Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned
 J. Morgan,et al. The Value of Commitment in Contests and Tournaments When Observation is Costly , 2004 .
 Milind Tambe,et al. Security and Game Theory: IRIS – A Tool for Strategic Security Allocation in Transportation Networks , 2011, AAMAS 2011.
 Fernando Ordóñez,et al. Robust Wardrop Equilibrium , 2007, NET-COOP.
 Vincent Conitzer,et al. Multi-Step Multi-Sensor Hider-Seeker Games , 2009, IJCAI.
 M. Friedman. The Use of Ranks to Avoid the Assumption of Normality Implicit in the Analysis of Variance , 1937 .
 G. Leitmann. On generalized Stackelberg strategies , 1978 .
 Martin L. Puterman,et al. Markov Decision Processes: Discrete Stochastic Dynamic Programming , 1994, Wiley Series in Probability and Statistics.
 Nicola Basilico,et al. Extending Algorithms for Mobile Robot Patrolling in the Presence of Adversaries to More Realistic Settings , 2009, 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology.
 Chang-Tien Lu,et al. Survey of fraud detection techniques , 2004, IEEE International Conference on Networking, Sensing and Control, 2004.
 Vincent Conitzer,et al. Mixed-Integer Programming Methods for Finding Nash Equilibria , 2005, AAAI.
 John N. Tsitsiklis,et al. Introduction to linear optimization , 1997 .
 A. Rubinstein. Modeling Bounded Rationality , 1998 .
 Jean-Francois Richard,et al. Approximation of Nash equilibria in Bayesian games , 2008 .
 Sarit Kraus,et al. Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games , 2008, AAMAS.
 Sheldon Howard Jacobson,et al. Assessing the impact of deterrence on aviation checked baggage screening strategies , 2005 .
 Mikel Buesa,et al. The Economic Cost of March 11: Measuring the Direct Economic Cost of the Terrorist Attack on March 11, 2004 in Madrid , 2007 .
 Tim Roughgarden. Stackelberg Scheduling Strategies , 2004, SIAM J. Comput..
 Sarit Kraus,et al. The impact of adversarial knowledge on adversarial planning in perimeter patrol , 2008, AAMAS.
 K. Yuen,et al. The two-sample trimmed t for unequal population variances , 1974 .
 D. McFadden. Quantal Choice Analysis: A Survey , 1976 .
 Nicola Basilico,et al. Computing Bayes-Nash Equilibria through Support Enumeration Methods in Bayesian Two-Player Strategic-Form Games , 2009, 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology.
 M. Naceur Azaiez,et al. Why Both Game Theory and Reliability Theory Are Important in Defending Infrastructure against Intelligent Attacks , 2009 .
 E.E.C. van Damme,et al. Games with imperfectly observable commitment , 1997 .
 Milind Tambe,et al. Approximation methods for infinite Bayesian Stackelberg games: modeling distributional payoff uncertainty , 2011, AAMAS.
 Peter R. Wurman,et al. Monte Carlo Approximation in Incomplete Information, Sequential Auction Games , 2005, Decis. Support Syst..
 Luis E. Ortiz,et al. Algorithms for Interdependent Security Games , 2003, NIPS.
 Laurent El Ghaoui,et al. Robustness in Markov Decision Problems with Uncertain Transition Matrices , 2003, NIPS.
 Allen B. MacKenzie,et al. Using game theory to analyze wireless ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.
 Sarit Kraus,et al. Adversarial Uncertainty in Multi-Robot Patrol , 2009, IJCAI.
 Colin Camerer. Behavioral Game Theory: Experiments in Strategic Interaction , 2003 .
 Vincent Conitzer,et al. Stackelberg vs. Nash in security games: interchangeability, equivalence, and uniqueness , 2010, AAMAS 2010.
 Michael P. Wellman,et al. Selecting strategies using empirical game models: an experimental analysis of meta-strategies , 2008, AAMAS.
 Monica Costa Dias,et al. Alternative approaches to evaluation in empirical microeconomics , 2002, The Journal of human resources.
 R. Looney. Economic Costs to the United States Stemming From the 9-11 Attacks; Strategic Insights: v.1, issue 6 (August 2002) , 2002 .
 D. Kenney,et al. Police and Policing: Contemporary Issues , 1999 .
 Jeannette M. Wing,et al. Game strategies in network security , 2004, International Journal of Information Security.
 R. Lazarick. Airport vulnerability assessment-a methodology evaluation , 1999, Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat. No.99CH36303).
 Sarit Kraus,et al. An efficient heuristic approach for security against multiple adversaries , 2007, AAMAS '07.
 Daphne Koller,et al. Multi-Agent Influence Diagrams for Representing and Solving Games , 2001, International Joint Conference on Artificial Intelligence.
 Sui Ruan,et al. Patrolling in a Stochastic Environment , 2005 .
 T. Başar,et al. Dynamic Noncooperative Game Theory , 1982 .
 Sarit Kraus,et al. Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS 2008.
 Sarit Kraus,et al. A graph-theoretic approach to protect static and moving targets from adversaries , 2010, AAMAS.
 Tansu Alpcan,et al. Security Games with Incomplete Information , 2009, 2009 IEEE International Conference on Communications.
 Larry Reznick. Setting priorities , 1994 .
 Michael P. Wellman,et al. Computing Best-Response Strategies in Infinite Games of Incomplete Information , 2004, UAI.
 Manish Jain,et al. Security Games with Arbitrary Schedules: A Branch and Price Approach , 2010, AAAI.
 W. A. Wagenaar. Generation of random sequences by human subjects: A critical survey of literature. , 1972 .
 Milind Tambe,et al. GUARDS: game theoretic security allocation on a national scale , 2011, AAMAS.
 J. Neumann,et al. Theory of Games and Economic Behavior. , 1945 .
 Branislav Bosanský,et al. Transiting areas patrolled by a mobile adversary , 2010, Proceedings of the 2010 IEEE Conference on Computational Intelligence and Games.
 V. Bier. Choosing What to Protect , 2007, Risk analysis : an official publication of the Society for Risk Analysis.
 Jean Cardinal,et al. Pricing of Geometric Transportation Networks , 2005, CCCG.
 Martin W. P. Savelsbergh,et al. Branch-and-Price: Column Generation for Solving Huge Integer Programs , 1998, Oper. Res..
 J. Nash. NON-COOPERATIVE GAMES , 1951, Classics in Game Theory.
 Nikita Borisov,et al. Anonymity in Structured Peer-to-Peer Networks , 2003 .
 R. Pape,et al. The Strategic Logic of Suicide Terrorism , 2003, American Political Science Review.
 John C. Harsanyi,et al. Games with Incomplete Information Played by "Bayesian" Players, I-III: Part I. The Basic Model& , 2004, Manag. Sci..
 Manish Jain,et al. Computing optimal randomized resource allocations for massive security games , 2009, AAMAS 2009.
 Gerald G. Brown,et al. Defending Critical Infrastructure , 2006, Interfaces.
 Ariel Rubinstein,et al. A Course in Game Theory , 1995 .
 Sarit Kraus,et al. Security in multiagent systems by policy randomization , 2006, AAMAS '06.
 Ariel Orda,et al. Achieving network optima using Stackelberg routing strategies , 1997, TNET.
 H. Stackelberg,et al. Marktform und Gleichgewicht , 1935 .
 Manish Jain,et al. Quality-bounded solutions for finite Bayesian Stackelberg games: scaling up , 2011, AAMAS.
 J. Vial,et al. Strategically zero-sum games: The class of games whose completely mixed equilibria cannot be improved upon , 1978 .
 Noa Agmon. On events in multi-robot patrol in adversarial environments , 2010, AAMAS.
 Kelly E. See,et al. Between ignorance and truth: Partition dependence and learning in judgment under uncertainty. , 2006, Journal of experimental psychology. Learning, memory, and cognition.
 Sarit Kraus,et al. Coordinating randomized policies for increasing security of agent systems , 2009, Inf. Technol. Manag..
 Dimitris Bertsimas,et al. Robust game theory , 2006, Math. Program..
 C. E. SHANNON,et al. A mathematical theory of communication , 1948, MOCO.
 Manish Jain,et al. Security applications: lessons of real-world deployment , 2009, SECO.
 Milind Tambe,et al. Urban security: game-theoretic resource allocation in networked physical domains , 2010, AAAI 2010.
 RICHARD C. LARSON,et al. A hypercube queuing model for facility location and redistricting in urban emergency services , 1974, Comput. Oper. Res..
 R. Selten,et al. A Generalized Nash Solution for Two-Person Bargaining Games with Incomplete Information , 1972 .
 Wieland Müller,et al. Perfect versus Imperfect Observability - An Experimental Test of Bagwell's Result , 2000, Games Econ. Behav..
 Timothy W. McLain,et al. Multiple UAV cooperative search under collision avoidance and limited range communication constraints , 2003, 42nd IEEE International Conference on Decision and Control (IEEE Cat. No.03CH37475).
 A. Haurie,et al. Sequential Stackelberg equilibria in two-person games , 1985 .
 Rae Zimmerman,et al. Optimal resource allocation for defense of targets based on differing measures of attractiveness. , 2008, Risk analysis : an official publication of the Society for Risk Analysis.
 A. Tversky,et al. Support theory: A nonextensional representation of subjective probability. , 1994 .
 Jörgen W. Weibull. Testing Game Theory , 2004 .
 Nicola Basilico,et al. Leader-follower strategies for robotic patrolling in environments with arbitrary topologies , 2009, AAMAS.
 Jean-Francois Richard,et al. Approximation of Bayesian Nash Equilibrium , 2008 .
 Vincent Conitzer,et al. A double oracle algorithm for zero-sum security games on graphs , 2011, AAMAS.
 Howard Raiffa,et al. Games And Decisions , 1958 .
 Henry H. Willis,et al. Estimating Terrorism Risk , 2002 .
 Kevin Leyton-Brown,et al. A Polynomial-Time Algorithm for Action Graph Games , 2006, AAAI.
 R. Powell. Defending against Terrorist Attacks with Limited Resources , 2007, American Political Science Review.
 T. Sandler,et al. Terrorism & Game Theory , 2003 .
 Sarit Kraus,et al. Towards a formalization of teamwork with resource constraints , 2004, Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, 2004. AAMAS 2004..
 Robert W. Hahn. Risks, Costs and Lives Saved: GETTING BETTER RESULTS FROM REGULATION , 1996 .
 Nicola Gatti. Game Theoretical Insights in Strategic Patrolling: Model and Algorithm in Normal-Form , 2008, ECAI.
 Milind Tambe,et al. Effective solutions for real-world Stackelberg games: when agents must deal with human uncertainties , 2009, AAMAS 2009.
 Jeffrey D. Berejikian. A Cognitive Theory of Deterrence , 2002 .
 Paul Scerri,et al. Transitioning multiagent technology to UAV applications , 2008, AAMAS.
 P. Taylor,et al. Evolutionarily Stable Strategies and Game Dynamics , 1978 .
 Vincent Conitzer,et al. Computing the optimal strategy to commit to , 2006, EC '06.
 Alvin E. Roth,et al. Predictive value and the usefulness of game theoretic models , 2002 .
 Edmund H. Durfee,et al. Approximating Optimal Policies for Agents with Limited Execution Resources , 2003, IJCAI.
 K. Bagwell. Commitment and observability in games , 1995 .
 Stefan Arnborg,et al. Bayesian Games for Threat Prediction and Situation Analysis , 2004 .
 H. Simon. Rational choice and the structure of the environment. , 1956, Psychological review.
 T. Basar,et al. A game theoretic approach to decision and analysis in network intrusion detection , 2003, 42nd IEEE International Conference on Decision and Control (IEEE Cat. No.03CH37475).
 Vincent Conitzer,et al. Complexity of Computing Optimal Stackelberg Strategies in Security Resource Allocation Games , 2010, AAAI.