Deployed Security Games for Patrol Planning
暂无分享,去创建一个
Milind Tambe | Fernando Ordóñez | Christopher Kiekintveld | Jason Tsai | Manish Jain | Juan F. Jara | Milind Tambe | F. Ordóñez | Christopher Kiekintveld | Manish Jain | J. Tsai | Juan F. Jara
[1] V. Bier. Choosing What to Protect , 2007, Risk analysis : an official publication of the Society for Risk Analysis.
[2] Manish Jain,et al. Computing optimal randomized resource allocations for massive security games , 2009, AAMAS 2009.
[3] Gerald G. Brown,et al. Defending Critical Infrastructure , 2006, Interfaces.
[4] Rudolf Avenhaus,et al. Inspection Games , 2009, Encyclopedia of Complexity and Systems Science.
[5] Milind Tambe,et al. Security and Game Theory: IRIS – A Tool for Strategic Security Allocation in Transportation Networks , 2011, AAMAS 2011.
[6] G. Leitmann. On generalized Stackelberg strategies , 1978 .
[7] Vincent Conitzer,et al. Computing the optimal strategy to commit to , 2006, EC '06.
[8] Richard Mesic,et al. Implementing Security Improvement Options at Los Angeles International Airport , 2006 .
[9] Nicola Gatti,et al. Game Theoretical Insights in Strategic Patrolling: Model and Algorithm in Normal-Form , 2008, ECAI.
[10] Jonathan F. Bard,et al. Practical Bilevel Optimization: Algorithms and Applications , 1998 .
[11] Lawrence M. Wein,et al. OR Forum - Homeland Security: From Mathematical Models to Policy Implementation: The 2008 Philip McCord Morse Lecture , 2009, Oper. Res..
[12] Bernhard von Stengel,et al. Chapter 51 Inspection games , 2002 .
[13] A. Tversky,et al. Prospect theory: analysis of decision under risk , 1979 .
[14] Henry H. Willis,et al. Estimating Terrorism Risk , 2002 .
[15] Hans-Peter Kriegel,et al. A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise , 1996, KDD.
[16] Padhraic Smyth,et al. From Data Mining to Knowledge Discovery: An Overview , 1996, Advances in Knowledge Discovery and Data Mining.
[17] Drew Fudenberg,et al. Game theory (3. pr.) , 1991 .
[18] A. Tversky,et al. Prospect theory: an analysis of decision under risk — Source link , 2007 .
[19] Sarit Kraus,et al. Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games , 2008, AAMAS.
[20] Carla E. Brodley,et al. Feature Selection for Unsupervised Learning , 2004, J. Mach. Learn. Res..
[21] Jonathan F. Bard,et al. Practical Bilevel Optimization , 1998 .
[22] Jonathan F. Bard,et al. Practical Bilevel Optimization: Algorithms and Applications (Nonconvex Optimization and Its Applications) , 2006 .
[23] A. Haurie,et al. Sequential Stackelberg equilibria in two-person games , 1985 .
[24] Kevin Chlebik. Terrorism and Game Theory: From the Terrorists’ Point of View , 2010 .
[25] Ariel Rubinstein,et al. A Course in Game Theory , 1995 .
[26] Manish Jain,et al. Software Assistants for Randomized Patrol Planning for the LAX Airport Police and the Federal Air Marshal Service , 2010, Interfaces.
[27] R. Looney. Economic Costs to the United States Stemming From the 9-11 Attacks; Strategic Insights: v.1, issue 6 (August 2002) , 2002 .
[28] Право. Federal Air Marshal Service , 2013 .
[29] Jeannette M. Wing,et al. Game strategies in network security , 2005, International Journal of Information Security.
[30] B. Stengel,et al. Leadership with commitment to mixed strategies , 2004 .
[31] C. Drury,et al. Optimal Placement of Suicide Bomber Detectors , 2007 .
[32] H. Stackelberg,et al. Marktform und Gleichgewicht , 1935 .
[33] Bo An,et al. GUARDS and PROTECT: next generation applications of security games , 2011, SECO.
[34] M. Treisman,et al. Generation of random sequences by human subjects: Cognitive operations or psychological process? , 1987 .
[35] Li Lin,et al. Passenger grouping under constant threat probability in an airport security system , 2006, Eur. J. Oper. Res..
[36] Gerald G. Brown,et al. A Two-Sided Optimization for Theater Ballistic Missile Defense , 2005, Oper. Res..
[37] Mikel Buesa,et al. The Economic Cost of March 11: Measuring the Direct Economic Cost of the Terrorist Attack on March 11, 2004 in Madrid , 2007 .
[38] RICHARD C. LARSON,et al. A hypercube queuing model for facility location and redistricting in urban emergency services , 1974, Comput. Oper. Res..
[39] R. Selten,et al. A Generalized Nash Solution for Two-Person Bargaining Games with Incomplete Information , 1972 .
[40] V. Georgiev. Using Game Theory to Analyze Wireless Ad Hoc Networks . ” , 2008 .
[41] Sarit Kraus,et al. The impact of adversarial knowledge on adversarial planning in perimeter patrol , 2008, AAMAS.
[42] Kevin Leyton-Brown,et al. A Polynomial-Time Algorithm for Action Graph Games , 2006, AAAI.
[43] T. Sandler,et al. Terrorism & Game Theory , 2003 .
[44] Milind Tambe,et al. GUARDS: game theoretic security allocation on a national scale , 2011, AAMAS.
[45] T. Başar,et al. Dynamic Noncooperative Game Theory , 1982 .
[46] Sarit Kraus,et al. Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS 2008.
[47] Johannes O. Royset,et al. On the Complexity of Delaying an Adversary’s Project , 2005 .
[48] Sarit Kraus,et al. Security in multiagent systems by policy randomization , 2006, AAMAS '06.
[49] R. McKelvey,et al. Quantal Response Equilibria for Normal Form Games , 1995 .
[50] Sarit Kraus,et al. An efficient heuristic approach for security against multiple adversaries , 2007, AAMAS '07.
[51] Daphne Koller,et al. Multi-Agent Influence Diagrams for Representing and Solving Games , 2001, IJCAI.
[52] Sui Ruan,et al. Patrolling in a Stochastic Environment , 2005 .
[53] W. A. Wagenaar. Generation of random sequences by human subjects: A critical survey of literature. , 1972 .