Equilibrium Refinement in Security Games with Arbitrary Scheduling Constraints
暂无分享,去创建一个
Bo An | Kai Wang | Milind Tambe | Qingyu Guo | Phebe Vayanos | Milind Tambe | Bo An | Kai Wang | P. Vayanos | Qingyu Guo
[1] G. Leitmann. On generalized Stackelberg strategies , 1978 .
[2] A. Haurie,et al. Sequential Stackelberg equilibria in two-person games , 1985 .
[3] B. Stengel,et al. Leadership with commitment to mixed strategies , 2004 .
[4] Vincent Conitzer,et al. Computing the optimal strategy to commit to , 2006, EC '06.
[5] Sarit Kraus,et al. Using Game Theory for Los Angeles Airport Security , 2009, AI Mag..
[6] Dipankar Dasgupta,et al. Game theory for cyber security , 2010, CSIIRW '10.
[7] Chase Qishi Wu,et al. A Survey of Game Theory as Applied to Network Security , 2010, 2010 43rd Hawaii International Conference on System Sciences.
[8] Manish Jain,et al. Security Games with Arbitrary Schedules: A Branch and Price Approach , 2010, AAAI.
[9] Vincent Conitzer,et al. Complexity of Computing Optimal Stackelberg Strategies in Security Resource Allocation Games , 2010, AAAI.
[10] Bo An,et al. Refinement of Strong Stackelberg Equilibria in Security Games , 2011, AAAI.
[11] Manish Jain,et al. Risk-Averse Strategies for Security Games with Execution and Observational Uncertainty , 2011, AAAI.
[12] Bo An,et al. PROTECT: a deployed game theoretic system to protect the ports of the United States , 2012, AAMAS.
[13] Zhi Yuan,et al. Scalable Randomized Patrolling for Securing Rapid Transit Networks , 2013, IAAI.
[14] Sarit Kraus,et al. Game-theoretic randomization for security patrolling with dynamic execution uncertainty , 2013, AAMAS.
[15] Rong Yang,et al. Improving resource allocation strategies against human adversaries in security games: An extended study , 2013, Artif. Intell..
[16] Milind Tambe,et al. Optimal patrol strategy for protecting moving targets with multiple mobile resources , 2013, AAMAS.
[17] Amos Azaria,et al. Analyzing the Effectiveness of Adversary Modeling in Security Games , 2013, AAAI.
[18] Manish Jain,et al. Efficiently Solving Joint Activity Based Security Games , 2013, IJCAI.
[19] Viliam Lisý,et al. Combining Online Learning and Equilibrium Computation in Security Games , 2015, GameSec.
[20] Bo An,et al. Security Games with Protection Externalities , 2015, AAAI.
[21] Viliam Lisý,et al. Game-Theoretic Foundations for the Strategic Use of Honeypots in Network Security , 2015, Cyber Warfare.
[22] Sarit Kraus,et al. Optimizing Traffic Enforcement: From the Lab to the Roads , 2017, GameSec.
[23] Fernando Ordóñez,et al. Building Real Stackelberg Security Games for Border Patrols , 2017, GameSec.
[24] Michael P. Wellman,et al. A Stackelberg Game Model for Botnet Data Exfiltration , 2017, GameSec.
[25] Branislav Bosanský,et al. Optimal Strategies for Detecting Data Exfiltration by Internal and External Attackers , 2017, GameSec.
[26] Sarit Kraus,et al. When Security Games Hit Traffic: Optimal Traffic Enforcement Under One Sided Uncertainty , 2017, IJCAI.