Defender Stackelberg Game with Inverse Geodesic Length as Utility Metric
暂无分享,去创建一个
Serge Gaspers | Haris Aziz | Kamran Najeebullah | Edward J. Lee | H. Aziz | Serge Gaspers | K. Najeebullah | Edward J. Lee
[1] John Dunagan,et al. Active Graph Reachability Reduction for Network Security and Software Engineering , 2011, IJCAI.
[2] Serge Gaspers,et al. Weakening Covert Networks by Minimizing Inverse Geodesic Length , 2017, IJCAI.
[3] Talal Rahwan,et al. Strategic Social Network Analysis , 2017, AAAI.
[4] Beom Jun Kim,et al. Attack vulnerability of complex networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.
[5] Mikkel Thorup,et al. Undirected single-source shortest paths with positive integer weights in linear time , 1999, JACM.
[6] Daniel Lokshtanov,et al. Parameterized Integer Quadratic Programming: Variables and Coefficients , 2015, ArXiv.
[7] Albert-László Barabási,et al. Destruction perfected , 2015, Nature.
[8] Duncan J. Watts,et al. Collective dynamics of ‘small-world’ networks , 1998, Nature.
[9] Michael R. Fellows,et al. On the complexity of some colorful problems parameterized by treewidth , 2011, Inf. Comput..
[10] Reinhard Diestel,et al. Graph Theory , 1997 .
[11] Michael R. Fellows,et al. Review of: Fundamentals of Parameterized Complexity by Rodney G. Downey and Michael R. Fellows , 2015, SIGA.
[12] Magnus Wahlström,et al. Algorithms, measures and upper bounds for satisfiability and related problems , 2007 .
[13] Ge Xia,et al. Improved upper bounds for vertex cover , 2010, Theor. Comput. Sci..
[14] Piotr Faliszewski,et al. Elections with Few Candidates: Prices, Weights, and Covering Problems , 2015, ADT.
[15] Oskar Skibski,et al. Defeating Terrorist Networks with Game Theory , 2015, IEEE Intelligent Systems.
[16] Massimo Marchiori,et al. Error and attacktolerance of complex network s , 2004 .
[17] Michael Lampis. Algorithmic Meta-theorems for Restrictions of Treewidth , 2010, ESA.
[18] Juliane Hahn,et al. Security And Game Theory Algorithms Deployed Systems Lessons Learned , 2016 .
[19] Pim van 't Hof,et al. On the Computational Complexity of Vertex Integrity and Component Order Connectivity , 2014, Algorithmica.
[20] Vincent Conitzer,et al. A double oracle algorithm for zero-sum security games on graphs , 2011, AAMAS.
[21] V Latora,et al. Efficient behavior of small-world networks. , 2001, Physical review letters.
[22] Sarit Kraus,et al. Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS 2008.
[23] John T. Saccoman,et al. A Survey of Component Order Connectivity Models of Graph Theoretic Networks , 2013 .
[24] Bo An,et al. Coalitional Security Games , 2016, AAMAS.
[25] Fedor V. Fomin,et al. Iterative compression and exact algorithms , 2010, Theor. Comput. Sci..
[26] Yicheng Zhang,et al. Identifying influential nodes in complex networks , 2012 .
[27] Hernán A. Makse,et al. Influence maximization in complex networks through optimal percolation , 2015, Nature.
[28] M. V. Valkenburg. Network Analysis , 1964 .
[29] Milind Tambe,et al. Security Games for Controlling Contagion , 2012, AAAI.
[30] Milind Tambe,et al. Security and Game Theory: IRIS – A Tool for Strategic Security Allocation in Transportation Networks , 2011, AAMAS 2011.
[31] Rolf Niedermeier,et al. Parameterized Complexity of Vertex Cover Variants , 2007, Theory of Computing Systems.
[32] Talal Rahwan,et al. Efficient algorithms for game-theoretic betweenness centrality , 2016, Artif. Intell..
[33] Nicholas R. Jennings,et al. Computational Analysis of Connectivity Games with Applications to the Investigation of Terrorist Networks , 2013, IJCAI.
[34] Vincent Conitzer,et al. Security scheduling for real-world networks , 2013, AAMAS.
[35] Toshihide Ibaraki,et al. Algorithmic Aspects of Graph Connectivity , 2008, Encyclopedia of Mathematics and its Applications.
[36] Chunyan Miao,et al. Optimal Interdiction of Illegal Network Flow , 2016, IJCAI.
[37] Manish Jain,et al. Security Games with Arbitrary Schedules: A Branch and Price Approach , 2010, AAAI.
[38] Rolf Niedermeier,et al. An efficient fixed-parameter algorithm for 3-Hitting Set , 2003, J. Discrete Algorithms.
[39] Zhen Wang,et al. Computing Optimal Monitoring Strategy for Detecting Terrorist Plots , 2016, AAAI.