暂无分享,去创建一个
Frank Neumann | Aneta Neumann | Jialiang Li | Mingyu Guo | Hung Nguyen | F. Neumann | Mingyu Guo | Aneta Neumann | Jialian Li | Hung Nguyen
[1] Sarit Kraus,et al. Efficient Algorithms to Solve Bayesian Stackelberg Games for Security Applications , 2008, AAAI.
[2] Dimitrios M. Thilikos,et al. On exact algorithms for treewidth , 2006, TALG.
[3] John Dunagan,et al. Heat-ray: combating identity snowball attacks using machinelearning, combinatorial optimization and attack graphs , 2009, SOSP '09.
[4] Ge Xia,et al. Improved Parameterized Upper Bounds for Vertex Cover , 2006, MFCS.
[5] Derek G. Corneil,et al. Complexity of finding embeddings in a k -tree , 1987 .
[6] Enrico Nardelli,et al. A faster computation of the most vital edge of a shortest path , 2001, Inf. Process. Lett..
[7] Serge Gaspers,et al. Weakening Covert Networks by Minimizing Inverse Geodesic Length , 2017, IJCAI.
[8] Le Song,et al. 2 Common Formulation for Greedy Algorithms on Graphs , 2018 .
[9] Jeffrey C Grossman,et al. Crystal Graph Convolutional Neural Networks for an Accurate and Interpretable Prediction of Material Properties. , 2017, Physical review letters.
[10] Viliam Lisý,et al. Hardening networks against strategic attackers using attack graph games , 2019, Comput. Secur..
[11] Milind Tambe,et al. Using Graph Convolutional Networks to Learn Interdiction Games , 2019 .
[12] Serge Gaspers,et al. Defender Stackelberg Game with Inverse Geodesic Length as Utility Metric , 2018, AAMAS.
[13] Michael R. Fellows,et al. On the parameterized complexity of multiple-interval graph problems , 2009, Theor. Comput. Sci..
[14] Harjinder Singh Lallie,et al. A review of attack graph and attack tree visual syntax in cyber security , 2020, Comput. Sci. Rev..
[15] Charles Kamhoua,et al. Harnessing the Power of Deception in Attack Graph-Based Security Games , 2020, GameSec.
[16] Rolf Niedermeier,et al. A more fine‐grained complexity analysis of finding the most vital edges for undirected shortest paths , 2018, Networks.
[17] Petr A. Golovach,et al. Paths of bounded length and their cuts: Parameterized complexity and algorithms , 2009, Discret. Optim..
[18] Sharon L. Milgram,et al. The Small World Problem , 1967 .
[19] Samir Khuller,et al. The complexity of finding most vital arcs and nodes , 1995 .