Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned
暂无分享,去创建一个
[1] J. Morgan,et al. The Value of Commitment in Contests and Tournaments When Observation is Costly , 2004 .
[2] Milind Tambe,et al. Security and Game Theory: IRIS – A Tool for Strategic Security Allocation in Transportation Networks , 2011, AAMAS 2011.
[3] Fernando Ordóñez,et al. Robust Wardrop Equilibrium , 2007, NET-COOP.
[4] Vincent Conitzer,et al. Multi-Step Multi-Sensor Hider-Seeker Games , 2009, IJCAI.
[5] M. Friedman. The Use of Ranks to Avoid the Assumption of Normality Implicit in the Analysis of Variance , 1937 .
[6] G. Leitmann. On generalized Stackelberg strategies , 1978 .
[7] Martin L. Puterman,et al. Markov Decision Processes: Discrete Stochastic Dynamic Programming , 1994, Wiley Series in Probability and Statistics.
[8] Nicola Basilico,et al. Extending Algorithms for Mobile Robot Patrolling in the Presence of Adversaries to More Realistic Settings , 2009, 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology.
[9] Chang-Tien Lu,et al. Survey of fraud detection techniques , 2004, IEEE International Conference on Networking, Sensing and Control, 2004.
[10] Vincent Conitzer,et al. Mixed-Integer Programming Methods for Finding Nash Equilibria , 2005, AAAI.
[11] John N. Tsitsiklis,et al. Introduction to linear optimization , 1997 .
[12] A. Rubinstein. Modeling Bounded Rationality , 1998 .
[13] Jean-Francois Richard,et al. Approximation of Nash equilibria in Bayesian games , 2008 .
[14] Sarit Kraus,et al. Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games , 2008, AAMAS.
[15] Sheldon Howard Jacobson,et al. Assessing the impact of deterrence on aviation checked baggage screening strategies , 2005 .
[16] Mikel Buesa,et al. The Economic Cost of March 11: Measuring the Direct Economic Cost of the Terrorist Attack on March 11, 2004 in Madrid , 2007 .
[17] Tim Roughgarden. Stackelberg Scheduling Strategies , 2004, SIAM J. Comput..
[18] Sarit Kraus,et al. The impact of adversarial knowledge on adversarial planning in perimeter patrol , 2008, AAMAS.
[19] K. Yuen,et al. The two-sample trimmed t for unequal population variances , 1974 .
[20] D. McFadden. Quantal Choice Analysis: A Survey , 1976 .
[21] Nicola Basilico,et al. Computing Bayes-Nash Equilibria through Support Enumeration Methods in Bayesian Two-Player Strategic-Form Games , 2009, 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology.
[22] M. Naceur Azaiez,et al. Why Both Game Theory and Reliability Theory Are Important in Defending Infrastructure against Intelligent Attacks , 2009 .
[23] E.E.C. van Damme,et al. Games with imperfectly observable commitment , 1997 .
[24] Milind Tambe,et al. Approximation methods for infinite Bayesian Stackelberg games: modeling distributional payoff uncertainty , 2011, AAMAS.
[25] Peter R. Wurman,et al. Monte Carlo Approximation in Incomplete Information, Sequential Auction Games , 2005, Decis. Support Syst..
[26] Luis E. Ortiz,et al. Algorithms for Interdependent Security Games , 2003, NIPS.
[27] Laurent El Ghaoui,et al. Robustness in Markov Decision Problems with Uncertain Transition Matrices , 2003, NIPS.
[28] Allen B. MacKenzie,et al. Using game theory to analyze wireless ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.
[29] Sarit Kraus,et al. Adversarial Uncertainty in Multi-Robot Patrol , 2009, IJCAI.
[30] Colin Camerer. Behavioral Game Theory: Experiments in Strategic Interaction , 2003 .
[31] Vincent Conitzer,et al. Stackelberg vs. Nash in security games: interchangeability, equivalence, and uniqueness , 2010, AAMAS 2010.
[32] Michael P. Wellman,et al. Selecting strategies using empirical game models: an experimental analysis of meta-strategies , 2008, AAMAS.
[33] Monica Costa Dias,et al. Alternative approaches to evaluation in empirical microeconomics , 2002, The Journal of human resources.
[34] R. Looney. Economic Costs to the United States Stemming From the 9-11 Attacks; Strategic Insights: v.1, issue 6 (August 2002) , 2002 .
[35] D. Kenney,et al. Police and Policing: Contemporary Issues , 1999 .
[36] Jeannette M. Wing,et al. Game strategies in network security , 2004, International Journal of Information Security.
[37] R. Lazarick. Airport vulnerability assessment-a methodology evaluation , 1999, Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat. No.99CH36303).
[38] Sarit Kraus,et al. An efficient heuristic approach for security against multiple adversaries , 2007, AAMAS '07.
[39] Daphne Koller,et al. Multi-Agent Influence Diagrams for Representing and Solving Games , 2001, International Joint Conference on Artificial Intelligence.
[40] Sui Ruan,et al. Patrolling in a Stochastic Environment , 2005 .
[41] T. Başar,et al. Dynamic Noncooperative Game Theory , 1982 .
[42] Sarit Kraus,et al. Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS 2008.
[43] Sarit Kraus,et al. A graph-theoretic approach to protect static and moving targets from adversaries , 2010, AAMAS.
[44] Tansu Alpcan,et al. Security Games with Incomplete Information , 2009, 2009 IEEE International Conference on Communications.
[45] Larry Reznick. Setting priorities , 1994 .
[46] Michael P. Wellman,et al. Computing Best-Response Strategies in Infinite Games of Incomplete Information , 2004, UAI.
[47] Manish Jain,et al. Security Games with Arbitrary Schedules: A Branch and Price Approach , 2010, AAAI.
[48] W. A. Wagenaar. Generation of random sequences by human subjects: A critical survey of literature. , 1972 .
[49] Milind Tambe,et al. GUARDS: game theoretic security allocation on a national scale , 2011, AAMAS.
[50] J. Neumann,et al. Theory of Games and Economic Behavior. , 1945 .
[51] Branislav Bosanský,et al. Transiting areas patrolled by a mobile adversary , 2010, Proceedings of the 2010 IEEE Conference on Computational Intelligence and Games.
[52] V. Bier. Choosing What to Protect , 2007, Risk analysis : an official publication of the Society for Risk Analysis.
[53] Jean Cardinal,et al. Pricing of Geometric Transportation Networks , 2005, CCCG.
[54] Martin W. P. Savelsbergh,et al. Branch-and-Price: Column Generation for Solving Huge Integer Programs , 1998, Oper. Res..
[55] J. Nash. NON-COOPERATIVE GAMES , 1951, Classics in Game Theory.
[56] Nikita Borisov,et al. Anonymity in Structured Peer-to-Peer Networks , 2003 .
[57] R. Pape,et al. The Strategic Logic of Suicide Terrorism , 2003, American Political Science Review.
[58] John C. Harsanyi,et al. Games with Incomplete Information Played by "Bayesian" Players, I-III: Part I. The Basic Model& , 2004, Manag. Sci..
[59] Manish Jain,et al. Computing optimal randomized resource allocations for massive security games , 2009, AAMAS 2009.
[60] Gerald G. Brown,et al. Defending Critical Infrastructure , 2006, Interfaces.
[61] Ariel Rubinstein,et al. A Course in Game Theory , 1995 .
[62] Sarit Kraus,et al. Security in multiagent systems by policy randomization , 2006, AAMAS '06.
[63] Ariel Orda,et al. Achieving network optima using Stackelberg routing strategies , 1997, TNET.
[64] H. Stackelberg,et al. Marktform und Gleichgewicht , 1935 .
[65] Manish Jain,et al. Quality-bounded solutions for finite Bayesian Stackelberg games: scaling up , 2011, AAMAS.
[66] J. Vial,et al. Strategically zero-sum games: The class of games whose completely mixed equilibria cannot be improved upon , 1978 .
[67] Noa Agmon. On events in multi-robot patrol in adversarial environments , 2010, AAMAS.
[68] Kelly E. See,et al. Between ignorance and truth: Partition dependence and learning in judgment under uncertainty. , 2006, Journal of experimental psychology. Learning, memory, and cognition.
[69] Sarit Kraus,et al. Coordinating randomized policies for increasing security of agent systems , 2009, Inf. Technol. Manag..
[70] Dimitris Bertsimas,et al. Robust game theory , 2006, Math. Program..
[71] C. E. SHANNON,et al. A mathematical theory of communication , 1948, MOCO.
[72] Manish Jain,et al. Security applications: lessons of real-world deployment , 2009, SECO.
[73] Milind Tambe,et al. Urban security: game-theoretic resource allocation in networked physical domains , 2010, AAAI 2010.
[74] RICHARD C. LARSON,et al. A hypercube queuing model for facility location and redistricting in urban emergency services , 1974, Comput. Oper. Res..
[75] R. Selten,et al. A Generalized Nash Solution for Two-Person Bargaining Games with Incomplete Information , 1972 .
[76] Wieland Müller,et al. Perfect versus Imperfect Observability - An Experimental Test of Bagwell's Result , 2000, Games Econ. Behav..
[77] Timothy W. McLain,et al. Multiple UAV cooperative search under collision avoidance and limited range communication constraints , 2003, 42nd IEEE International Conference on Decision and Control (IEEE Cat. No.03CH37475).
[78] A. Haurie,et al. Sequential Stackelberg equilibria in two-person games , 1985 .
[79] Rae Zimmerman,et al. Optimal resource allocation for defense of targets based on differing measures of attractiveness. , 2008, Risk analysis : an official publication of the Society for Risk Analysis.
[80] A. Tversky,et al. Support theory: A nonextensional representation of subjective probability. , 1994 .
[81] Jörgen W. Weibull. Testing Game Theory , 2004 .
[82] Nicola Basilico,et al. Leader-follower strategies for robotic patrolling in environments with arbitrary topologies , 2009, AAMAS.
[83] Jean-Francois Richard,et al. Approximation of Bayesian Nash Equilibrium , 2008 .
[84] Vincent Conitzer,et al. A double oracle algorithm for zero-sum security games on graphs , 2011, AAMAS.
[85] Howard Raiffa,et al. Games And Decisions , 1958 .
[86] Henry H. Willis,et al. Estimating Terrorism Risk , 2002 .
[87] Kevin Leyton-Brown,et al. A Polynomial-Time Algorithm for Action Graph Games , 2006, AAAI.
[88] R. Powell. Defending against Terrorist Attacks with Limited Resources , 2007, American Political Science Review.
[89] T. Sandler,et al. Terrorism & Game Theory , 2003 .
[90] Sarit Kraus,et al. Towards a formalization of teamwork with resource constraints , 2004, Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, 2004. AAMAS 2004..
[91] Robert W. Hahn. Risks, Costs and Lives Saved: GETTING BETTER RESULTS FROM REGULATION , 1996 .
[92] Nicola Gatti. Game Theoretical Insights in Strategic Patrolling: Model and Algorithm in Normal-Form , 2008, ECAI.
[93] Milind Tambe,et al. Effective solutions for real-world Stackelberg games: when agents must deal with human uncertainties , 2009, AAMAS 2009.
[94] Jeffrey D. Berejikian. A Cognitive Theory of Deterrence , 2002 .
[95] Paul Scerri,et al. Transitioning multiagent technology to UAV applications , 2008, AAMAS.
[96] P. Taylor,et al. Evolutionarily Stable Strategies and Game Dynamics , 1978 .
[97] Vincent Conitzer,et al. Computing the optimal strategy to commit to , 2006, EC '06.
[98] Alvin E. Roth,et al. Predictive value and the usefulness of game theoretic models , 2002 .
[99] Edmund H. Durfee,et al. Approximating Optimal Policies for Agents with Limited Execution Resources , 2003, IJCAI.
[100] K. Bagwell. Commitment and observability in games , 1995 .
[101] Stefan Arnborg,et al. Bayesian Games for Threat Prediction and Situation Analysis , 2004 .
[102] H. Simon. Rational choice and the structure of the environment. , 1956, Psychological review.
[103] T. Basar,et al. A game theoretic approach to decision and analysis in network intrusion detection , 2003, 42nd IEEE International Conference on Decision and Control (IEEE Cat. No.03CH37475).
[104] Vincent Conitzer,et al. Complexity of Computing Optimal Stackelberg Strategies in Security Resource Allocation Games , 2010, AAAI.