Beware the Soothsayer: From Attack Prediction Accuracy to Predictive Reliability in Security Games
暂无分享,去创建一个
Milind Tambe | Francesco Maria Delle Fave | Thanh Hong Nguyen | Benjamin J. Ford | Nicole D. Sintov | Milind Tambe | T. Nguyen | F. D. Fave
[1] Sarit Kraus,et al. Game-Theoretic Patrolling with Dynamic Execution Uncertainty and a Case Study on a Real Transit System , 2014, J. Artif. Intell. Res..
[2] Rong Yang,et al. Modeling Human Bounded Rationality to Improve Defender Strategies in Network Security Games , 2012 .
[3] David P. Morton,et al. Models for nuclear smuggling interdiction , 2007 .
[4] Milind Tambe,et al. Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned , 2011 .
[5] David Eppstein,et al. Studying (non-planar) road networks through an algorithmic lens , 2008, GIS '08.
[6] Gary Charness,et al. Journal of Economic Behavior & Organization , 2022 .
[7] Milind Tambe,et al. Game-Theoretic Security Patrolling with Dynamic Execution Uncertainty and a Case Study on a Real Transit System , 2014 .
[8] Vincent Conitzer,et al. Security scheduling for real-world networks , 2013, AAMAS.
[9] Milind Tambe,et al. Urban security: game-theoretic resource allocation in networked physical domains , 2010, AAAI 2010.
[10] Milind Tambe,et al. "A Game of Thrones": When Human Behavior Models Compete in Repeated Stackelberg Security Games , 2015, AAMAS.
[11] Richard S. John,et al. Empirical Comparisons of Descriptive Multi-objective Adversary Models in Stackelberg Security Games , 2014, GameSec.
[12] Vincent Conitzer,et al. A double oracle algorithm for zero-sum security games on graphs , 2011, AAMAS.
[13] Feng Pan,et al. Optimal Interdiction of Unreactive Markovian Evaders , 2009, CPAIOR.
[14] Bo An,et al. PROTECT: a deployed game theoretic system to protect the ports of the United States , 2012, AAMAS.
[15] Nicole D. Sintov,et al. Human Adversaries in Opportunistic Crime Security Games: Evaluating Competing Bounded Rationality Models , 2015 .
[16] Amos Azaria,et al. Analyzing the Effectiveness of Adversary Modeling in Security Games , 2013, AAAI.
[17] Rong Yang,et al. Computing optimal strategy against quantal response in security games , 2012, AAMAS.
[18] M G H Bell,et al. Attacker–defender models and road network vulnerability , 2008, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.
[19] Jeannette M. Wing,et al. Measuring a System's Attack Surface , 2004 .
[20] Colin Camerer. Behavioral Game Theory: Experiments in Strategic Interaction , 2003 .
[21] Milind Tambe,et al. Comparing human behavior models in repeated Stackelberg security games: An extended study , 2016, Artif. Intell..
[22] José R. Correa,et al. Fare Evasion in Transit Networks , 2014, Oper. Res..