Attacker Deterrence and Perceived Risk in a Stackelberg Security Game
暂无分享,去创建一个
Garret Ridinger | Michael McBride | Richard S John | Nicholas Scurich | R. John | Nicholas Scurich | Michael McBride | Garret Ridinger
[1] Milind Tambe,et al. Security and Game Theory: IRIS – A Tool for Strategic Security Allocation in Transportation Networks , 2011, AAMAS 2011.
[2] Sarit Kraus,et al. Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS 2008.
[3] A. Tversky,et al. The Causes of Preference Reversal , 1990 .
[4] Roman M. Sheremeta,et al. An experimental investigation of Colonel Blotto games , 2009, SSRN Electronic Journal.
[5] Melissa L. Finucane,et al. Risk as Analysis and Risk as Feelings: Some Thoughts about Affect, Reason, Risk, and Rationality , 2004, Risk analysis : an official publication of the Society for Risk Analysis.
[6] Sajal K. Das,et al. Decision and Game Theory for Security , 2013, Lecture Notes in Computer Science.
[7] É. Borel. The Theory of Play and Integral Equations with Skew Symmetric Kernels , 1953 .
[8] Yaakov Kareev,et al. Do the Weak Stand a Chance? Distribution of Resources in a Competitive Environment , 2009, Cogn. Sci..
[9] Xiaojun Shan,et al. Modeling Credible Retaliation Threats in Deterring the Smuggling of Nuclear Weapons Using Partial Inspection - A Three-Stage Game , 2014, Decis. Anal..
[10] Michael Caldara. Bidding Behavior in Pay-to-Bid Auctions: An Experimental Study , 2012 .
[11] R. McKelvey,et al. Quantal Response Equilibria for Normal Form Games , 1995 .
[12] S. Epstein. Integration of the cognitive and the psychodynamic unconscious. , 1994, The American psychologist.
[13] Christopher K. Hsee,et al. Distinction Bias: Misprediction and Mischoice Due to Joint Evaluation , 2004 .
[14] Sarit Kraus,et al. Robust solutions to Stackelberg games: Addressing bounded rationality and limited observations in human cognition , 2010, Artif. Intell..
[15] Martin Shubik,et al. Systems Defense Games: Colonel Blotto, Command and Control , 1981 .
[16] Pern Hui Chia,et al. Colonel Blotto in the Phishing War , 2011, GameSec.
[17] A. Tversky,et al. Prospect Theory : An Analysis of Decision under Risk Author ( s ) : , 2007 .
[18] Jeffrey M. Wooldridge,et al. Solutions Manual and Supplementary Materials for Econometric Analysis of Cross Section and Panel Data , 2003 .
[19] Robert Powell. Sequential, nonzero-sum "Blotto": Allocating defensive resources prior to attack , 2009, Games Econ. Behav..
[20] A. Tversky,et al. Contingent weighting in judgment and choice , 1988 .
[21] A. Tversky,et al. Advances in prospect theory: Cumulative representation of uncertainty , 1992 .
[22] Gelder van J.-L,et al. Evaluating a dual-process model of risk: affect and cognition as determinants of risky choice , 2009 .
[23] Richard S John,et al. Perceptions of Randomized Security Schedules , 2014, Risk analysis : an official publication of the Society for Risk Analysis.
[24] Milind Tambe,et al. GUARDS: game theoretic security allocation on a national scale , 2011, AAMAS.
[25] D. Kahneman. A perspective on judgment and choice: mapping bounded rationality. , 2003, The American psychologist.
[26] Zora A. Sukabdi,et al. Basic concepts and reasons behind the emergence of religious terror activities in Indonesia: An inside view , 2013 .
[27] Dan Kovenock,et al. Weakest‐link attacker‐defender games with multiple attack technologies , 2012 .
[28] Sarit Kraus,et al. Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS.
[29] Rong Yang,et al. Improving Resource Allocation Strategy against Human Adversaries in Security Games , 2011, IJCAI.
[30] U. Fischbacher. z-Tree: Zurich toolbox for ready-made economic experiments , 1999 .
[31] Rae Zimmerman,et al. Optimal Resource Allocation for Defense of Targets Based on Differing Measures of Attractiveness , 2008, Risk analysis : an official publication of the Society for Risk Analysis.
[32] K. J. Ray Liu,et al. Optimal power allocation strategy against jamming attacks using the Colonel Blotto game , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[33] Dennis M. Foster,et al. Ballots, Bargains, and Bombs: Terrorist Targeting of Spoiler Opportunities , 2010 .
[34] Oguzhan Alagöz,et al. Modeling secrecy and deception in a multiple-period attacker-defender signaling game , 2010, Eur. J. Oper. Res..
[35] Bo An,et al. PROTECT: a deployed game theoretic system to protect the ports of the United States , 2012, AAMAS.
[36] Manish Jain,et al. Computing optimal randomized resource allocations for massive security games , 2009, AAMAS.
[37] Oded Berman,et al. Location of terror response facilities: A game between state and terrorist , 2007, Eur. J. Oper. Res..
[38] P. Slovic,et al. Risk Perception and Affect , 2006 .
[39] Larry Samuelson,et al. Choosing What to Protect: Strategic Defensive Allocation Against an Unknown Attacker , 2005 .
[40] B. Roberson. The Colonel Blotto game , 2006 .
[41] Menusch Khadjavi. Deterrence works for criminals , 2018 .
[42] Catherine C. Eckel,et al. Forecasting Risk Attitudes: An Experimental Study Using Actual and Forecast Gamble Choices , 2008 .
[43] K. Stanovich,et al. Heuristics and Biases: Individual Differences in Reasoning: Implications for the Rationality Debate? , 2002 .
[44] Vicki M. Bier,et al. Secrecy in Defensive Allocations as a Strategy for Achieving More Cost-Effec tive Att acker Dett errence , 2009 .
[45] Gregory J. DeAngelo,et al. Deterrence, expected cost, uncertainty and voting: Experimental evidence , 2012 .
[46] A. Tversky,et al. Prospect theory: analysis of decision under risk , 1979 .
[47] Jeffrey M. Woodbridge. Econometric Analysis of Cross Section and Panel Data , 2002 .
[48] J. Pligt,et al. Evaluating a dual-process model of risk: affect and cognition as determinants of risky choice , 2009 .
[49] Lana Friesen,et al. Certainty of Punishment versus Severity of Punishment: An Experimental Investigation , 2012 .
[50] Paul Slovic,et al. The affect heuristic , 2007, Eur. J. Oper. Res..
[51] Kjell Hausken,et al. The timing and deterrence of terrorist attacks due to exogenous dynamics , 2012, J. Oper. Res. Soc..