Contagion and observability in security domains
暂无分享,去创建一个
[1] Todd Sandler,et al. Chapter 20 Defense in a Globalized World: An Introduction , 2007 .
[2] B. Roberson. The Colonel Blotto game , 2006 .
[3] Sarit Kraus,et al. Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games , 2008, AAMAS.
[4] S. Skaperdas. Contest success functions , 1996 .
[5] Yevgeniy Vorobeychik,et al. Computing Optimal Security Strategies for Interdependent Assets , 2012, UAI.
[6] Dan Kovenock,et al. Suicide Terrorism and the Weakest Link , 2009, SSRN Electronic Journal.
[7] Nicolas Christin,et al. Security Investment (Failures) in Five Economic Environments: A Comparison of Homogeneous and Heterogeneous User Agents , 2008, WEIS.
[8] Alan Washburn,et al. Two-Person Zero-Sum Games for Network Interdiction , 1995, Oper. Res..
[9] Sven Leyffer,et al. Solving Multi-Leader-Follower Games , 2005 .
[10] Sergiu Hart,et al. Discrete Colonel Blotto and General Lotto games , 2008, Int. J. Game Theory.
[11] H. Kunreuther,et al. Interdependent Security , 2003 .
[12] Marc Lelarge,et al. Network externalities and the deployment of security features and protocols in the internet , 2008, SIGMETRICS '08.
[13] Todd Sandler,et al. Handbook of Defense Economics , 1995 .
[14] Sajal K. Das,et al. Decision and Game Theory for Security , 2013, Lecture Notes in Computer Science.
[15] Sarit Kraus,et al. Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS 2008.
[16] Marc Lelarge,et al. Economics of malware: Epidemic risks model, network externalities and incentives , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[17] Tim Roughgarden,et al. Selfish routing and the price of anarchy , 2005 .
[18] Stefan Arnborg,et al. Bayesian Games for Threat Prediction and Situation Analysis , 2004 .
[19] G. Tullock. THE WELFARE COSTS OF TARIFFS, MONOPOLIES, AND THEFT , 1967 .
[20] Vincent Conitzer,et al. Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness , 2011, J. Artif. Intell. Res..
[21] Sarit Kraus,et al. An efficient heuristic approach for security against multiple adversaries , 2007, AAMAS '07.
[22] Derek J. Clark,et al. Asymmetric Conflict , 2007 .
[23] Robert Powell,et al. Sequential, nonzero-sum "Blotto": Allocating defensive resources prior to attack , 2009, Games Econ. Behav..
[24] Vincent Conitzer,et al. Stackelberg vs. Nash in security games: interchangeability, equivalence, and uniqueness , 2010, AAMAS 2010.
[25] Vincent Conitzer,et al. Complexity of Computing Optimal Stackelberg Strategies in Security Resource Allocation Games , 2010, AAAI.
[26] Debraj Ray,et al. A Model of Ethnic Conflict , 2011 .
[27] T. Sandler,et al. Collective Action and Transnational Terrorism , 2003 .
[28] Larry Samuelson,et al. Choosing What to Protect: Strategic Defensive Allocation Against an Unknown Attacker , 2005 .
[29] Bo An,et al. An Overview of Recent Application Trends at the AAMAS Conference: Security, Sustainability and Safety , 2012, AI Mag..
[30] Firouz Gahvari,et al. On Optimal Commodity Taxes When Consumption is Time Consuming , 2005 .
[31] Ariel Rubinstein,et al. A Course in Game Theory , 1995 .
[32] A. Dixit. Strategic Behavior in Contests: Reply , 1999 .
[33] Milind Tambe,et al. Security and Game Theory: IRIS – A Tool for Strategic Security Allocation in Transportation Networks , 2011, AAMAS 2011.
[34] Nicolas Christin,et al. Uncertainty in Interdependent Security Games , 2010, GameSec.
[35] R. Tollison,et al. Toward a theory of the rent-seeking society , 1982 .
[36] Martin Shubik,et al. Systems Defense Games: Colonel Blotto, Command and Control , 1981 .
[37] G. Tullock. Efficient Rent Seeking , 2001 .
[38] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[39] Timothy W. McLain,et al. Multiple UAV cooperative search under collision avoidance and limited range communication constraints , 2003, 42nd IEEE International Conference on Decision and Control (IEEE Cat. No.03CH37475).
[40] Luis E. Ortiz,et al. Interdependent Defense Games: Modeling Interdependent Security under Deliberate Attacks , 2012, UAI.
[41] Nicola Basilico,et al. Leader-follower strategies for robotic patrolling in environments with arbitrary topologies , 2009, AAMAS.
[42] Aaas News,et al. Book Reviews , 1893, Buffalo Medical and Surgical Journal.
[43] Milind Tambe,et al. Urban Security: Game-Theoretic Resource Allocation in Networked Domains , 2010, AAAI.