Warning Time: Optimizing Strategic Signaling for Security Against Boundedly Rational Adversaries
暂无分享,去创建一个
Milind Tambe | Cleotilde Gonzalez | Christian Lebiere | Phebe Vayanos | Thanh Hong Nguyen | Sarah Cooney | Edward A. Cranford | C. Lebiere | Cleotilde González | Milind Tambe | T. Nguyen | P. Vayanos | Sarah Cooney
[1] Milind Tambe,et al. Learning about Cyber Deception through Simulations: Predictions of Human Decision Making with Deceptive Signals in Stackelberg Security Games , 2018, CogSci.
[2] Manish Jain,et al. Software Assistants for Randomized Patrol Planning for the LAX Airport Police and the Federal Air Marshal Service , 2010, Interfaces.
[3] Chris Hankin,et al. Game Theory Meets Information Security Management , 2014, SEC.
[4] Milind Tambe,et al. Adversary Models Account for Imperfect Crime Data: Forecasting and Planning against Real-world Poachers , 2018, AAMAS.
[5] Haifeng Xu,et al. Strategic Coordination of Human Patrollers and Mobile Sensors With Signaling for Security Games , 2018, AAAI.
[6] Haifeng Xu,et al. Exploring Information Asymmetry in Two-Stage Security Games , 2015, AAAI.
[7] swright. National Security Strategy , 2015 .
[8] Garret Ridinger,et al. Attacker Deterrence and Perceived Risk in a Stackelberg Security Game , 2016, Risk analysis : an official publication of the Society for Risk Analysis.
[9] Ryan Kendall. Behavioral Models of Competition: A Theoretical, Experimental, and Empirical Analysis , 2013 .
[10] Fernando Ordóñez,et al. Risk Averse Stackelberg Security Games with Quantal Response , 2016, GameSec.
[11] Kathleen J. McInnis. 2017 National Security Strategy: Issues for Congress [December 19, 2017] , 2017 .
[12] Milind Tambe,et al. When Security Games Go Green: Designing Defender Strategies to Prevent Poaching and Illegal Fishing , 2015, IJCAI.
[13] Bo An,et al. Stackelberg Security Games: Looking Beyond a Decade of Success , 2018, IJCAI.
[14] Viliam Lisý,et al. Game-Theoretic Foundations for the Strategic Use of Honeypots in Network Security , 2015, Cyber Warfare.
[15] Sarit Kraus,et al. Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS 2008.
[16] Vincent Conitzer,et al. Complexity of Computing Optimal Stackelberg Strategies in Security Resource Allocation Games , 2010, AAAI.
[17] Steven R. Grenadier,et al. Real Options Signaling Games with Applications to Corporate Finance , 2011 .
[18] Amos Azaria,et al. Analyzing the Effectiveness of Adversary Modeling in Security Games , 2013, AAAI.
[19] Pierpaolo Battigalli. Rationalization in Signaling Games: Theory and Applications , 2004 .
[20] David M. Kreps,et al. Signaling Games and Stable Equilibria , 1987 .
[21] Juliane Hahn,et al. Security And Game Theory Algorithms Deployed Systems Lessons Learned , 2016 .
[22] Rong Yang,et al. Improving Resource Allocation Strategy against Human Adversaries in Security Games , 2011, IJCAI.
[23] Bo An,et al. GUARDS and PROTECT: next generation applications of security games , 2011, SECO.