Exploiting Adversary's Risk Profiles in Imperfect Information Security Games

[1]  Stephanie Freeman The Highest Stakes Poker Game Ever Played : Ronald Reagan, Mikhail Gorbachev, and the Reykjavik Summit of 1986 , 2010 .

[2]  Wei Jiang,et al.  Optimal Network Security Strengthening Using Attack-Defense Game Model , 2009, 2009 Sixth International Conference on Information Technology: New Generations.

[3]  Wei Jiang,et al.  A Game Theoretic Method for Decision and Analysis of the Optimal Active Defense Strategy , 2007, 2007 International Conference on Computational Intelligence and Security (CIS 2007).

[4]  Jing Zhao,et al.  A Model of Hierarchical Key Assignment Scheme with CRT , 2007, 2007 International Conference on Computational Intelligence and Security (CIS 2007).

[5]  Darse Billings Algorithms and assessment in computer poker , 2006 .

[6]  Jeannette M. Wing,et al.  Game strategies in network security , 2005, International Journal of Information Security.

[7]  D. Papp Dealing with imperfect information in poker , 1998 .

[8]  Jonathan Schaeffer,et al.  Opponent Modeling in Poker , 1998, AAAI/IAAI.

[9]  A. Tversky,et al.  Advances in prospect theory: Cumulative representation of uncertainty , 1992 .

[10]  A. Tversky,et al.  Prospect Theory : An Analysis of Decision under Risk Author ( s ) : , 2007 .

[11]  A. Tversky,et al.  Prospect theory: analysis of decision under risk , 1979 .

[12]  J. Neumann,et al.  Theory of games and economic behavior , 1945, 100 Years of Math Milestones.