Computing Optimal Monitoring Strategy for Detecting Terrorist Plots
暂无分享,去创建一个
[1] Bo An,et al. Game-Theoretic Resource Allocation for Protecting Large Public Events , 2014, AAAI.
[2] Bo An,et al. Security Games with Protection Externalities , 2015, AAAI.
[3] Nicholas R. Jennings,et al. Computational Analysis of Connectivity Games with Applications to the Investigation of Terrorist Networks , 2013, IJCAI.
[4] Juliane Hahn,et al. Security And Game Theory Algorithms Deployed Systems Lessons Learned , 2016 .
[5] Pierre Hansen,et al. Variable neighborhood search: Principles and applications , 1998, Eur. J. Oper. Res..
[6] Milind Tambe,et al. Urban security: game-theoretic resource allocation in networked physical domains , 2010, AAAI 2010.
[7] Gordon Woo,et al. Intelligence Constraints on Terrorist Network Plots , 2009 .
[8] Paan Jindapon,et al. Network Externalities and the Structure of Terror Networks , 2010 .
[9] Herbert Hamers,et al. Cooperative game theoretic centrality analysis of terrorist networks: The cases of Jemaah Islamiyah and Al Qaeda , 2013, Eur. J. Oper. Res..
[10] Valdis E. Krebs,et al. Mapping Networks of Terrorist Cells , 2001 .
[11] Ariel D. Procaccia,et al. Learning Optimal Commitment to Overcome Insecurity , 2014, NIPS.
[12] Paul Erdös,et al. On random graphs, I , 1959 .
[13] Bo An,et al. PROTECT: An Application of Computational Game Theory for the Security of the Ports of the United States , 2012, AAAI.
[14] Albert,et al. Emergence of scaling in random networks , 1999, Science.
[15] Avrim Blum,et al. Planning in the Presence of Cost Functions Controlled by an Adversary , 2003, ICML.
[16] Walter Enders,et al. Rational Terrorists and Optimal Network Structure , 2007 .
[17] Vincent Conitzer,et al. Security scheduling for real-world networks , 2013, AAMAS.
[18] Bo An,et al. Computing Optimal Mixed Strategies for Security Games with Dynamic Payoffs , 2015, IJCAI.
[19] Bo An,et al. Computing Solutions in Infinite-Horizon Discounted Adversarial Patrolling Games , 2014, ICAPS.