Security Games with Incomplete Information
暂无分享,去创建一个
[1] Ulrich Berger. Fictitious play in 2×n games , 2005, J. Econ. Theory.
[2] T. Başar,et al. An Intrusion Detection Game with Limited Observations , 2005 .
[3] T. Basar,et al. A game theoretic approach to decision and analysis in network intrusion detection , 2003, 42nd IEEE International Conference on Decision and Control (IEEE Cat. No.03CH37475).
[4] T. Basar,et al. A game theoretic analysis of intrusion detection in access control systems , 2004, 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601).
[5] T. Başar,et al. Dynamic Noncooperative Game Theory , 1982 .
[6] Jeff S. Shamma,et al. Dynamic fictitious play, dynamic gradient play, and distributed convergence to Nash equilibria , 2005, IEEE Transactions on Automatic Control.
[7] Cristina Comaniciu,et al. A Bayesian game approach for intrusion detection in wireless ad hoc networks , 2006, GameNets '06.
[8] Andrew McLennan,et al. Gambit: Software Tools for Game Theory , 2006 .
[9] Jeff S. Shamma,et al. Unified convergence proofs of continuous-time fictitious play , 2004, IEEE Transactions on Automatic Control.
[10] K. Miyasawa. ON THE CONVERGENCE OF THE LEARNING PROCESS IN A 2 X 2 NON-ZERO-SUM TWO-PERSON GAME , 1961 .
[11] J. Robinson. AN ITERATIVE METHOD OF SOLVING A GAME , 1951, Classics in Game Theory.