Compliance Control: Managed Vulnerability Surface in Social-Technological Systems via Signaling Games
暂无分享,去创建一个
Quanyan Zhu | Bud Mishra | William Casey | Jose Andre Morales | Quanyan Zhu | B. Mishra | J. Morales | W. Casey
[1] Bud Mishra,et al. Cyber Security via Minority Games with Epistatic Signaling , 2014, BICT.
[2] Kevin J. S. Zollman,et al. Evolutionary dynamics of Lewis signaling games: signaling systems vs. partial pooling , 2007, Synthese.
[3] M. Spence. Job Market Signaling , 1973 .
[4] Chang Chieh Hang,et al. Towards intelligent PID control , 1989, Autom..
[5] Armin W. Schulz. Signals: evolution, learning, and information , 2012 .
[6] Jonathan M. Spring,et al. Cyber Security via Signaling Games: Toward a Science of Cyber Security , 2014, ICDCIT.
[7] Katya Scheinberg,et al. Recent progress in unconstrained nonlinear optimization without derivatives , 1997, Math. Program..
[8] R. Kirk. CONVENTION: A PHILOSOPHICAL STUDY , 1970 .
[9] Lester Ingber,et al. Simulated annealing: Practice versus theory , 1993 .
[10] Yun Li,et al. PID control system analysis, design, and technology , 2005, IEEE Transactions on Control Systems Technology.
[11] Brian Skyrms,et al. Emergence of Information Transfer by Inductive Learning , 2008, Stud Logica.
[12] Emile H. L. Aarts,et al. Simulated Annealing: Theory and Applications , 1987, Mathematics and Its Applications.
[13] Tamara G. Kolda,et al. Optimization by Direct Search: New Perspectives on Some Classical and Modern Methods , 2003, SIAM Rev..
[14] Ken Binmore,et al. Evolution and Mixed Strategies , 2001, Games Econ. Behav..