Exploiting Adversary's Risk Profiles in Imperfect Information Security Games
暂无分享,去创建一个
[1] Stephanie Freeman. The Highest Stakes Poker Game Ever Played : Ronald Reagan, Mikhail Gorbachev, and the Reykjavik Summit of 1986 , 2010 .
[2] Wei Jiang,et al. Optimal Network Security Strengthening Using Attack-Defense Game Model , 2009, 2009 Sixth International Conference on Information Technology: New Generations.
[3] Wei Jiang,et al. A Game Theoretic Method for Decision and Analysis of the Optimal Active Defense Strategy , 2007, 2007 International Conference on Computational Intelligence and Security (CIS 2007).
[4] Jing Zhao,et al. A Model of Hierarchical Key Assignment Scheme with CRT , 2007, 2007 International Conference on Computational Intelligence and Security (CIS 2007).
[5] Darse Billings. Algorithms and assessment in computer poker , 2006 .
[6] Jeannette M. Wing,et al. Game strategies in network security , 2005, International Journal of Information Security.
[7] D. Papp. Dealing with imperfect information in poker , 1998 .
[8] Jonathan Schaeffer,et al. Opponent Modeling in Poker , 1998, AAAI/IAAI.
[9] A. Tversky,et al. Advances in prospect theory: Cumulative representation of uncertainty , 1992 .
[10] A. Tversky,et al. Prospect Theory : An Analysis of Decision under Risk Author ( s ) : , 2007 .
[11] A. Tversky,et al. Prospect theory: analysis of decision under risk , 1979 .
[12] J. Neumann,et al. Theory of games and economic behavior , 1945, 100 Years of Math Milestones.