Trends and Applications in Stackelberg Security Games

[1]  A. Tversky,et al.  Prospect theory: analysis of decision under risk , 1979 .

[2]  Nicolas Christin,et al.  Audit Games with Multiple Defender Resources , 2014, AAAI.

[3]  Nathalie Etchart-Vincent Probability weighting and the ‘level’ and ‘spacing’ of outcomes: An experimental study over losses , 2009 .

[4]  Branislav Bosanský,et al.  Game-Theoretic Algorithms for Optimal Network Security Hardening Using Attack Graphs , 2015, AAMAS.

[5]  Manish Jain,et al.  Software Assistants for Randomized Patrol Planning for the LAX Airport Police and the Federal Air Marshal Service , 2010, Interfaces.

[6]  Milind Tambe,et al.  "A Game of Thrones": When Human Behavior Models Compete in Repeated Stackelberg Security Games , 2015, AAMAS.

[7]  Rong Yang,et al.  Adaptive resource allocation for wildlife protection against illegal poachers , 2014, AAMAS.

[8]  Milind Tambe,et al.  When Security Games Go Green: Designing Defender Strategies to Prevent Poaching and Illegal Fishing , 2015, IJCAI.

[9]  Sarit Kraus,et al.  Game-Theoretic Patrolling with Dynamic Execution Uncertainty and a Case Study on a Real Transit System , 2014, J. Artif. Intell. Res..

[10]  Milind Tambe,et al.  Monotonic Maximin: A Robust Stackelberg Solution against Boundedly Rational Followers , 2013, GameSec.

[11]  Rong Yang,et al.  A robust approach to addressing human adversaries in security games , 2012, AAMAS.

[12]  Tansu Alpcan,et al.  Network Security , 2010 .

[13]  G. Leitmann On generalized Stackelberg strategies , 1978 .

[14]  Amos Azaria,et al.  Analyzing the Effectiveness of Adversary Modeling in Security Games , 2013, AAAI.

[15]  Rong Yang,et al.  Computing optimal strategy against quantal response in security games , 2012, AAMAS.

[16]  Sarit Kraus,et al.  Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS 2008.

[17]  E. Brunswik,et al.  The Conceptual Framework of Psychology , 1954 .

[18]  Vincent Conitzer,et al.  A double oracle algorithm for zero-sum security games on graphs , 2011, AAMAS.

[19]  Vincent Conitzer,et al.  Security scheduling for real-world networks , 2013, AAMAS.

[20]  Nicolas Christin,et al.  Audit Games , 2013, IJCAI.

[21]  Rong Yang,et al.  Scaling-up Security Games with Boundedly Rational Adversaries: A Cutting-plane Approach , 2013, IJCAI.

[22]  Georges Dionne,et al.  Lottery Decisions and Probability Weighting Function , 2001 .

[23]  Manish Jain,et al.  Security applications: lessons of real-world deployment , 2009, SECO.

[24]  J. Ragle,et al.  IUCN Red List of Threatened Species , 2010 .

[25]  Milind Tambe,et al.  Comparing human behavior models in repeated Stackelberg security games: An extended study , 2016, Artif. Intell..

[26]  Milind Tambe,et al.  TRUSTS: Scheduling Randomized Patrols for Fare Inspection in Transit Systems , 2012, IAAI.

[27]  Milind Tambe,et al.  PAWS: Game Theory Based Protection Assistant for Wildlife Security , 2017 .

[28]  Sarit Kraus,et al.  Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games , 2008, AAMAS.

[29]  H. Stackelberg,et al.  Marktform und Gleichgewicht , 1935 .

[30]  A. Tversky,et al.  Advances in prospect theory: Cumulative representation of uncertainty , 1992 .

[31]  Manish Jain,et al.  Risk-Averse Strategies for Security Games with Execution and Observational Uncertainty , 2011, AAAI.

[32]  Aranyak Mehta,et al.  Playing large games using simple strategies , 2003, EC '03.

[33]  B. Stengel,et al.  Leadership with commitment to mixed strategies , 2004 .

[34]  Richard Gonzalez,et al.  On the Shape of the Probability Weighting Function , 1999, Cognitive Psychology.

[35]  Noa Agmon,et al.  Making the Most of Our Regrets: Regret-Based Solutions to Handle Payoff Uncertainty and Elicitation in Green Security Games , 2015, GameSec.

[36]  Manish Jain,et al.  Computing optimal randomized resource allocations for massive security games , 2009, AAMAS 2009.

[37]  D. McFadden Quantal Choice Analysis: A Survey , 1976 .

[38]  Milind Tambe,et al.  Stop the compartmentalization: unified robust algorithms for handling uncertainties in security games , 2014, AAMAS.

[39]  A. Tversky,et al.  Prospect Theory : An Analysis of Decision under Risk Author ( s ) : , 2007 .

[40]  Milind Tambe,et al.  Protecting Moving Targets with Multiple Mobile Resources , 2013, J. Artif. Intell. Res..

[41]  Vincent Conitzer,et al.  Computing the optimal strategy to commit to , 2006, EC '06.

[42]  Rong Yang,et al.  Challenges in Patrolling to Maximize Pristine Forest Area (Position Paper) , 2012, AAAI Spring Symposium: Game Theory for Security, Sustainability, and Health.

[43]  Bo An,et al.  Refinement of Strong Stackelberg Equilibria in Security Games , 2011, AAAI.

[44]  A. Verschoor,et al.  The probability weighting function: experimental evidence from Uganda, India and Ethiopia , 2004 .

[45]  Adi Botea,et al.  Near Optimal Hierarchical Path-Finding , 2004, J. Game Dev..

[46]  Bo An,et al.  Deploying PAWS: Field Optimization of the Protection Assistant for Wildlife Security , 2016, AAAI.

[47]  Rong Yang,et al.  Improving Resource Allocation Strategy against Human Adversaries in Security Games , 2011, IJCAI.

[48]  D. McFadden Conditional logit analysis of qualitative choice behavior , 1972 .

[49]  Milind Tambe,et al.  Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned , 2011 .

[50]  Vincent Conitzer,et al.  Complexity of Computing Optimal Stackelberg Strategies in Security Resource Allocation Games , 2010, AAAI.

[51]  Jean Clobert,et al.  The impact on tigers of poaching versus prey depletion , 2008 .

[52]  Sarit Kraus,et al.  Game-theoretic randomization for security patrolling with dynamic execution uncertainty , 2013, AAMAS.

[53]  Bo An,et al.  PROTECT: a deployed game theoretic system to protect the ports of the United States , 2012, AAMAS.

[54]  R. McKelvey,et al.  Quantal Response Equilibria for Normal Form Games , 1995 .

[55]  Manish Jain,et al.  Security Games with Arbitrary Schedules: A Branch and Price Approach , 2010, AAAI.

[56]  Branislav Bosanský,et al.  Game-theoretic resource allocation for malicious packet detection in computer networks , 2012, AAMAS.

[57]  A. Haurie,et al.  Sequential Stackelberg equilibria in two-person games , 1985 .