Vulnerability assessment of a food supply chain to an intentional attack
暂无分享,去创建一个
Yu Zhang | Yanling Chang | A. L. Erera | C. C. White | C. White | A. Erera | Yanling Chang | Yu Zhang
[1] Eberhard E. Bischoff,et al. Multi-Objective Decision Analysis — the Right Objectives? , 1986 .
[2] Sarit Kraus,et al. Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games , 2008, AAMAS.
[3] Leslie Pack Kaelbling,et al. All learning is Local: Multi-agent Learning in Global Reward Games , 2003, NIPS.
[4] Michael L. Littman,et al. Markov Games as a Framework for Multi-Agent Reinforcement Learning , 1994, ICML.
[5] H. Rosoff,et al. Decision Analysis by Proxy for the Rational Terrorist , 2022 .
[6] Erim Kardes. Robust Stochastic Games and Applications to Counter-Terrorism Strategies , 2005 .
[7] Salim Hariri,et al. Game Theory Based Network Security , 2010, J. Information Security.
[8] Juan F. Escobar,et al. A Theory of Regular Markov Perfect Equilibria in Dynamic Stochastic Games: Genericity, Stability, and Purification , 2008 .
[9] John A. Sokolowski,et al. Probabilistic Risk Analysis and Terrorism Risk , 2010, Risk analysis : an official publication of the Society for Risk Analysis.
[10] Joao P. Hespanha,et al. Deception in Non-Cooperative Games with Partial Information , 2000 .
[11] Drew Fudenberg,et al. Game theory (3. pr.) , 1991 .
[12] Sarit Kraus,et al. Efficient Algorithms to Solve Bayesian Stackelberg Games for Security Applications , 2008, AAAI.
[13] Sarit Kraus,et al. ARMOR Security for Los Angeles International Airport , 2008, AAAI.
[14] Sarit Kraus,et al. An efficient heuristic approach for security against multiple adversaries , 2007, AAMAS '07.