Decision and Game Theory for Security - 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedings
暂无分享,去创建一个
[1] Nicola Basilico,et al. Leader-follower strategies for robotic patrolling in environments with arbitrary topologies , 2009, AAMAS.
[2] R. Clarke,et al. UNDERSTANDING CRIME DISPLACEMENT: AN APPLICATION OF RATIONAL CHOICE THEORY , 1987 .
[3] S. Sastry,et al. Probabilistic pursuit-evasion games: a one-step Nash approach , 2000, Proceedings of the 39th IEEE Conference on Decision and Control (Cat. No.00CH37187).
[4] P. Brantingham,et al. Criminality of place , 1995 .
[5] Tansu Alpcan,et al. Stochastic games for security in networks with interdependent nodes , 2009, 2009 International Conference on Game Theory for Networks.
[6] J. Ratcliffe. A Temporal Constraint Theory to Explain Opportunity-Based Spatial Offending Patterns , 2006 .
[7] Quanyan Zhu,et al. Deceptive routing games , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).
[8] Joseph R. Zipkin,et al. COPS ON THE DOTS IN A MATHEMATICAL MODEL OF URBAN CRIME AND POLICE RESPONSE , 2014 .
[9] Xavier Boyen,et al. Tractable Inference for Complex Stochastic Processes , 1998, UAI.
[10] Kelly E. See,et al. Between ignorance and truth: Partition dependence and learning in judgment under uncertainty. , 2006, Journal of experimental psychology. Learning, memory, and cognition.
[11] R. Liggett,et al. The Geography of Transit Crime , 2002 .
[12] Andrea L. Bertozzi,et al. c ○ World Scientific Publishing Company A STATISTICAL MODEL OF CRIMINAL BEHAVIOR , 2008 .
[13] R. McKelvey,et al. Quantal Response Equilibria for Normal Form Games , 1995 .
[14] Zhi Yuan,et al. Scalable Randomized Patrolling for Securing Rapid Transit Networks , 2013, IAAI.
[15] Milind Tambe,et al. Online planning for optimal protector strategies in resource conservation games , 2014, AAMAS.
[16] Nicola Basilico,et al. Automated Abstractions for Patrolling Security Games , 2011, AAAI.
[17] Bo An,et al. Adversarial patrolling games , 2012, AAMAS.
[18] Quanyan Zhu,et al. Deceptive Routing in Relay Networks , 2012, GameSec.
[19] Nicola Basilico,et al. Extending Algorithms for Mobile Robot Patrolling in the Presence of Adversaries to More Realistic Settings , 2009, 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology.
[20] Quanyan Zhu,et al. Game theory meets network security and privacy , 2013, CSUR.
[21] Milind Tambe,et al. Effective solutions for real-world Stackelberg games: when agents must deal with human uncertainties , 2009, AAMAS 2009.
[22] Vincent Conitzer,et al. Computing Optimal Strategies to Commit to in Stochastic Games , 2012, AAAI.
[23] Sarit Kraus,et al. Game-theoretic randomization for security patrolling with dynamic execution uncertainty , 2013, AAMAS.
[24] P. Brantingham,et al. Offender Mobility and Crime Pattern Formation from First Principles , 2008 .
[25] Quanyan Zhu,et al. Dynamic policy-based IDS configuration , 2009, Proceedings of the 48h IEEE Conference on Decision and Control (CDC) held jointly with 2009 28th Chinese Control Conference.
[26] Milind Tambe,et al. Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned , 2011 .