暂无分享,去创建一个
Minming Li | Xinyu Yang | Weijia Jia | Xiaowei Wu | Haoxing Lin | Rufan Bai | Minming Li | Xinyu Yang | Xiaowei Wu | Rufan Bai | Haoxing Lin | Weijia Jia
[1] Aric Hagberg,et al. Exploring Network Structure, Dynamics, and Function using NetworkX , 2008, Proceedings of the Python in Science Conference.
[2] N. Assimakopoulos,et al. A network interdiction model for hospital infection control. , 1987, Computers in biology and medicine.
[3] Yevgeniy Vorobeychik,et al. Securing interdependent assets , 2012, Autonomous Agents and Multi-Agent Systems.
[4] Tansu Alpcan,et al. Stochastic games for security in networks with interdependent nodes , 2009, 2009 International Conference on Game Theory for Networks.
[5] Ulrik Brandes,et al. Efficient generation of large random networks. , 2005, Physical review. E, Statistical, nonlinear, and soft matter physics.
[6] Subhash Khot,et al. Vertex cover might be hard to approximate to within 2-/spl epsiv/ , 2003, 18th IEEE Annual Conference on Computational Complexity, 2003. Proceedings..
[7] Yevgeniy Vorobeychik,et al. Multidefender Security Games , 2015, IEEE Intelligent Systems.
[8] Jure Leskovec,et al. Learning to Discover Social Circles in Ego Networks , 2012, NIPS.
[9] H. Kunreuther,et al. Interdependent Security , 2003 .
[10] Nicolas Christin,et al. Uncertainty in Interdependent Security Games , 2010, GameSec.
[11] Luis E. Ortiz,et al. Interdependent Defense Games: Modeling Interdependent Security under Deliberate Attacks , 2012, UAI.
[12] Miroslav Chlebík,et al. Complexity of approximating bounded variants of optimization problems , 2006, Theor. Comput. Sci..
[13] Bo An,et al. Stackelberg Security Games: Looking Beyond a Decade of Success , 2018, IJCAI.
[14] Brian M. Mazanec,et al. Attack , 2018, Understanding Cyber Warfare.
[15] Nicholas R. Jennings,et al. Optimal Escape Interdiction on Transportation Networks , 2017, IJCAI.
[16] Bo An,et al. Security Games with Protection Externalities , 2015, AAAI.
[17] Moez Draief,et al. Contagion and observability in security domains , 2013, 2013 51st Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[18] Luis E. Ortiz,et al. Interdependent Defense Games with Applications to Internet Security at the Level of Autonomous Systems , 2017, Games.
[19] James Aspnes,et al. Inoculation strategies for victims of viruses and the sum-of-squares partition problem , 2005, SODA '05.
[20] Piotr Berman,et al. On Approximation Properties of the Independent Set Problem for Low Degree Graphs , 1999, Theory of Computing Systems.
[21] Vincent Conitzer,et al. Learning and Approximating the Optimal Strategy to Commit To , 2009, SAGT.
[22] Milind Tambe,et al. A unified method for handling discrete and continuous uncertainty in Bayesian Stackelberg games , 2012, AAMAS.
[23] Bo An,et al. Computing Optimal Mixed Strategies for Security Games with Dynamic Payoffs , 2015, IJCAI.
[24] Milind Tambe,et al. Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned , 2011 .
[25] S. Goyal,et al. Attack, Defence, and Contagion in Networks , 2014 .
[26] Piotr Berman,et al. On the Approximation Properties of Independent Set Problem in Degree 3 Graphs , 1999, WADS.
[27] Haifeng Xu,et al. Deceiving Cyber Adversaries: A Game Theoretic Approach , 2018, AAMAS.
[28] Milind Tambe,et al. Security Games for Controlling Contagion , 2012, AAAI.
[29] Minming Li,et al. Defending with Shared Resources on a Network , 2020, AAAI.
[30] Bo An,et al. Security Games on a Plane , 2017, AAAI.
[31] Asuman E. Ozdaglar,et al. Network Security and Contagion , 2013, PERV.