Trends and Applications in Stackelberg Security Games
暂无分享,去创建一个
Albert Xin Jiang | Arunesh Sinha | Debarun Kar | Thanh H. Nguyen | Fei Fang | Matthew Brown | Milind Tambe
[1] A. Tversky,et al. Prospect theory: analysis of decision under risk , 1979 .
[2] Nicolas Christin,et al. Audit Games with Multiple Defender Resources , 2014, AAAI.
[3] Nathalie Etchart-Vincent. Probability weighting and the ‘level’ and ‘spacing’ of outcomes: An experimental study over losses , 2009 .
[4] Branislav Bosanský,et al. Game-Theoretic Algorithms for Optimal Network Security Hardening Using Attack Graphs , 2015, AAMAS.
[5] Manish Jain,et al. Software Assistants for Randomized Patrol Planning for the LAX Airport Police and the Federal Air Marshal Service , 2010, Interfaces.
[6] Milind Tambe,et al. "A Game of Thrones": When Human Behavior Models Compete in Repeated Stackelberg Security Games , 2015, AAMAS.
[7] Rong Yang,et al. Adaptive resource allocation for wildlife protection against illegal poachers , 2014, AAMAS.
[8] Milind Tambe,et al. When Security Games Go Green: Designing Defender Strategies to Prevent Poaching and Illegal Fishing , 2015, IJCAI.
[9] Sarit Kraus,et al. Game-Theoretic Patrolling with Dynamic Execution Uncertainty and a Case Study on a Real Transit System , 2014, J. Artif. Intell. Res..
[10] Milind Tambe,et al. Monotonic Maximin: A Robust Stackelberg Solution against Boundedly Rational Followers , 2013, GameSec.
[11] Rong Yang,et al. A robust approach to addressing human adversaries in security games , 2012, AAMAS.
[12] Tansu Alpcan,et al. Network Security , 2010 .
[13] G. Leitmann. On generalized Stackelberg strategies , 1978 .
[14] Amos Azaria,et al. Analyzing the Effectiveness of Adversary Modeling in Security Games , 2013, AAAI.
[15] Rong Yang,et al. Computing optimal strategy against quantal response in security games , 2012, AAMAS.
[16] Sarit Kraus,et al. Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS 2008.
[17] E. Brunswik,et al. The Conceptual Framework of Psychology , 1954 .
[18] Vincent Conitzer,et al. A double oracle algorithm for zero-sum security games on graphs , 2011, AAMAS.
[19] Vincent Conitzer,et al. Security scheduling for real-world networks , 2013, AAMAS.
[20] Nicolas Christin,et al. Audit Games , 2013, IJCAI.
[21] Rong Yang,et al. Scaling-up Security Games with Boundedly Rational Adversaries: A Cutting-plane Approach , 2013, IJCAI.
[22] Georges Dionne,et al. Lottery Decisions and Probability Weighting Function , 2001 .
[23] Manish Jain,et al. Security applications: lessons of real-world deployment , 2009, SECO.
[24] J. Ragle,et al. IUCN Red List of Threatened Species , 2010 .
[25] Milind Tambe,et al. Comparing human behavior models in repeated Stackelberg security games: An extended study , 2016, Artif. Intell..
[26] Milind Tambe,et al. TRUSTS: Scheduling Randomized Patrols for Fare Inspection in Transit Systems , 2012, IAAI.
[27] Milind Tambe,et al. PAWS: Game Theory Based Protection Assistant for Wildlife Security , 2017 .
[28] Sarit Kraus,et al. Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games , 2008, AAMAS.
[29] H. Stackelberg,et al. Marktform und Gleichgewicht , 1935 .
[30] A. Tversky,et al. Advances in prospect theory: Cumulative representation of uncertainty , 1992 .
[31] Manish Jain,et al. Risk-Averse Strategies for Security Games with Execution and Observational Uncertainty , 2011, AAAI.
[32] Aranyak Mehta,et al. Playing large games using simple strategies , 2003, EC '03.
[33] B. Stengel,et al. Leadership with commitment to mixed strategies , 2004 .
[34] Richard Gonzalez,et al. On the Shape of the Probability Weighting Function , 1999, Cognitive Psychology.
[35] Noa Agmon,et al. Making the Most of Our Regrets: Regret-Based Solutions to Handle Payoff Uncertainty and Elicitation in Green Security Games , 2015, GameSec.
[36] Manish Jain,et al. Computing optimal randomized resource allocations for massive security games , 2009, AAMAS 2009.
[37] D. McFadden. Quantal Choice Analysis: A Survey , 1976 .
[38] Milind Tambe,et al. Stop the compartmentalization: unified robust algorithms for handling uncertainties in security games , 2014, AAMAS.
[39] A. Tversky,et al. Prospect Theory : An Analysis of Decision under Risk Author ( s ) : , 2007 .
[40] Milind Tambe,et al. Protecting Moving Targets with Multiple Mobile Resources , 2013, J. Artif. Intell. Res..
[41] Vincent Conitzer,et al. Computing the optimal strategy to commit to , 2006, EC '06.
[42] Rong Yang,et al. Challenges in Patrolling to Maximize Pristine Forest Area (Position Paper) , 2012, AAAI Spring Symposium: Game Theory for Security, Sustainability, and Health.
[43] Bo An,et al. Refinement of Strong Stackelberg Equilibria in Security Games , 2011, AAAI.
[44] A. Verschoor,et al. The probability weighting function: experimental evidence from Uganda, India and Ethiopia , 2004 .
[45] Adi Botea,et al. Near Optimal Hierarchical Path-Finding , 2004, J. Game Dev..
[46] Bo An,et al. Deploying PAWS: Field Optimization of the Protection Assistant for Wildlife Security , 2016, AAAI.
[47] Rong Yang,et al. Improving Resource Allocation Strategy against Human Adversaries in Security Games , 2011, IJCAI.
[48] D. McFadden. Conditional logit analysis of qualitative choice behavior , 1972 .
[49] Milind Tambe,et al. Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned , 2011 .
[50] Vincent Conitzer,et al. Complexity of Computing Optimal Stackelberg Strategies in Security Resource Allocation Games , 2010, AAAI.
[51] Jean Clobert,et al. The impact on tigers of poaching versus prey depletion , 2008 .
[52] Sarit Kraus,et al. Game-theoretic randomization for security patrolling with dynamic execution uncertainty , 2013, AAMAS.
[53] Bo An,et al. PROTECT: a deployed game theoretic system to protect the ports of the United States , 2012, AAMAS.
[54] R. McKelvey,et al. Quantal Response Equilibria for Normal Form Games , 1995 .
[55] Manish Jain,et al. Security Games with Arbitrary Schedules: A Branch and Price Approach , 2010, AAAI.
[56] Branislav Bosanský,et al. Game-theoretic resource allocation for malicious packet detection in computer networks , 2012, AAMAS.
[57] A. Haurie,et al. Sequential Stackelberg equilibria in two-person games , 1985 .