Strategic analysis of complex security scenarios.

[1]  Steve Alpern,et al.  Accumulation games on graphs , 2014, Networks.

[2]  Yevgeniy Vorobeychik,et al.  Computing Optimal Security Strategies for Interdependent Assets , 2012, UAI.

[3]  Vincent Conitzer,et al.  Computing Optimal Strategies to Commit to in Stochastic Games , 2012, AAAI.

[4]  Milind Tambe,et al.  Security Games for Controlling Contagion , 2012, AAAI.

[5]  Bo An,et al.  PROTECT: a deployed game theoretic system to protect the ports of the United States , 2012, AAMAS.

[6]  Nicola Basilico,et al.  Patrolling security games: Definition and algorithms for solving large instances with single patroller and single intruder , 2012, Artif. Intell..

[7]  Steve Alpern,et al.  Patrolling Games , 2011, Oper. Res..

[8]  Sarit Kraus,et al.  Multi-Robot Adversarial Patrolling: Facing a Full-Knowledge Opponent , 2011, J. Artif. Intell. Res..

[9]  Noa Agmon,et al.  Multiagent Patrol Generalized to Complex Environmental Conditions , 2011, AAAI.

[10]  Vincent Conitzer,et al.  Commitment to Correlated Strategies , 2011, AAAI.

[11]  Branislav Bosanský,et al.  Computing time-dependent policies for patrolling games with mobile targets , 2011, AAMAS.

[12]  Vincent Conitzer,et al.  A double oracle algorithm for zero-sum security games on graphs , 2011, AAMAS.

[13]  Terrence August,et al.  Who Should be Responsible for Software Security? A Comparative Analysis of Liability Policies in Network Environments , 2011, WEIS.

[14]  Vincent Conitzer,et al.  Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness , 2011, J. Artif. Intell. Res..

[15]  Bo An,et al.  GUARDS and PROTECT: next generation applications of security games , 2011, SECO.

[16]  Tansu Alpcan,et al.  Integrated security risk management for IT-intensive organizations , 2010, 2010 Sixth International Conference on Information Assurance and Security.

[17]  Milind Tambe,et al.  Urban security: game-theoretic resource allocation in networked physical domains , 2010, AAAI 2010.

[18]  Manish Jain,et al.  Security Games with Arbitrary Schedules: A Branch and Price Approach , 2010, AAAI.

[19]  Nicola Basilico,et al.  Asynchronous Multi-Robot Patrolling against Intrusions in Arbitrary Topologies , 2010, AAAI.

[20]  Vincent Conitzer,et al.  Complexity of Computing Optimal Stackelberg Strategies in Security Resource Allocation Games , 2010, AAAI.

[21]  Manish Jain,et al.  Software Assistants for Randomized Patrol Planning for the LAX Airport Police and the Federal Air Marshal Service , 2010, Interfaces.

[22]  Bernhard von Stengel,et al.  Leadership games with convex strategy sets , 2010, Games Econ. Behav..

[23]  Vincent Conitzer,et al.  Computing optimal strategies to commit to in extensive-form games , 2010, EC '10.

[24]  Mark Newman,et al.  Networks: An Introduction , 2010 .

[25]  Tuomas Sandholm,et al.  Computing equilibria by incorporating qualitative models? , 2010, AAMAS.

[26]  M. Nehme Two-person games for stochastic network interdiction : models, methods, and complexities , 2009 .

[27]  Vincent Conitzer,et al.  Multi-Step Multi-Sensor Hider-Seeker Games , 2009, IJCAI.

[28]  Gerald G. Brown,et al.  Interdicting a Nuclear-Weapons Project , 2009, Oper. Res..

[29]  Nicola Basilico,et al.  Leader-follower strategies for robotic patrolling in environments with arbitrary topologies , 2009, AAMAS.

[30]  Manish Jain,et al.  Computing optimal randomized resource allocations for massive security games , 2009, AAMAS.

[31]  Sarit Kraus,et al.  Using Game Theory for Los Angeles Airport Security , 2009, AI Mag..

[32]  Olivier Buffet,et al.  Theoretical Study of Ant-based Algorithms for Multi-Agent Patrolling , 2008, ECAI.

[33]  Sarit Kraus,et al.  Multi-robot perimeter patrol in adversarial settings , 2008, 2008 IEEE International Conference on Robotics and Automation.

[34]  Michael P. Wellman,et al.  Stochastic Search Methods for Nash Equilibrium Approximation in Simulation-based Games , 2022 .

[35]  Nicolas Christin,et al.  Secure or insure?: a game-theoretic analysis of information security games , 2008, WWW.

[36]  Jun Zhang,et al.  Security Patch Management: Share the Burden or Share the Damage? , 2008, Manag. Sci..

[37]  Joel C. Miller,et al.  Effective vaccination strategies for realistic social networks , 2007 .

[38]  Vicki M. Bier,et al.  Balancing Terrorism and Natural Disasters - Defensive Strategy with Endogenous Attacker Effort , 2007, Oper. Res..

[39]  David Patrick Duggan,et al.  Categorizing threat : building and using a generic threat matrix. , 2007 .

[40]  Shlomo Havlin,et al.  Improving immunization strategies. , 2007, Physical review. E, Statistical, nonlinear, and soft matter physics.

[41]  Noa Agmon,et al.  Multi-robot area patrol under frequency constraints , 2007, Proceedings 2007 IEEE International Conference on Robotics and Automation.

[42]  Gerald G. Brown,et al.  Defending Critical Infrastructure , 2006, Interfaces.

[43]  Vincent Conitzer,et al.  Computing the optimal strategy to commit to , 2006, EC '06.

[44]  B. Roberson The Colonel Blotto game , 2006 .

[45]  John Doyle,et al.  Evolutionary dynamics and highly optimized tolerance. , 2005, Journal of theoretical biology.

[46]  Sampath Kannan,et al.  Randomized pursuit-evasion in a polygonal environment , 2005, IEEE Transactions on Robotics.

[47]  Huseyin Cavusoglu,et al.  The Value of Intrusion Detection Systems in Information Technology Security Architecture , 2005, Inf. Syst. Res..

[48]  D. Watts,et al.  A generalized model of social and biological contagion. , 2005, Journal of theoretical biology.

[49]  Tim Roughgarden,et al.  The price of stability for network design with fair cost allocation , 2004, 45th Annual IEEE Symposium on Foundations of Computer Science.

[50]  Yann Chevaleyre,et al.  Theoretical analysis of the multi-agent patrolling problem , 2004, Proceedings. IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2004. (IAT 2004)..

[51]  Huseyin Cavusoglu,et al.  Configuration of Detection Software: A Comparison of Decision and Game Theory Approaches , 2004, Decis. Anal..

[52]  B. K. Mishra,et al.  A model for evaluating IT security investments , 2004, CACM.

[53]  John E. Gaffney,et al.  A Decision Analysis Method for Evaluating Computer Intrusion Detection Systems , 2004, Decis. Anal..

[54]  Micah Adler,et al.  Randomized Pursuit-Evasion in Graphs , 2002, Combinatorics, Probability and Computing.

[55]  William H. Ruckle,et al.  Continuous accumulation games on discrete locations , 2002 .

[56]  M. Newman,et al.  Optimal design, robustness, and risk aversion. , 2002, Physical review letters.

[57]  Alessandro Vespignani,et al.  Immunization of complex networks. , 2001, Physical review. E, Statistical, nonlinear, and soft matter physics.

[58]  John Doyle,et al.  Complexity and robustness , 2001, Proceedings of the National Academy of Sciences of the United States of America.

[59]  A. Barabasi,et al.  Error and attack tolerance of complex networks , 2000, Nature.

[60]  Doyle,et al.  Highly optimized tolerance: robustness and design in complex systems , 2000, Physical review letters.

[61]  Christos H. Papadimitriou,et al.  Worst-case Equilibria , 1999, STACS.

[62]  J. Doyle,et al.  Highly optimized tolerance: a mechanism for power laws in designed systems. , 1998, Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary topics.

[63]  David P. Morton,et al.  Stochastic Network Interdiction , 1998, Oper. Res..

[64]  Tom Fawcett,et al.  Analysis and Visualization of Classifier Performance: Comparison under Imprecise Class and Cost Distributions , 1997, KDD.

[65]  J. Filar,et al.  Competitive Markov Decision Processes , 1996 .

[66]  R. Kevin Wood,et al.  Deterministic network interdiction , 1993 .

[67]  Fan Chung Graham,et al.  Pursuit - Evasion games on graphs , 1988, J. Graph Theory.

[68]  Tang,et al.  Self-Organized Criticality: An Explanation of 1/f Noise , 2011 .

[69]  Steve Alpern,et al.  The search value of a network , 1985, Networks.

[70]  Garth P. McCormick,et al.  Computability of global solutions to factorable nonconvex programs: Part I — Convex underestimating problems , 1976, Math. Program..

[71]  J. Neumann,et al.  Theory of games and economic behavior , 1945, 100 Years of Math Milestones.

[72]  Huseyin Cavusoglu,et al.  Intrusion-Detection Policies for IT Security Breaches , 2008, INFORMS J. Comput..

[73]  Tim Roughgarden,et al.  Selfish routing and the price of anarchy , 2005 .

[74]  C. Gollier The economics of risk and time , 2001 .

[75]  D. Fudenberg,et al.  The Theory of Learning in Games , 1998 .

[76]  S. Gal Search Games with Mobile and Immobile Hider , 1979 .

[77]  T. D. Parsons,et al.  Pursuit-evasion in a graph , 1978 .

[78]  M. M. Flood THE HIDE AND SEEK GAME OF VON NEUMANN , 1972 .

[79]  Jack Edmonds,et al.  Maximum matching and a polyhedron with 0,1-vertices , 1965 .