Security games with interval uncertainty
暂无分享,去创建一个
Vladik Kreinovich | Christopher Kiekintveld | Towhidul Islam | V. Kreinovich | Christopher Kiekintveld | T. Islam
[1] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[2] H. Stackelberg,et al. Marktform und Gleichgewicht , 1935 .
[3] J. Harsanyi. Games with Incomplete Information Played by 'Bayesian' Players, Part III. The Basic Probability Distribution of the Game , 1968 .
[4] D. McFadden. Quantal Choice Analysis: A Survey , 1976 .
[5] R. B. Kearfott,et al. Applications of interval computations , 1996 .
[6] Arkadi Nemirovski,et al. Robust optimization – methodology and applications , 2002, Math. Program..
[7] T. Basar,et al. A game theoretic approach to decision and analysis in network intrusion detection , 2003, 42nd IEEE International Conference on Decision and Control (IEEE Cat. No.03CH37475).
[8] Jeannette M. Wing,et al. Game strategies in network security , 2005, International Journal of Information Security.
[9] John C. Harsanyi,et al. Games with Incomplete Information Played by "Bayesian" Players, I-III: Part I. The Basic Model& , 2004, Manag. Sci..
[10] Peter R. Wurman,et al. Monte Carlo Approximation in Incomplete Information, Sequential Auction Games , 2003, Decis. Support Syst..
[11] Dimitris Bertsimas,et al. Robust game theory , 2006, Math. Program..
[12] Vincent Conitzer,et al. Computing the optimal strategy to commit to , 2006, EC '06.
[13] V. Bier. Choosing What to Protect , 2007, Risk analysis : an official publication of the Society for Risk Analysis.
[14] Nicola Gatti,et al. Game Theoretical Insights in Strategic Patrolling: Model and Algorithm in Normal-Form , 2008, ECAI.
[15] Sarit Kraus,et al. Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games , 2008, AAMAS.
[16] Sarit Kraus,et al. Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS 2008.
[17] Sarit Kraus,et al. Adversarial Uncertainty in Multi-Robot Patrol , 2009, IJCAI.
[18] Tansu Alpcan,et al. Security Games with Incomplete Information , 2009, 2009 IEEE International Conference on Communications.
[19] Manish Jain,et al. Computing optimal randomized resource allocations for massive security games , 2009, AAMAS.
[20] Daniel Grosu,et al. A Game Theoretic Investigation of Deception in Network Security , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.
[21] Sarit Kraus,et al. Effective solutions for real-world Stackelberg games: when agents must deal with human uncertainties , 2009, AAMAS.
[22] Nicola Basilico,et al. Leader-follower strategies for robotic patrolling in environments with arbitrary topologies , 2009, AAMAS.
[23] Milind Tambe,et al. Urban security: game-theoretic resource allocation in networked physical domains , 2010, AAAI 2010.
[24] Manish Jain,et al. Security Games with Arbitrary Schedules: A Branch and Price Approach , 2010, AAAI.
[25] Vincent Conitzer,et al. Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness , 2011, J. Artif. Intell. Res..
[26] Milind Tambe,et al. Security and Game Theory: IRIS – A Tool for Strategic Security Allocation in Transportation Networks , 2011, AAMAS 2011.
[27] Manish Jain,et al. Quality-bounded solutions for finite Bayesian Stackelberg games: scaling up , 2011, AAMAS.
[28] Milind Tambe,et al. Approximation methods for infinite Bayesian Stackelberg games: modeling distributional payoff uncertainty , 2011, AAMAS.
[29] Vladik Kreinovich,et al. Linear-Time Resource Allocation in Security Games with Identical Fully Protective Resources , 2011, Applied Adversarial Reasoning and Risk Modeling.
[30] Milind Tambe,et al. GUARDS: game theoretic security allocation on a national scale , 2011, AAMAS.
[31] Milind Tambe,et al. Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned , 2011 .
[32] Milind Tambe,et al. A unified method for handling discrete and continuous uncertainty in Bayesian Stackelberg games , 2012, AAMAS.
[33] Wei Xiong,et al. Games with Ambiguous Payoffs and Played by Ambiguity and Regret Minimising Players , 2012, Australasian Conference on Artificial Intelligence.
[34] Bo An,et al. PROTECT: a deployed game theoretic system to protect the ports of the United States , 2012, AAMAS.
[35] Wei Xiong,et al. A Model for Decision Making with Missing, Imprecise, and Uncertain Evaluations of Multiple Criteria , 2012, Int. J. Intell. Syst..