Imbalanced Collusive Security Games
暂无分享,去创建一个
Milind Tambe | Bistra N. Dilkina | Phebe Vayanos | Han-Ching Ou | Milind Tambe | B. Dilkina | P. Vayanos | H. Ou
[1] A. Tversky,et al. Prospect theory: an analysis of decision under risk — Source link , 2007 .
[2] Milind Tambe,et al. Towards a science of security games , 2016 .
[3] Vincent Conitzer,et al. Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness , 2011, J. Artif. Intell. Res..
[4] Yevgeniy Vorobeychik,et al. Computing Randomized Security Strategies in Networked Domains , 2011, Applied Adversarial Reasoning and Risk Modeling.
[5] Juliane Hahn,et al. Security And Game Theory Algorithms Deployed Systems Lessons Learned , 2016 .
[6] Nicola Basilico,et al. Leader-follower strategies for robotic patrolling in environments with arbitrary topologies , 2009, AAMAS.
[7] Milind Tambe,et al. Divide to Defend: Collusive Security Games , 2016, GameSec.
[8] Fernando Ordóñez,et al. Building Real Stackelberg Security Games for Border Patrols , 2017, GameSec.
[9] Bo An,et al. Deploying PAWS: Field Optimization of the Protection Assistant for Wildlife Security , 2016, AAAI.
[10] Robert Clark,et al. Collusion with Asymmetric Retailers: Evidence from a Gasoline Price-Fixing Case , 2013 .
[11] Vincent Conitzer,et al. Security Games with Multiple Attacker Resources , 2011, IJCAI.
[12] Milind Tambe,et al. TRUSTS: Scheduling Randomized Patrols for Fare Inspection in Transit Systems , 2012, IAAI.
[13] Joshua Harms. The war on terror and accomplices: An exploratory study of individuals who provide material support to terrorists , 2017 .
[14] Bo An,et al. Coalitional Security Games , 2016, AAMAS.
[15] D. McFadden. Quantal Choice Analysis: A Survey , 1976 .
[16] A. Tversky,et al. Prospect theory: analysis of decision under risk , 1979 .
[17] Amos Azaria,et al. Analyzing the Effectiveness of Adversary Modeling in Security Games , 2013, AAAI.
[18] Andrés López Restrepo,et al. From Smugglers to Warlords: Twentieth Century Colombian Drug Traffickers , 2003 .
[19] Rong Yang,et al. Adaptive resource allocation for wildlife protection against illegal poachers , 2014, AAMAS.
[20] Vincent Conitzer,et al. Stackelberg vs. Nash in security games: interchangeability, equivalence, and uniqueness , 2010, AAMAS 2010.
[21] Milind Tambe,et al. When Security Games Go Green: Designing Defender Strategies to Prevent Poaching and Illegal Fishing , 2015, IJCAI.
[22] A. Tversky,et al. Advances in prospect theory: Cumulative representation of uncertainty , 1992 .
[23] Manish Jain,et al. Computing optimal randomized resource allocations for massive security games , 2009, AAMAS 2009.
[24] Sarit Kraus,et al. Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS 2008.
[25] Vincent Conitzer,et al. Complexity of Computing Optimal Stackelberg Strategies in Security Resource Allocation Games , 2010, AAAI.