Optimal Interdiction of Illegal Network Flow
暂无分享,去创建一个
Chunyan Miao | Bo An | Yair Zick | Qingyu Guo | Bo An | C. Miao | Yair Zick | Qingyu Guo
[1] Bo An,et al. Coalitional Security Games , 2016, AAMAS.
[2] Avrim Blum,et al. Planning in the Presence of Cost Functions Controlled by an Adversary , 2003, ICML.
[3] Robert L. Steinrauf. Network Interdiction Models , 1991 .
[4] Vincent Conitzer,et al. A double oracle algorithm for zero-sum security games on graphs , 2011, AAMAS.
[5] Milind Tambe,et al. Urban Security: Game-Theoretic Resource Allocation in Networked Domains , 2010, AAAI.
[6] E. Todeva. Networks , 2007 .
[7] Pierre Hansen,et al. Variable neighborhood search: Principles and applications , 1998, Eur. J. Oper. Res..
[8] R. Kevin Wood,et al. Shortest‐path network interdiction , 2002, Networks.
[9] A. K. Mittal,et al. The k most vital arcs in the shortest path problem , 1990 .
[10] Zhen Wang,et al. Computing Optimal Monitoring Strategy for Detecting Terrorist Plots , 2016, AAAI.
[11] H. Nikaidô. On von Neumann’s minimax theorem , 1954 .
[12] Gerhard J. Woeginger,et al. Operations Research Letters , 2011 .
[13] Richard L. Church,et al. Identifying Critical Infrastructure: The Median and Covering Facility Interdiction Problems , 2004 .
[14] Özlem Ergun,et al. The Maximum Flow Network Interdiction Problem: Valid inequalities, integrality gaps, and approximability , 2010, Oper. Res. Lett..
[15] Feng Pan,et al. Stochastic network interdiction: models and methods , 2005 .
[16] R. Kevin Wood,et al. Deterministic network interdiction , 1993 .
[17] Bo An,et al. Computing Optimal Mixed Strategies for Security Games with Dynamic Payoffs , 2015, IJCAI.
[18] Bo An,et al. Game-Theoretic Resource Allocation for Protecting Large Public Events , 2014, AAAI.
[19] J. Meigs,et al. WHO Technical Report , 1954, The Yale Journal of Biology and Medicine.
[20] Branislav Bosanský,et al. Game-theoretic resource allocation for malicious packet detection in computer networks , 2012, AAMAS.
[21] BERNARD M. WAXMAN,et al. Routing of multipoint connections , 1988, IEEE J. Sel. Areas Commun..
[22] Milind Tambe,et al. Urban security: game-theoretic resource allocation in networked physical domains , 2010, AAAI 2010.
[23] Bo An,et al. Security games with surveillance cost and optimal timing of attack execution , 2013, AAMAS.
[24] Vincent Conitzer,et al. Security scheduling for real-world networks , 2013, AAMAS.
[25] Michael T. Gastner,et al. The spatial structure of networks , 2006 .
[26] R. Vohra,et al. Finding the most vital arcs in a network , 1989 .
[27] Bo An,et al. Security Games with Protection Externalities , 2015, AAAI.
[28] Milind Tambe,et al. Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned , 2011 .