The human element: addressing human adversaries in security domains
暂无分享,去创建一个
[1] Herbert A. Simon,et al. The Sciences of the Artificial , 1970 .
[2] O. Holsti,et al. Essence of Decision: Explaining the Cuban Missile Crisis , 1972 .
[3] Milind Tambe,et al. A unified method for handling discrete and continuous uncertainty in Bayesian Stackelberg games , 2012, AAMAS.
[4] Manish Jain,et al. Software Assistants for Randomized Patrol Planning for the LAX Airport Police and the Federal Air Marshal Service , 2010, Interfaces.
[5] Max Abrahms,et al. What Terrorists Really Want: Terrorist Motives and Counterterrorism Strategy , 2008, International Security.
[6] S. Tijs. Nash equilibria for noncooperative n-person games in normal form , 1981 .
[7] Nicola Gatti,et al. Game Theoretical Insights in Strategic Patrolling: Model and Algorithm in Normal-Form , 2008, ECAI.
[8] Ya'akov Gal,et al. A cultural sensitive agent for human-computer negotiation , 2012, AAMAS.
[9] Bo An,et al. PROTECT: An Application of Computational Game Theory for the Security of the Ports of the United States , 2012, AAAI.
[10] Sarit Kraus,et al. Robust solutions to Stackelberg games: Addressing bounded rationality and limited observations in human cognition , 2010, Artif. Intell..
[11] Milind Tambe,et al. TRUSTS: Scheduling Randomized Patrols for Fare Inspection in Transit Systems , 2012, IAAI.
[12] Milind Tambe,et al. Patrol Strategies to Maximize Pristine Forest Area , 2012, AAAI.
[13] Nicola Basilico,et al. Leader-follower strategies for robotic patrolling in environments with arbitrary topologies , 2009, AAMAS.
[14] C. Starmer. Developments in Non-expected Utility Theory: The Hunt for a Descriptive Theory of Choice under Risk , 2000 .
[15] Vincent Conitzer,et al. A double oracle algorithm for zero-sum security games on graphs , 2011, AAMAS.
[16] H. Rosoff,et al. Decision Analysis by Proxy for the Rational Terrorist , 2022 .
[17] Moshe Tennenholtz,et al. Mechanism Design with Execution Uncertainty , 2002, UAI.
[18] Milind Tambe,et al. GUARDS: game theoretic security allocation on a national scale , 2011, AAMAS.
[19] Robert T. Clemen,et al. Subjective Probability Assessment in Decision Analysis: Partition Dependence and Bias Toward the Ignorance Prior , 2005, Manag. Sci..
[20] T. Başar,et al. Dynamic Noncooperative Game Theory , 1982 .
[21] Brian A. Jackson,et al. Understanding the Role of Deterrence in Counterterrorism Security , 2009 .
[22] Sarit Kraus,et al. Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS 2008.
[23] M. Friedman. The Use of Ranks to Avoid the Assumption of Normality Implicit in the Analysis of Variance , 1937 .
[24] Jonathan Gratch,et al. The effect of expression of anger and happiness in computer agents on negotiations with humans , 2011, AAMAS.
[25] Edgar Brunner,et al. Rank-Score Tests in Factorial Designs with Repeated Measures , 1999 .
[26] A. Rubinstein. Modeling Bounded Rationality , 1998 .
[27] Gerald G. Brown,et al. A Two-Sided Optimization for Theater Ballistic Missile Defense , 2005, Oper. Res..
[28] Kelly E. See,et al. Between ignorance and truth: Partition dependence and learning in judgment under uncertainty. , 2006, Journal of experimental psychology. Learning, memory, and cognition.
[29] Dimitris Bertsimas,et al. Robust game theory , 2006, Math. Program..
[30] A. Tversky,et al. Prospect theory: an analysis of decision under risk — Source link , 2007 .
[31] K. Yuen,et al. The two-sample trimmed t for unequal population variances , 1974 .
[32] Mathew D. McCubbins,et al. The Theory of Minds Within the Theory of Games , 2012 .
[33] P. Petta,et al. Computational models of emotion , 2010 .
[34] Manish Jain,et al. Computing optimal randomized resource allocations for massive security games , 2009, AAMAS 2009.
[35] Kevin Chlebik. Terrorism and Game Theory: From the Terrorists’ Point of View , 2010 .
[36] Christopher Archibald,et al. Modeling billiards games , 2009, AAMAS.
[37] Fernando Ordóñez,et al. Robust Wardrop Equilibrium , 2007, NET-COOP.
[38] P. Greenwood,et al. A Guide to Chi-Squared Testing , 1996 .
[39] Kevin Leyton-Brown,et al. Beyond equilibrium: predicting human behaviour in normal form games , 2010, AAAI.
[40] R. Wilcox. Introduction to Robust Estimation and Hypothesis Testing , 1997 .
[41] G. Leitmann. On generalized Stackelberg strategies , 1978 .
[42] Sarit Kraus,et al. Multi-Robot Adversarial Patrolling: Facing a Full-Knowledge Opponent , 2011, J. Artif. Intell. Res..
[43] Richard Mesic,et al. Implementing Security Improvement Options at Los Angeles International Airport , 2006 .
[44] Bo An,et al. Security Games with Limited Surveillance , 2012, AAAI.
[45] H. Stackelberg,et al. Marktform und Gleichgewicht , 1935 .
[46] Manish Jain,et al. Quality-bounded solutions for finite Bayesian Stackelberg games: scaling up , 2011, AAMAS.
[47] Milind Tambe,et al. Urban Security: Game-Theoretic Resource Allocation in Networked Domains , 2010, AAAI.
[48] R. Wilcox. Applying Contemporary Statistical Techniques , 2003 .
[49] J. Neumann. Zur Theorie der Gesellschaftsspiele , 1928 .
[50] R. Selten,et al. A Generalized Nash Solution for Two-Person Bargaining Games with Incomplete Information , 1972 .
[51] A. Tversky,et al. Subjective Probability: A Judgment of Representativeness , 1972 .
[52] Reinhard Selten,et al. Evolutionary stability in extensive two-person games - correction and further development , 1988 .
[53] Milind Tambe,et al. Approximation methods for infinite Bayesian Stackelberg games: modeling distributional payoff uncertainty , 2011, AAMAS.
[54] V. Bier,et al. SECRECY AND DECEPTION AT EQUILIBRIUM, WITH APPLICATIONS TO ANTI‐TERRORISM RESOURCE ALLOCATION , 2011 .
[55] Paul Gill,et al. Comparing Role-Specific Terrorist Profiles , 2011 .
[56] Vincent Conitzer,et al. Computing the optimal strategy to commit to , 2006, EC '06.
[57] R. McKelvey,et al. Quantal Response Equilibria for Normal Form Games , 1995 .
[58] Vincent Conitzer,et al. Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness , 2011, J. Artif. Intell. Res..
[59] ปิยดา สมบัติวัฒนา. Behavioral Game Theory: Experiments in Strategic Interaction , 2013 .
[60] Jeannette M. Wing,et al. Game strategies in network security , 2005, International Journal of Information Security.
[61] Rong Yang,et al. Improving Resource Allocation Strategy against Human Adversaries in Security Games , 2011, IJCAI.
[62] Craig R. Fox,et al. Partition Priming in Judgment Under Uncertainty , 2003, Psychological science.
[63] Barry Turner,et al. Sveriges Riksbank Prize in Economic Sciences in Memory of Alfred Nobel , 2013 .
[64] A. Haurie,et al. Sequential Stackelberg equilibria in two-person games , 1985 .
[65] A. Tversky,et al. Support theory: A nonextensional representation of subjective probability. , 1994 .
[66] Louise Richardson,et al. What Terrorists Want: Understanding the Enemy, Containing the Threat , 2006 .
[67] Rand R. Wilcox,et al. How many discoveries have been lost by ignoring modern statistical methods , 1998 .
[68] H. Simon,et al. Rational choice and the structure of the environment. , 1956, Psychological review.
[69] Yoav Shoham,et al. Run the GAMUT: a comprehensive approach to evaluating game-theoretic algorithms , 2004, Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, 2004. AAMAS 2004..
[70] C. Falaster. Essence of Decision: Explaining the Cuban Missile Crisis , 2014 .
[71] Sarit Kraus,et al. Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games , 2008, AAMAS.
[72] B. Stengel,et al. Leadership with commitment to mixed strategies , 2004 .
[73] Manish Jain,et al. Risk-Averse Strategies for Security Games with Execution and Observational Uncertainty , 2011, AAAI.
[74] D. Koehler,et al. Probability matching in choice under uncertainty: Intuition versus deliberation , 2009, Cognition.
[75] D. von Winterfeldt,et al. Identifying and Structuring the Objectives of Terrorists , 2010, Risk analysis : an official publication of the Society for Risk Analysis.