of game theoretic models , 2002 .
[7] Sheldon Howard Jacobson,et al. Assessing the impact of deterrence on aviation checked baggage screening strategies , 2005 .
[8] Paul Scerri,et al. Transitioning multiagent technology to UAV applications , 2008, AAMAS.