An interdiction game on a queueing network with multiple intruders
暂无分享,去创建一个
Richard J. Boucherie | Herman Monsuur | Ana Isabel Barros | A. I. Barros | Corine M. Laan | T.L.C. van der Mijden | Tom van der Mijden | R. Boucherie | H. Monsuur
[1] R. Kevin Wood,et al. Shortest‐path network interdiction , 2002, Networks.
[2] Kevin D. Glazebrook,et al. Optimal patrol to uncover threats in time when detection is imperfect , 2014 .
[3] Erol Gelenbe,et al. Queues with negative arrivals , 1991, Journal of Applied Probability.
[4] Herman Monsuur,et al. The Cooperative Ballistic Missile Defence Game , 2013, GameSec.
[5] Sarit Kraus,et al. A graph-theoretic approach to protect static and moving targets from adversaries , 2010, AAMAS.
[6] David P. Morton,et al. Stochastic Network Interdiction , 1998, Oper. Res..
[7] Alan Washburn,et al. Two-Person Zero-Sum Games for Network Interdiction , 1995, Oper. Res..
[8] Steve Alpern,et al. Patrolling Games , 2011, Oper. Res..
[9] Sarit Kraus,et al. Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games , 2008, AAMAS.
[10] Richard D. Wollmer,et al. Removing Arcs from a Network , 1964 .
[11] David P. Morton,et al. Models for nuclear smuggling interdiction , 2007 .
[12] Milind Tambe,et al. Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned , 2011 .
[13] Marcel F. Neuts. A Multistage Search Game , 1963 .
[14] J. Salmeron,et al. Analysis of electric grid security under terrorist threat , 2004, IEEE Transactions on Power Systems.
[15] Gerald G. Brown,et al. Defending Critical Infrastructure , 2006, Interfaces.
[16] Stephen P. Boyd,et al. Graph Implementations for Nonsmooth Convex Programs , 2008, Recent Advances in Learning and Control.
[17] R. Kevin Wood,et al. Deterministic network interdiction , 1993 .
[18] Alan R. Washburn,et al. Allocation of clearance assets in IED warfare , 2011 .
[19] M G H Bell,et al. Attacker–defender models and road network vulnerability , 2008, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.
[20] E. Gelenbe. Product-form queueing networks with negative and positive customers , 1991 .
[21] Lyn C. Thomas,et al. Dynamic Search Games , 1991, Oper. Res..
[22] Stephen P. Boyd,et al. Disciplined Convex Programming , 2006 .
[23] Michael P. Atkinson,et al. The Last Line of Defense: Designing Radiation Detection-Interdiction Systems to Protect Cities From a Nuclear Terrorist Attack , 2007, IEEE Transactions on Nuclear Science.
[24] J. C. Smith,et al. Algorithms for discrete and continuous multicommodity flow network interdiction problems , 2007 .
[25] Delbert Ray Fulkerson,et al. Maximizing the minimum source-sink path subject to a budget constraint , 1977, Math. Program..
[26] S. Sastry,et al. Probabilistic pursuit-evasion games: a one-step Nash approach , 2000, Proceedings of the 39th IEEE Conference on Decision and Control (Cat. No.00CH37187).