Modeling human adversary decision making in security games: an initial report
暂无分享,去创建一个
[1] Nicola Basilico,et al. Leader-follower strategies for robotic patrolling in environments with arbitrary topologies , 2009, AAMAS.
[2] Bo An,et al. PROTECT: a deployed game theoretic system to protect the ports of the United States , 2012, AAMAS.
[3] J. March. Bounded rationality, ambiguity, and the engineering of choice , 1978 .
[4] J. Conlisk. Conlisk : Why Bounded Rationality ? 671 , 2000 .
[5] Milind Tambe,et al. Security and Game Theory: IRIS – A Tool for Strategic Security Allocation in Transportation Networks , 2011, AAMAS 2011.
[6] Rong Yang,et al. A robust approach to addressing human adversaries in security games , 2012, AAMAS.
[7] Colin Camerer,et al. A Cognitive Hierarchy Model of Games , 2004 .
[8] References , 1971 .
[9] Sarit Kraus,et al. Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS 2008.
[10] Rong Yang,et al. Improving Resource Allocation Strategy against Human Adversaries in Security Games , 2011, IJCAI.
[11] Vincent Conitzer,et al. Computing the optimal strategy to commit to , 2006, EC '06.
[12] R. McKelvey,et al. Quantal Response Equilibria for Normal Form Games , 1995 .
[13] Yevgeniy Vorobeychik,et al. Computing Randomized Security Strategies in Networked Domains , 2011, Applied Adversarial Reasoning and Risk Modeling.
[14] Sarit Kraus,et al. Robust solutions to Stackelberg games: Addressing bounded rationality and limited observations in human cognition , 2010, Artif. Intell..
[15] Milind Tambe,et al. TRUSTS: Scheduling Randomized Patrols for Fare Inspection in Transit Systems , 2012, IAAI.