Coalitional Security Games
暂无分享,去创建一个
[1] Michael Wooldridge,et al. Computational Aspects of Cooperative Game Theory , 2011, KES-AMSTA.
[2] Herbert Hamers,et al. Cooperative game theoretic centrality analysis of terrorist networks: The cases of Jemaah Islamiyah and Al Qaeda , 2013, Eur. J. Oper. Res..
[3] Victor Asal,et al. The Nature of the Beast: Organizational Structures and the Lethality of Terrorist Attacks , 2008, The Journal of Politics.
[4] Jeffrey S. Rosenschein,et al. Coalitional skill games , 2008, AAMAS.
[5] Mihalis Yannakakis,et al. The Complexity of Multiterminal Cuts , 1994, SIAM J. Comput..
[6] John N. Tsitsiklis,et al. Introduction to linear optimization , 1997, Athena scientific optimization and computation series.
[7] Vincent Conitzer,et al. Solving Security Games on Graphs via Marginal Probabilities , 2013, AAAI.
[8] Bo An,et al. Computing Optimal Mixed Strategies for Security Games with Dynamic Payoffs , 2015, IJCAI.
[9] George W. Bush,et al. National Strategy for Combating Terrorism , 2009 .
[10] Nicholas R. Jennings,et al. Computational Analysis of Connectivity Games with Applications to the Investigation of Terrorist Networks , 2013, IJCAI.
[11] Bo An,et al. Security Games with Protection Externalities , 2015, AAAI.
[12] Alan M. Frieze,et al. Random graphs , 2006, SODA '06.
[13] Michel Gendreau,et al. Interior point stabilization for column generation , 2007, Oper. Res. Lett..
[14] Albert,et al. Emergence of scaling in random networks , 1999, Science.
[15] P. Klerks. The Network Paradigm Applied to Criminal Organisations: Theoretical nitpicking or a relevant doctrine for investigators? Recent developments in the Netherlands , 2001 .
[16] Matthew Levitt,et al. Untangling the Terror Web: Identifying and Counteracting the Phenomenon of Crossover between Terrorist Groups , 2004 .
[17] Bo An,et al. An Overview of Recent Application Trends at the AAMAS Conference: Security, Sustainability and Safety , 2012, AI Mag..
[18] Marilyn B. Peterson. Applications in Criminal Analysis: A Sourcebook , 1994 .
[19] Jonathan Cole Smith,et al. Exact interdiction models and algorithms for disconnecting networks via node deletions , 2012, Discret. Optim..
[20] Brian J. Phillips,et al. How Terrorist Organizations Survive: Cooperation and Competition in Terrorist Group Networks , 2012 .
[21] K A Kronstadt,et al. Terrorist Attacks in Mumbai, India, and Implications for U.S. Interests , 2008 .
[22] David Pritchard,et al. An LP with Integrality Gap 1+epsilon for Multidimensional Knapsack , 2010, ArXiv.
[23] Zhen Wang,et al. Computing Optimal Monitoring Strategy for Detecting Terrorist Plots , 2016, AAAI.
[24] Valdis E. Krebs,et al. Uncloaking Terrorist Networks , 2002, First Monday.
[25] Bo An,et al. Computing Solutions in Infinite-Horizon Discounted Adversarial Patrolling Games , 2014, ICAPS.
[26] Mihalis Yannakakis,et al. Optimization, approximation, and complexity classes , 1991, STOC '88.
[27] Renato R. Martino. Remarks to the United Nations on Human Cloning , 2002 .
[28] Bo An,et al. Game-Theoretic Resource Allocation for Protecting Large Public Events , 2014, AAAI.
[29] Malcolm K. Sparrow,et al. The application of network analysis to criminal intelligence: An assessment of the prospects , 1991 .
[30] Juliane Hahn,et al. Security And Game Theory Algorithms Deployed Systems Lessons Learned , 2016 .
[31] Bo An,et al. Optimizing Personalized Email Filtering Thresholds to Mitigate Sequential Spear Phishing Attacks , 2016, AAAI.