Know Your Adversary: Insights for a Better Adversarial Behavioral Model
暂无分享,去创建一个
Milind Tambe | Don Morrison | Cleotilde Gonzalez | Noam Ben-Asher | Debarun Kar | Nicole D. Sintov | Yasaman Abbasi | Cleotilde González | Noam Ben-Asher | Milind Tambe | Yasaman Abbasi | Don Morrison | Debarun Kar
[1] Bo An,et al. PROTECT: a deployed game theoretic system to protect the ports of the United States , 2012, AAMAS.
[2] Nicole D. Sintov,et al. Human Adversaries in Opportunistic Crime Security Games: Evaluating Competing Bounded Rationality Models , 2015 .
[3] H. Simon,et al. A Behavioral Model of Rational Choice , 1955 .
[4] C. Lebiere,et al. The Atomic Components of Thought , 1998 .
[5] Cleotilde Gonzalez,et al. Instance‐based Learning: A General Model of Repeated Binary Choice , 2012 .
[6] Sarit Kraus,et al. ARMOR Security for Los Angeles International Airport , 2008, AAAI.
[7] Colin Camerer. Behavioral Game Theory: Experiments in Strategic Interaction , 2003 .
[8] Milind Tambe,et al. Defending Against Opportunistic Criminals: New Game-Theoretic Frameworks and Algorithms , 2014, GameSec.
[9] S. C. Johnson. Hierarchical clustering schemes , 1967, Psychometrika.
[10] Milind Tambe,et al. Robust Protection of Fisheries with COmPASS , 2014, AAAI.
[11] Amos Azaria,et al. Analyzing the Effectiveness of Adversary Modeling in Security Games , 2013, AAAI.
[12] R. McKelvey,et al. Quantal Response Equilibria for Normal Form Games , 1995 .
[13] ปิยดา สมบัติวัฒนา. Behavioral Game Theory: Experiments in Strategic Interaction , 2013 .
[14] Cleotilde Gonzalez,et al. A Cognitive Model of Dynamic Cooperation With Varied Interdependency Information , 2015, Cogn. Sci..
[15] Thomas T. Hills,et al. Information Search in Decisions From Experience , 2010, Psychological science.
[16] Cleotilde Gonzalez,et al. Ontology-based Adaptive Systems of Cyber Defense , 2015, STIDS.
[17] Milind Tambe,et al. Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned , 2011 .
[18] Vincent Conitzer,et al. Complexity of Computing Optimal Stackelberg Strategies in Security Resource Allocation Games , 2010, AAAI.
[19] Milind Tambe,et al. "A Game of Thrones": When Human Behavior Models Compete in Repeated Stackelberg Security Games , 2015, AAMAS.
[20] Rong Yang,et al. Adaptive resource allocation for wildlife protection against illegal poachers , 2014, AAMAS.