G-DPS: A Game-Theoretical Decision-Making Framework for Physical Surveillance Games
暂无分享,去创建一个
Sandra König | Stefan Schauer | David Hutchison | Hermann de Meer | Mohamed Amine Abid | Antonios Gouglidis | Ali Alshawish | Mohamed Amine Abid | D. Hutchison | S. Schauer | H. Meer | Sandra König | Antonios Gouglidis | Ali Alshawish
[1] Dimitrios M. Thilikos,et al. An annotated bibliography on guaranteed graph searching , 2008, Theor. Comput. Sci..
[2] Sven Koenig,et al. Algorithms and Complexity Results for Pursuit-Evasion Problems , 2009, IJCAI.
[3] Mica R. Endsley,et al. Toward a Theory of Situation Awareness in Dynamic Systems , 1995, Hum. Factors.
[4] Kouichi Sakurai,et al. A Game Theory-Based Surveillance Mechanism against Suspicious Insiders in MANETs - (Work-in-Progress) , 2010, INTRUST.
[5] Milind Tambe,et al. Towards Optimal Patrol Strategies for Fare Inspection in Transit Systems , 2012, AAAI Spring Symposium: Game Theory for Security, Sustainability, and Health.
[6] Anil K. Jain,et al. An Introduction to Biometric Authentication Systems , 2005 .
[7] Stefan Rass,et al. Playing a Multi-objective Spot-checking Game in Public Transportation Systems , 2017, SHCIS '17.
[8] Geoffrey A. Hollinger,et al. Search and pursuit-evasion in mobile robotics , 2011, Auton. Robots.
[9] Mohan S. Kankanhalli,et al. Adversary Aware Surveillance Systems , 2009, IEEE Transactions on Information Forensics and Security.
[10] Krzysztof Szajowski. Multi-variate Quickest Detection of Significant Change Process , 2011, GameSec.
[11] Martin Aigner,et al. A game of cops and robbers , 1984, Discret. Appl. Math..
[12] Aner Sela. Fictitious play in ‘one-against-all’ multi-player games , 1999 .
[13] Liu Yang,et al. Research of android smart phone surveillance system , 2010, 2010 International Conference On Computer Design and Applications.
[14] Roger A. Clarke,et al. Information technology and dataveillance , 1988, CACM.
[15] Viliam Lisý,et al. Online Learning Methods for Border Patrol Resource Allocation , 2014, GameSec.
[16] Stefan Rass,et al. Secure Communication over Software-Defined Networks , 2015, Mob. Networks Appl..
[17] Stefan Rass,et al. Uncertainty in Games: Using Probability-Distributions as Payoffs , 2015, GameSec.
[18] Athanasios Kehagias,et al. The Role of Visibility in Pursuit / Evasion Games , 2014, Robotics.
[19] Zhi Yuan,et al. Scalable Randomized Patrolling for Securing Rapid Transit Networks , 2013, IAAI.
[20] Antti Oulasvirta,et al. Long-term effects of ubiquitous surveillance in the home , 2012, UbiComp.
[21] Jack Brassil,et al. Technical Challenges in Location-Aware Video Surveillance Privacy , 2009, Protecting Privacy in Video Surveillance.
[22] Milind Tambe,et al. STREETS: Game-Theoretic Traffic Patrolling with Exploration and Exploitation , 2014, AAAI.
[23] Tansu Alpcan,et al. Network Security , 2010 .
[24] Petr A. Golovach,et al. On tractability of Cops and Robbers game , 2008, IFIP TCS.
[25] Lisa Rajbhandari,et al. Mapping between Classical Risk Management and Game Theoretical Approaches , 2011, Communications and Multimedia Security.
[26] Sampath Kannan,et al. Randomized pursuit-evasion in a polygonal environment , 2005, IEEE Transactions on Robotics.
[27] Gaetano Borriello,et al. Location Systems for Ubiquitous Computing , 2001, Computer.
[28] T. D. Parsons,et al. Pursuit-evasion in a graph , 1978 .
[29] B. Alspach. SEARCHING AND SWEEPING GRAPHS: A BRIEF SURVEY , 2006 .
[30] Sarit Kraus,et al. Game-Theoretic Patrolling with Dynamic Execution Uncertainty and a Case Study on a Real Transit System , 2014, J. Artif. Intell. Res..
[31] Bo An,et al. Security Games with Limited Surveillance , 2012, AAAI.
[32] Alyson G. Wilson,et al. Statistical Methods in Counterterrorism , 2006 .
[33] Tamer Basar,et al. Surveillance for Security as a Pursuit-Evasion Game , 2014, GameSec.
[34] Manish Jain,et al. Computing optimal randomized resource allocations for massive security games , 2009, AAMAS 2009.
[35] Athanasios Kehagias,et al. Cops and Robbers, Game Theory and Zermelo's Early Results , 2014, ArXiv.
[36] Stefan Rass,et al. On Game-Theoretic Network Security Provisioning , 2012, Journal of Network and Systems Management.
[37] Gary MacGillivray,et al. A note on k-cop, l-robber games on graphs , 2006, Discret. Math..