Computing Randomized Security Strategies in Networked Domains
暂无分享,去创建一个
[1] David P. Morton,et al. Stochastic Network Interdiction , 1998, Oper. Res..
[2] H. Kunreuther,et al. Interdependent Security , 2003 .
[3] Chase Qishi Wu,et al. A Survey of Game Theory as Applied to Network Security , 2010, 2010 43rd Hawaii International Conference on System Sciences.
[4] Vincent Conitzer,et al. Computing the optimal strategy to commit to , 2006, EC '06.
[5] Jon Kleinberg,et al. Maximizing the spread of influence through a social network , 2003, KDD '03.
[6] Mark Newman,et al. Networks: An Introduction , 2010 .
[7] Milos Manic,et al. CIMS: A Framework for Infrastructure Interdependency Modeling and Analysis , 2006, Proceedings of the 2006 Winter Simulation Conference.
[8] Sarit Kraus,et al. Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games , 2008, AAMAS.
[9] Manish Jain,et al. Computing optimal randomized resource allocations for massive security games , 2009, AAMAS.
[10] Walter E. Beyeler,et al. The topology of interbank payment flows , 2007 .
[11] Manish Jain,et al. Software Assistants for Randomized Patrol Planning for the LAX Airport Police and the Federal Air Marshal Service , 2010, Interfaces.
[12] D. Watts,et al. A generalized model of social and biological contagion. , 2005, Journal of theoretical biology.