Towards a science of security games

[1]  Milind Tambe,et al.  "A Game of Thrones": When Human Behavior Models Compete in Repeated Stackelberg Security Games , 2015, AAMAS.

[2]  Milind Tambe,et al.  Robust Protection of Fisheries with COmPASS , 2014, AAAI.

[3]  Bo An,et al.  Regret-Based Optimization and Preference Elicitation for Stackelberg Security Games with Uncertainty , 2014, AAAI.

[4]  Milind Tambe,et al.  Stop the compartmentalization: unified robust algorithms for handling uncertainties in security games , 2014, AAMAS.

[5]  Rong Yang,et al.  Adaptive resource allocation for wildlife protection against illegal poachers , 2014, AAMAS.

[6]  Sarit Kraus,et al.  Game-Theoretic Patrolling with Dynamic Execution Uncertainty and a Case Study on a Real Transit System , 2014, J. Artif. Intell. Res..

[7]  Milind Tambe,et al.  Monotonic Maximin: A Robust Stackelberg Solution against Boundedly Rational Followers , 2013, GameSec.

[8]  Milind Tambe,et al.  Bayesian Security Games for Controlling Contagion , 2013, 2013 International Conference on Social Computing.

[9]  Rong Yang,et al.  Scaling-up Security Games with Boundedly Rational Adversaries: A Cutting-plane Approach , 2013, IJCAI.

[10]  Amos Azaria,et al.  Analyzing the Effectiveness of Adversary Modeling in Security Games , 2013, AAAI.

[11]  Vincent Conitzer,et al.  Security scheduling for real-world networks , 2013, AAMAS.

[12]  Milind Tambe,et al.  Optimal patrol strategy for protecting moving targets with multiple mobile resources , 2013, AAMAS.

[13]  Sarit Kraus,et al.  Game-theoretic randomization for security patrolling with dynamic execution uncertainty , 2013, AAMAS.

[14]  Milind Tambe,et al.  TRUSTS: Scheduling Randomized Patrols for Fare Inspection in Transit Systems , 2012, IAAI.

[15]  Milind Tambe,et al.  Security Games for Controlling Contagion , 2012, AAAI.

[16]  Bo An,et al.  Security Games with Limited Surveillance , 2012, AAAI.

[17]  Bo An,et al.  PROTECT: a deployed game theoretic system to protect the ports of the United States , 2012, AAMAS.

[18]  Rong Yang,et al.  Computing optimal strategy against quantal response in security games , 2012, AAMAS.

[19]  Rong Yang,et al.  A robust approach to addressing human adversaries in security games , 2012, AAMAS.

[20]  Bo An,et al.  Multi-objective optimization for security games , 2012, AAMAS.

[21]  Branislav Bosanský,et al.  Game-theoretic resource allocation for malicious packet detection in computer networks , 2012, AAMAS.

[22]  Milind Tambe,et al.  A unified method for handling discrete and continuous uncertainty in Bayesian Stackelberg games , 2012, AAMAS.

[23]  Rong Yang,et al.  Challenges in Patrolling to Maximize Pristine Forest Area (Position Paper) , 2012, AAAI Spring Symposium: Game Theory for Security, Sustainability, and Health.

[24]  Manish Jain,et al.  Risk-Averse Strategies for Security Games with Execution and Observational Uncertainty , 2011, AAAI.

[25]  Bo An,et al.  Refinement of Strong Stackelberg Equilibria in Security Games , 2011, AAAI.

[26]  Rong Yang,et al.  Improving Resource Allocation Strategy against Human Adversaries in Security Games , 2011, IJCAI.

[27]  Vincent Conitzer,et al.  A double oracle algorithm for zero-sum security games on graphs , 2011, AAMAS.

[28]  Manish Jain,et al.  Security Games with Arbitrary Schedules: A Branch and Price Approach , 2010, AAAI.

[29]  Vincent Conitzer,et al.  Complexity of Computing Optimal Stackelberg Strategies in Security Resource Allocation Games , 2010, AAAI.

[30]  Manish Jain,et al.  Software Assistants for Randomized Patrol Planning for the LAX Airport Police and the Federal Air Marshal Service , 2010, Interfaces.

[31]  Manish Jain,et al.  Security applications: lessons of real-world deployment , 2009, SECO.

[32]  Manish Jain,et al.  Computing optimal randomized resource allocations for massive security games , 2009, AAMAS.

[33]  Sarit Kraus,et al.  Effective solutions for real-world Stackelberg games: when agents must deal with human uncertainties , 2009, AAMAS.

[34]  Nicola Gatti,et al.  Game Theoretical Insights in Strategic Patrolling: Model and Algorithm in Normal-Form , 2008, ECAI.

[35]  Sarit Kraus,et al.  Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS.

[36]  Sarit Kraus,et al.  Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games , 2008, AAMAS.

[37]  Gerald G. Brown,et al.  Defending Critical Infrastructure , 2006, Interfaces.

[38]  Vincent Conitzer,et al.  Computing the optimal strategy to commit to , 2006, EC '06.

[39]  Gerald G. Brown,et al.  A Two-Sided Optimization for Theater Ballistic Missile Defense , 2005, Oper. Res..

[40]  Jeannette M. Wing,et al.  Game strategies in network security , 2005, International Journal of Information Security.

[41]  B. Stengel,et al.  Leadership with commitment to mixed strategies , 2004 .

[42]  T. Sandler,et al.  Terrorism & Game Theory , 2003 .

[43]  Aranyak Mehta,et al.  Playing large games using simple strategies , 2003, EC '03.

[44]  R. McKelvey,et al.  Quantal Response Equilibria for Normal Form Games , 1995 .

[45]  A. Haurie,et al.  Sequential Stackelberg equilibria in two-person games , 1985 .

[46]  A. Tversky,et al.  PROSPECT THEORY: AN ANALYSIS OF DECISION UNDER RISK , 1979 .

[47]  G. Leitmann On generalized Stackelberg strategies , 1978 .

[48]  D. McFadden Quantal Choice Analysis: A Survey , 1976 .

[49]  E. Brunswik,et al.  The Conceptual Framework of Psychology , 1954 .

[50]  H. Stackelberg,et al.  Marktform und Gleichgewicht , 1935 .

[51]  Milind Tambe,et al.  Security Games in the Field: an Initial Study on a Transit S ystem (Extended Abstract) , 2014 .

[52]  Milind Tambe,et al.  Game-Theoretic Security Patrolling with Dynamic Execution Uncertainty and a Case Study on a Real Transit System , 2014 .

[53]  Milind Tambe,et al.  Modeling Crime Diffusion and Crime Suppression on Transportation Networks: An Initial Report , 2013, AAAI Fall Symposia.

[54]  Milind Tambe,et al.  Security and Game Theory: Evaluating Deployed Decision-Support Systems for Security: Challenges, Analysis, and Approaches , 2011 .

[55]  Nicholas J. Howard,et al.  Finding optimal strategies for influencing social networks in two player games , 2010 .

[56]  Bernhard von Stengel,et al.  Chapter 51 Inspection games , 2002 .

[57]  D. McFadden Conditional logit analysis of qualitative choice behavior , 1972 .