Strategic analysis of complex security scenarios.
暂无分享,去创建一个
[1] Steve Alpern,et al. Accumulation games on graphs , 2014, Networks.
[2] Yevgeniy Vorobeychik,et al. Computing Optimal Security Strategies for Interdependent Assets , 2012, UAI.
[3] Vincent Conitzer,et al. Computing Optimal Strategies to Commit to in Stochastic Games , 2012, AAAI.
[4] Milind Tambe,et al. Security Games for Controlling Contagion , 2012, AAAI.
[5] Bo An,et al. PROTECT: a deployed game theoretic system to protect the ports of the United States , 2012, AAMAS.
[6] Nicola Basilico,et al. Patrolling security games: Definition and algorithms for solving large instances with single patroller and single intruder , 2012, Artif. Intell..
[7] Steve Alpern,et al. Patrolling Games , 2011, Oper. Res..
[8] Sarit Kraus,et al. Multi-Robot Adversarial Patrolling: Facing a Full-Knowledge Opponent , 2011, J. Artif. Intell. Res..
[9] Noa Agmon,et al. Multiagent Patrol Generalized to Complex Environmental Conditions , 2011, AAAI.
[10] Vincent Conitzer,et al. Commitment to Correlated Strategies , 2011, AAAI.
[11] Branislav Bosanský,et al. Computing time-dependent policies for patrolling games with mobile targets , 2011, AAMAS.
[12] Vincent Conitzer,et al. A double oracle algorithm for zero-sum security games on graphs , 2011, AAMAS.
[13] Terrence August,et al. Who Should be Responsible for Software Security? A Comparative Analysis of Liability Policies in Network Environments , 2011, WEIS.
[14] Vincent Conitzer,et al. Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness , 2011, J. Artif. Intell. Res..
[15] Bo An,et al. GUARDS and PROTECT: next generation applications of security games , 2011, SECO.
[16] Tansu Alpcan,et al. Integrated security risk management for IT-intensive organizations , 2010, 2010 Sixth International Conference on Information Assurance and Security.
[17] Milind Tambe,et al. Urban security: game-theoretic resource allocation in networked physical domains , 2010, AAAI 2010.
[18] Manish Jain,et al. Security Games with Arbitrary Schedules: A Branch and Price Approach , 2010, AAAI.
[19] Nicola Basilico,et al. Asynchronous Multi-Robot Patrolling against Intrusions in Arbitrary Topologies , 2010, AAAI.
[20] Vincent Conitzer,et al. Complexity of Computing Optimal Stackelberg Strategies in Security Resource Allocation Games , 2010, AAAI.
[21] Manish Jain,et al. Software Assistants for Randomized Patrol Planning for the LAX Airport Police and the Federal Air Marshal Service , 2010, Interfaces.
[22] Bernhard von Stengel,et al. Leadership games with convex strategy sets , 2010, Games Econ. Behav..
[23] Vincent Conitzer,et al. Computing optimal strategies to commit to in extensive-form games , 2010, EC '10.
[24] Mark Newman,et al. Networks: An Introduction , 2010 .
[25] Tuomas Sandholm,et al. Computing equilibria by incorporating qualitative models? , 2010, AAMAS.
[26] M. Nehme. Two-person games for stochastic network interdiction : models, methods, and complexities , 2009 .
[27] Vincent Conitzer,et al. Multi-Step Multi-Sensor Hider-Seeker Games , 2009, IJCAI.
[28] Gerald G. Brown,et al. Interdicting a Nuclear-Weapons Project , 2009, Oper. Res..
[29] Nicola Basilico,et al. Leader-follower strategies for robotic patrolling in environments with arbitrary topologies , 2009, AAMAS.
[30] Manish Jain,et al. Computing optimal randomized resource allocations for massive security games , 2009, AAMAS.
[31] Sarit Kraus,et al. Using Game Theory for Los Angeles Airport Security , 2009, AI Mag..
[32] Olivier Buffet,et al. Theoretical Study of Ant-based Algorithms for Multi-Agent Patrolling , 2008, ECAI.
[33] Sarit Kraus,et al. Multi-robot perimeter patrol in adversarial settings , 2008, 2008 IEEE International Conference on Robotics and Automation.
[34] Michael P. Wellman,et al. Stochastic Search Methods for Nash Equilibrium Approximation in Simulation-based Games , 2022 .
[35] Nicolas Christin,et al. Secure or insure?: a game-theoretic analysis of information security games , 2008, WWW.
[36] Jun Zhang,et al. Security Patch Management: Share the Burden or Share the Damage? , 2008, Manag. Sci..
[37] Joel C. Miller,et al. Effective vaccination strategies for realistic social networks , 2007 .
[38] Vicki M. Bier,et al. Balancing Terrorism and Natural Disasters - Defensive Strategy with Endogenous Attacker Effort , 2007, Oper. Res..
[39] David Patrick Duggan,et al. Categorizing threat : building and using a generic threat matrix. , 2007 .
[40] Shlomo Havlin,et al. Improving immunization strategies. , 2007, Physical review. E, Statistical, nonlinear, and soft matter physics.
[41] Noa Agmon,et al. Multi-robot area patrol under frequency constraints , 2007, Proceedings 2007 IEEE International Conference on Robotics and Automation.
[42] Gerald G. Brown,et al. Defending Critical Infrastructure , 2006, Interfaces.
[43] Vincent Conitzer,et al. Computing the optimal strategy to commit to , 2006, EC '06.
[44] B. Roberson. The Colonel Blotto game , 2006 .
[45] John Doyle,et al. Evolutionary dynamics and highly optimized tolerance. , 2005, Journal of theoretical biology.
[46] Sampath Kannan,et al. Randomized pursuit-evasion in a polygonal environment , 2005, IEEE Transactions on Robotics.
[47] Huseyin Cavusoglu,et al. The Value of Intrusion Detection Systems in Information Technology Security Architecture , 2005, Inf. Syst. Res..
[48] D. Watts,et al. A generalized model of social and biological contagion. , 2005, Journal of theoretical biology.
[49] Tim Roughgarden,et al. The price of stability for network design with fair cost allocation , 2004, 45th Annual IEEE Symposium on Foundations of Computer Science.
[50] Yann Chevaleyre,et al. Theoretical analysis of the multi-agent patrolling problem , 2004, Proceedings. IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2004. (IAT 2004)..
[51] Huseyin Cavusoglu,et al. Configuration of Detection Software: A Comparison of Decision and Game Theory Approaches , 2004, Decis. Anal..
[52] B. K. Mishra,et al. A model for evaluating IT security investments , 2004, CACM.
[53] John E. Gaffney,et al. A Decision Analysis Method for Evaluating Computer Intrusion Detection Systems , 2004, Decis. Anal..
[54] Micah Adler,et al. Randomized Pursuit-Evasion in Graphs , 2002, Combinatorics, Probability and Computing.
[55] William H. Ruckle,et al. Continuous accumulation games on discrete locations , 2002 .
[56] M. Newman,et al. Optimal design, robustness, and risk aversion. , 2002, Physical review letters.
[57] Alessandro Vespignani,et al. Immunization of complex networks. , 2001, Physical review. E, Statistical, nonlinear, and soft matter physics.
[58] John Doyle,et al. Complexity and robustness , 2001, Proceedings of the National Academy of Sciences of the United States of America.
[59] A. Barabasi,et al. Error and attack tolerance of complex networks , 2000, Nature.
[60] Doyle,et al. Highly optimized tolerance: robustness and design in complex systems , 2000, Physical review letters.
[61] Christos H. Papadimitriou,et al. Worst-case Equilibria , 1999, STACS.
[62] J. Doyle,et al. Highly optimized tolerance: a mechanism for power laws in designed systems. , 1998, Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary topics.
[63] David P. Morton,et al. Stochastic Network Interdiction , 1998, Oper. Res..
[64] Tom Fawcett,et al. Analysis and Visualization of Classifier Performance: Comparison under Imprecise Class and Cost Distributions , 1997, KDD.
[65] J. Filar,et al. Competitive Markov Decision Processes , 1996 .
[66] R. Kevin Wood,et al. Deterministic network interdiction , 1993 .
[67] Fan Chung Graham,et al. Pursuit - Evasion games on graphs , 1988, J. Graph Theory.
[68] Tang,et al. Self-Organized Criticality: An Explanation of 1/f Noise , 2011 .
[69] Steve Alpern,et al. The search value of a network , 1985, Networks.
[70] Garth P. McCormick,et al. Computability of global solutions to factorable nonconvex programs: Part I — Convex underestimating problems , 1976, Math. Program..
[71] J. Neumann,et al. Theory of games and economic behavior , 1945, 100 Years of Math Milestones.
[72] Huseyin Cavusoglu,et al. Intrusion-Detection Policies for IT Security Breaches , 2008, INFORMS J. Comput..
[73] Tim Roughgarden,et al. Selfish routing and the price of anarchy , 2005 .
[74] C. Gollier. The economics of risk and time , 2001 .
[75] D. Fudenberg,et al. The Theory of Learning in Games , 1998 .
[76] S. Gal. Search Games with Mobile and Immobile Hider , 1979 .
[77] T. D. Parsons,et al. Pursuit-evasion in a graph , 1978 .
[78] M. M. Flood. THE HIDE AND SEEK GAME OF VON NEUMANN , 1972 .
[79] Jack Edmonds,et al. Maximum matching and a polyhedron with 0,1-vertices , 1965 .