The Price of Usability: Designing Operationalizable Strategies for Security Games
暂无分享,去创建一个
[1] Mina Guirguis,et al. Don't Bury your Head in Warnings: A Game-Theoretic Approach for Intelligent Allocation of Cyber-security Alerts , 2017, IJCAI.
[2] F. Paas. Training strategies for attaining transfer of problem-solving skill in statistics: A cognitive-load approach. , 1992 .
[3] Milind Tambe,et al. Preventing Illegal Logging: Simultaneous Optimization of Resource Teams and Tactics for Security , 2016, AAAI.
[4] Maria-Florina Balcan,et al. Commitment Without Regrets: Online Learning in Stackelberg Security Games , 2015, EC.
[5] Sarit Kraus,et al. An efficient heuristic approach for security against multiple adversaries , 2007, AAMAS '07.
[6] Milind Tambe,et al. The Deployment-to-Saturation Ratio in Security Games , 2012, AAAI.
[7] Bo An,et al. Computing Optimal Mixed Strategies for Security Games with Dynamic Payoffs , 2015, IJCAI.
[8] Milind Tambe,et al. One Size Does Not Fit All: A Game-Theoretic Approach for Dynamically and Effectively Screening for Threats , 2016, AAAI.
[9] Milind Tambe,et al. Get Me to My GATE on Time: Efficiently Solving General-Sum Bayesian Threat Screening Games , 2016, ECAI.
[10] J. Sweller,et al. Effects of schema acquisition and rule automation on mathematical problem-solving transfer. , 1987 .
[11] Milind Tambe,et al. Protecting Moving Targets with Multiple Mobile Resources , 2013, J. Artif. Intell. Res..
[12] Aranyak Mehta,et al. Playing large games using simple strategies , 2003, EC '03.
[13] J. Meigs,et al. WHO Technical Report , 1954, The Yale Journal of Biology and Medicine.
[14] Vincent Conitzer,et al. Complexity of Computing Optimal Stackelberg Strategies in Security Resource Allocation Games , 2010, AAAI.
[15] Noam Nisan,et al. Proceedings of the 4th ACM conference on Electronic commerce , 2003 .
[16] Milind Tambe,et al. Staying Ahead of the Game: Adaptive Robust Optimization for Dynamic Allocation of Threat Screening Resources , 2017, IJCAI.
[17] Nicola Basilico,et al. Leader-follower strategies for robotic patrolling in environments with arbitrary topologies , 2009, AAMAS.
[18] Michael Wooldridge,et al. Proceedings of the 24th International Conference on Artificial Intelligence , 2015 .