Human Adversaries in Opportunistic Crime Security Games: Evaluating Competing Bounded Rationality Models
暂无分享,去创建一个
[1] Baruch Fischhoff,et al. Subjective expected utility: A model of decision-making , 1981, J. Am. Soc. Inf. Sci..
[2] A. Tversky,et al. Advances in prospect theory: Cumulative representation of uncertainty , 1992 .
[3] R. McKelvey,et al. Quantal Response Equilibria for Normal Form Games , 1995 .
[4] Miguel A. Costa-Gomes,et al. Cognition and Behavior in Normal-Form Games: An Experimental Study , 1998 .
[5] Richard Gonzalez,et al. On the Shape of the Probability Weighting Function , 1999, Cognitive Psychology.
[6] Georges Dionne,et al. Lottery Decisions and Probability Weighting Function , 2001 .
[7] Colin Camerer,et al. A Cognitive Hierarchy Model of Games , 2004 .
[8] Shai Ben-David,et al. Detecting Change in Data Streams , 2004, VLDB.
[9] A. Tversky,et al. Prospect theory: an analysis of decision under risk — Source link , 2007 .
[10] Ya'akov Gal,et al. Modeling Reciprocal Behavior in Human Bilateral Negotiation , 2007, AAAI.
[11] Nicola Gatti,et al. Game Theoretical Insights in Strategic Patrolling: Model and Algorithm in Normal-Form , 2008, ECAI.
[12] Sarit Kraus,et al. ARMOR Security for Los Angeles International Airport , 2008, AAAI.
[13] Andrea L. Bertozzi,et al. c ○ World Scientific Publishing Company A STATISTICAL MODEL OF CRIMINAL BEHAVIOR , 2008 .
[14] Avi Pfeffer,et al. Simultaneously modeling humans' preferences and their beliefs about others' preferences , 2008, AAMAS.
[15] Vincent Conitzer,et al. Complexity of Computing Optimal Stackelberg Strategies in Security Resource Allocation Games , 2010, AAAI.
[16] Erroll G. Southers. Security and Game Theory: LAX – Terror Target: The History, the Reason, the Countermeasure , 2011 .
[17] Rong Yang,et al. A robust approach to addressing human adversaries in security games , 2012, AAMAS.
[18] Shrisha Rao,et al. Improving resource allocation in multi-tier cloud systems , 2012, 2012 IEEE International Systems Conference SysCon 2012.
[19] Bo An,et al. PROTECT: a deployed game theoretic system to protect the ports of the United States , 2012, AAMAS.
[20] Rong Yang,et al. Improving resource allocation strategies against human adversaries in security games: An extended study , 2013, Artif. Intell..
[21] Amos Azaria,et al. Analyzing the Effectiveness of Adversary Modeling in Security Games , 2013, AAAI.
[22] Milind Tambe,et al. Defending Against Opportunistic Criminals: New Game-Theoretic Frameworks and Algorithms , 2014, GameSec.
[23] Richard S. John,et al. Empirical Comparisons of Descriptive Multi-objective Adversary Models in Stackelberg Security Games , 2014, GameSec.
[24] Mark O. Riedl,et al. Examining Game World Topology Personalization , 2015, CHI.
[25] Juliane Hahn,et al. Security And Game Theory Algorithms Deployed Systems Lessons Learned , 2016 .