Multiagent Communication Security in Adversarial Settings
暂无分享,去创建一个
Mudhakar Srivatsa | Steven Okamoto | Katia P. Sycara | Yonghong Wang | Praveen Paruchuri | Janusz Marecki
[1] Raphael Rom,et al. Analysis of multi-path routing , 1999, TNET.
[2] R. Kevin Wood,et al. Shortest‐path network interdiction , 2002, Networks.
[3] Sarit Kraus,et al. Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games , 2008, AAMAS.
[4] Mudhakar Srivatsa,et al. Preserving Caller Anonymity in Voice-over-IP Networks , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[5] Muriel Médard,et al. Codecast: a network-coding-based ad hoc multicast protocol , 2006, IEEE Wireless Communications.
[6] Victor R. Lesser,et al. Solving distributed constraint optimization problems using cooperative mediation , 2004, Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, 2004. AAMAS 2004..
[7] Jörg Widmer,et al. Network coding for efficient communication in extreme networks , 2005, WDTN '05.
[8] Vincent Conitzer,et al. Stackelberg vs. Nash in security games: interchangeability, equivalence, and uniqueness , 2010, AAMAS.
[9] Joao P. Hespanha,et al. Saddle policies for secure routing in communication networks , 2002, Proceedings of the 41st IEEE Conference on Decision and Control, 2002..
[10] John N. Tsitsiklis,et al. Introduction to linear optimization , 1997, Athena scientific optimization and computation series.
[11] Boi Faltings,et al. PC-DPOP: A New Partial Centralization Algorithm for Distributed Optimization , 2007, IJCAI.
[12] Nicola Basilico,et al. Leader-follower strategies for robotic patrolling in environments with arbitrary topologies , 2009, AAMAS.
[13] Paul G. Spirakis,et al. A Network Game with Attackers and a Defender , 2008, Algorithmica.
[14] Robert Tappan Morris,et al. Tarzan: a peer-to-peer anonymizing network layer , 2002, CCS '02.
[15] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[16] Hari Balakrishnan,et al. Best-path vs. multi-path overlay routing , 2003, IMC '03.
[17] Milind Tambe,et al. Urban security: game-theoretic resource allocation in networked physical domains , 2010, AAAI 2010.
[18] Alan Washburn,et al. Two-Person Zero-Sum Games for Network Interdiction , 1995, Oper. Res..
[19] Vincent Conitzer,et al. Multi-Step Multi-Sensor Hider-Seeker Games , 2009, IJCAI.