Security Diffusion Games
暂无分享,去创建一个
[1] R. Ceballo,et al. The Neighborhood Club: a supportive intervention group for children exposed to urban violence. , 2000, The American journal of orthopsychiatry.
[2] Flávio L Pinheiro,et al. Optimal diversification strategies in the networks of related products and of related research areas , 2017, Nature Communications.
[3] Tomasz P. Michalak,et al. On the Construction of Covert Networks , 2017, AAMAS.
[4] Sarah J. S. Wilner,et al. Networked Narratives: Understanding Word-of-Mouth Marketing in Online Communities , 2009 .
[5] Alsaleh Saad,et al. How Terrorist Groups Use Social Networking Media to Attract and Recruit New Members , 2018, 2018 International Conference on Innovations in Information Technology (IIT).
[6] H. Kunreuther,et al. Interdependent Security , 2003 .
[7] Chase Qishi Wu,et al. A Survey of Game Theory as Applied to Network Security , 2010, 2010 43rd Hawaii International Conference on System Sciences.
[8] M. A. Beauchamp. AN IMPROVED INDEX OF CENTRALITY. , 1965, Behavioral science.
[9] Viliam Lisý,et al. Computing Optimal Policies for Attack Graphs with Action Failures and Costs , 2014, STAIRS.
[10] Alessandro Vespignani,et al. Epidemic spreading in scale-free networks. , 2000, Physical review letters.
[11] M. Macy,et al. Complex Contagions and the Weakness of Long Ties1 , 2007, American Journal of Sociology.
[12] Bo An,et al. An Overview of Recent Application Trends at the AAMAS Conference: Security, Sustainability and Safety , 2012, AI Mag..
[13] Richard S. Sutton,et al. Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.
[14] Duncan J. Watts,et al. Collective dynamics of ‘small-world’ networks , 1998, Nature.
[15] Damon Centola. An Experimental Study of Homophily in the Adoption of Health Behavior , 2011, Science.
[16] Oskar Skibski,et al. Axiomatic Characterization of Game-Theoretic Centrality , 2018, J. Artif. Intell. Res..
[17] M. E. Shaw. Group Structure and the Behavior of Individuals in Small Groups , 1954 .
[18] Albert,et al. Emergence of scaling in random networks , 1999, Science.
[19] Marcin Waniek,et al. Strategic distribution of seeds to support diffusion in complex networks , 2018, PloS one.
[20] Damon Centola,et al. The Spread of Behavior in an Online Social Network Experiment , 2010, Science.
[21] S. Skaperdas. Contest success functions , 1996 .
[22] Milind Tambe,et al. Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned , 2011 .
[23] Bo An,et al. PROTECT: An Application of Computational Game Theory for the Security of the Ports of the United States , 2012, AAAI.
[24] Tansu Alpcan,et al. Security games for vehicular networks , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.
[25] D. Fudenberg,et al. Customer Poaching and Brand Switching , 2000 .
[26] G. Tullock. Efficient Rent Seeking , 2001 .
[27] S. Goyal,et al. Interaction, protection and epidemics , 2015 .
[28] Thomas W. Valente,et al. Opinion Leadership and Social Contagion in New Product Diffusion , 2011, Mark. Sci..
[29] Milind Tambe,et al. Security and Game Theory: IRIS – A Tool for Strategic Security Allocation in Transportation Networks , 2011, AAMAS 2011.
[30] Paulo Shakarian,et al. A Scalable Framework for Modeling Competitive Diffusion in Social Networks , 2010, 2010 IEEE Second International Conference on Social Computing.
[31] Mark E. J. Newman,et al. The Structure and Function of Complex Networks , 2003, SIAM Rev..
[32] Thomas Hegghammer,et al. Terrorist Recruitment and Radicalization in Saudi Arabia , 2006 .
[33] Dimitrios Buhalis,et al. Destination Marketing through User Personalised Content (UPC) , 2010, ENTER.
[34] Tansu Alpcan,et al. Stochastic games for security in networks with interdependent nodes , 2009, 2009 International Conference on Game Theory for Networks.
[35] Nicolas Christin,et al. Uncertainty in Interdependent Security Games , 2010, GameSec.
[36] H. Stackelberg,et al. Marktform und Gleichgewicht , 1935 .
[37] Nicole E. Allen,et al. Centrality measures to identify key stakeholders in Family Violence Councils , 2015 .
[38] A. Barabasi,et al. Halting viruses in scale-free networks. , 2001, Physical review. E, Statistical, nonlinear, and soft matter physics.
[39] E. R. Leukfeldt,et al. Cybercriminal Networks, Social Ties and Online Forums: Social Ties Versus Digital Ties within Phishing and Malware Networks , 2016 .
[40] Jure Leskovec,et al. Learning to Discover Social Circles in Ego Networks , 2012, NIPS.
[41] Jarosław Jankowski,et al. Balancing Speed and Coverage by Sequential Seeding in Complex Networks , 2016, Scientific Reports.
[42] Talal Rahwan,et al. Efficient algorithms for game-theoretic betweenness centrality , 2016, Artif. Intell..
[43] Lance Spitzner,et al. Honeypots: catching the insider threat , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[44] Talal Rahwan,et al. Hiding individuals and communities in a social network , 2016, Nature Human Behaviour.
[45] S. Goyal,et al. Attack, Defence, and Contagion in Networks , 2014 .
[46] Federico Etro,et al. Stackelberg Competition with Endogenous Entry , 2008 .
[47] Tansu Alpcan,et al. Network Security , 2010 .
[48] Michael P. Wellman,et al. Multiagent Reinforcement Learning: Theoretical Framework and an Algorithm , 1998, ICML.
[49] Yevgeniy Vorobeychik,et al. Multidefender Security Games , 2015, IEEE Intelligent Systems.
[50] Kathleen M. Quardokus,et al. Department-level change: Using social network analysis to map the hidden structure of academic departments , 2013 .
[51] Damon Centola. Damon Centola Behavior An Experimental Study of Homophily in the Adoption of Health , 2011 .
[52] D. North. Competing Technologies , Increasing Returns , and Lock-In by Historical Events , 1994 .
[53] Asuman E. Ozdaglar,et al. Network Security and Contagion , 2013, PERV.
[54] Milind Tambe,et al. Security Games for Controlling Contagion , 2012, AAAI.
[55] Alan M. Frieze,et al. Random graphs , 2006, SODA '06.
[56] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[57] Moez Draief,et al. Contagion and observability in security domains , 2013, 2013 51st Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[58] Konstantin Avrachenkov,et al. Cooperative Game Theory Approaches for Network Partitioning , 2017, COCOON.
[59] W. Zachary,et al. An Information Flow Model for Conflict and Fission in Small Groups , 1977, Journal of Anthropological Research.
[60] Mark S. Hamm. Terrorist Recruitment in American Correctional Institutions: An Exploratory Study of Non-Traditional Faith Groups Final Report , 2007 .
[61] X. Freixas,et al. Contagion and efficiency in gross and net interbank payment systems , 1998 .
[62] Sarit Kraus,et al. Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS 2008.
[63] Marc Sageman,et al. Understanding terror networks. , 2004, International journal of emergency mental health.
[64] Gerardo Iñiguez,et al. Complex contagion process in spreading of online innovation , 2014, Journal of The Royal Society Interface.
[65] Sarit Kraus,et al. Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games , 2008, AAMAS.
[66] S. Goyal,et al. How do you defend a network , 2017 .
[67] Andrew W. Moore,et al. Reinforcement Learning: A Survey , 1996, J. Artif. Intell. Res..
[68] Leonard M. Freeman,et al. A set of measures of centrality based upon betweenness , 1977 .
[69] Tomasz P. Michalak,et al. Efficient Computation of Semivalues for Game-Theoretic Network Centrality , 2015, AAAI.
[70] S. Bikhchandani,et al. You have printed the following article : A Theory of Fads , Fashion , Custom , and Cultural Change as Informational Cascades , 2007 .
[71] Nicholas R. Jennings,et al. Efficient Computation of the Shapley Value for Game-Theoretic Network Centrality , 2014, J. Artif. Intell. Res..
[72] Éva Tardos,et al. Maximizing the Spread of Influence through a Social Network , 2015, Theory Comput..
[73] Jon M. Kleinberg,et al. How to schedule a cascade in an arbitrary graph , 2012, EC '12.
[74] J. Anthonisse. The rush in a directed graph , 1971 .
[75] Ajith Abraham,et al. Models of Influence in Online Social Networks , 2014, Int. J. Intell. Syst..
[76] Bronwyn H Hall,et al. Adoption of New Technology , 2003 .
[77] Yongmin Chen,et al. Dynamic Pricing: When to Entice Brand Switching and When to Reward Consumer Loyalty , 2010 .