Inverse game theory: learning the nature of a game through play
暂无分享,去创建一个
[1] Cristina Comaniciu,et al. A Bayesian game approach for intrusion detection in wireless ad hoc networks , 2006, GameNets '06.
[2] John C. Harsanyi,et al. Games with Incomplete Information Played by "Bayesian" Players, I-III: Part I. The Basic Model& , 2004, Manag. Sci..
[3] Wei Jiang,et al. A Game Theoretic Method for Decision and Analysis of the Optimal Active Defense Strategy , 2007, 2007 International Conference on Computational Intelligence and Security (CIS 2007).
[4] Daniel Grosu,et al. A Game Theoretic Investigation of Deception in Network Security , 2009, ICCCN.
[5] Xuan Dau Hoang. E-commerce security enhancement and anomaly intrusion detection using machine learning techniques , 2006 .
[6] T. Basar,et al. A game theoretic analysis of intrusion detection in access control systems , 2004, 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601).
[7] A. Patcha,et al. A game theoretic approach to modeling intrusion detection in mobile ad hoc networks , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..
[8] John Langford,et al. Correlated equilibria in graphical games , 2003, EC '03.
[9] Bernhard Plattner,et al. Modelling the Security Ecosystem- The Dynamics of (In)Security , 2009, WEIS.
[10] George Cybenko,et al. Exploiting Adversary's Risk Profiles in Imperfect Information Security Games , 2011, GameSec.
[11] Tansu Alpcan,et al. Security Games with Incomplete Information , 2009, 2009 IEEE International Conference on Communications.
[12] Drew Fudenberg,et al. Game theory (3. pr.) , 1991 .
[13] Chase Qishi Wu,et al. A Survey of Game Theory as Applied to Network Security , 2010, 2010 43rd Hawaii International Conference on System Sciences.
[14] Dean P. Foster,et al. Regret Testing: A Simple Payo-Based Procedure for Learning Nash Equilibrium , 2005 .