暂无分享,去创建一个
[1] Nicholas R. Jennings,et al. Optimal Escape Interdiction on Transportation Networks , 2017, IJCAI.
[2] Nicola Basilico,et al. Capturing augmented sensing capabilities and intrusion delay in patrolling-intrusion games , 2009, 2009 IEEE Symposium on Computational Intelligence and Games.
[3] Nicola Basilico,et al. Patrolling security games: Definition and algorithms for solving large instances with single patroller and single intruder , 2012, Artif. Intell..
[4] Steve Alpern,et al. Patrolling a Border , 2016, Oper. Res..
[5] Gerhard J. Woeginger,et al. Developments from a June 1996 seminar on Online algorithms: the state of the art , 1998 .
[6] Milind Tambe,et al. GUARDS: game theoretic security allocation on a national scale , 2011, AAMAS.
[7] Milind Tambe,et al. Divide to Defend: Collusive Security Games , 2016, GameSec.
[8] Branislav Bosanský,et al. Optimal Network Security Hardening Using Attack Graph Games , 2015, IJCAI.
[9] Branislav Bosanský,et al. Approximate Solutions for Attack Graph Games with Imperfect Information , 2015, GameSec.
[10] Nicola Basilico,et al. Coordinating Multiple Defensive Resources in Patrolling Games with Alarm Systems , 2017, AAMAS.
[11] Stefano Carpin,et al. USARSim: a robot simulator for research and education , 2007, Proceedings 2007 IEEE International Conference on Robotics and Automation.
[12] Bo An,et al. Security Games on a Plane , 2017, AAAI.
[13] Krishnendu Chatterjee,et al. A survey of stochastic ω-regular games , 2012, J. Comput. Syst. Sci..
[14] Nicola Basilico,et al. Moving game theoretical patrolling strategies from theory to practice: An USARSim simulation , 2010, 2010 IEEE International Conference on Robotics and Automation.
[15] Noa Agmon. On events in multi-robot patrol in adversarial environments , 2010, AAMAS.
[16] Bo An,et al. Optimizing Personalized Email Filtering Thresholds to Mitigate Sequential Spear Phishing Attacks , 2016, AAAI.
[17] Sarit Kraus,et al. Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games , 2008, AAMAS.
[18] Bo An,et al. Efficient Resource Allocation for Protecting Coral Reef Ecosystems , 2016, IJCAI.
[19] Manish Jain,et al. Efficiently Solving Joint Activity Based Security Games , 2013, IJCAI.
[20] Nicola Basilico,et al. A Security Game Combining Patrolling and Alarm-Triggered Responses Under Spatial and Detection Uncertainties , 2016, AAAI.
[21] Vincent Conitzer,et al. Complexity of Computing Optimal Stackelberg Strategies in Security Resource Allocation Games , 2010, AAAI.
[22] Yoav Shoham,et al. Multiagent Systems - Algorithmic, Game-Theoretic, and Logical Foundations , 2009 .
[23] Nicola Basilico,et al. Finding the optimal strategies for robotic patrolling with adversaries in topologically-represented environments , 2009, 2009 IEEE International Conference on Robotics and Automation.
[24] Sarit Kraus,et al. Multi-robot adversarial patrolling: facing coordinated attacks , 2014, AAMAS.
[25] Sarit Kraus,et al. Game-Theoretic Patrolling with Dynamic Execution Uncertainty and a Case Study on a Real Transit System , 2014, J. Artif. Intell. Res..
[26] William H. Ruckle,et al. Ambushing Random Walks I: Finite Models , 1976, Oper. Res..
[27] Milind Tambe,et al. Get Me to My GATE on Time: Efficiently Solving General-Sum Bayesian Threat Screening Games , 2016, ECAI.
[28] B. Stengel,et al. Leadership with commitment to mixed strategies , 2004 .
[29] Micah Adler,et al. Randomized Pursuit-Evasion in Graphs , 2002, Combinatorics, Probability and Computing.
[30] Nicola Basilico,et al. Adversarial patrolling with spatially uncertain alarm signals , 2015, Artif. Intell..
[31] Xin-She Yang,et al. Introduction to Algorithms , 2021, Nature-Inspired Optimization Algorithms.
[32] Vincent Conitzer,et al. Computing the optimal strategy to commit to , 2006, EC '06.
[33] Nicola Basilico,et al. Automated Abstractions for Patrolling Security Games , 2011, AAAI.
[34] Sarit Kraus,et al. Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS 2008.
[35] Bo An,et al. Stop Nuclear Smuggling Through Efficient Container Inspection , 2017, AAMAS.
[36] Bo An,et al. PROTECT - A Deployed Game Theoretic System for Strategic Security Allocation for the United States Coast Guard , 2012, AI Mag..
[37] Nicola Basilico,et al. Asynchronous Multi-Robot Patrolling against Intrusions in Arbitrary Topologies , 2010, AAAI.
[38] Milind Tambe,et al. When Security Games Go Green: Designing Defender Strategies to Prevent Poaching and Illegal Fishing , 2015, IJCAI.
[39] Christine Julien,et al. On coordination in practical multi-robot patrol , 2012, 2012 IEEE International Conference on Robotics and Automation.
[40] Milind Tambe,et al. Trends and Applications in Stackelberg Security Games , 2018 .
[41] Manish Jain,et al. Computing optimal randomized resource allocations for massive security games , 2009, AAMAS 2009.
[42] Milind Tambe,et al. Security and Game Theory: IRIS – A Tool for Strategic Security Allocation in Transportation Networks , 2011, AAMAS 2011.
[43] Nicholas R. Jennings,et al. Introducing Alarms in Adversarial Patrolling Games , 2013 .
[44] Sarit Kraus,et al. Multi-Robot Adversarial Patrolling: Facing a Full-Knowledge Opponent , 2011, J. Artif. Intell. Res..
[45] Bo An,et al. Computing Solutions in Infinite-Horizon Discounted Adversarial Patrolling Games , 2014, ICAPS.
[46] Steve Alpern,et al. Patrolling Games , 2011, Oper. Res..
[47] S. Alpern. Infiltration games on arbitrary graphs , 1992 .
[48] Mina Guirguis,et al. Don't Bury your Head in Warnings: A Game-Theoretic Approach for Intelligent Allocation of Cyber-security Alerts , 2017, IJCAI.
[49] Bo An,et al. Security Games with Protection Externalities , 2015, AAAI.
[50] Milind Tambe,et al. CAPTURE: A New Predictive Anti-Poaching Tool for Wildlife Protection , 2016, AAMAS.
[51] Milind Tambe,et al. NECTAR : Game-Theoretic Factory Inspection Scheduling and Explanation for Toxic Wastewater Abatement ∗ , 2016 .
[52] M. M. Flood. THE HIDE AND SEEK GAME OF VON NEUMANN , 1972 .
[53] P. Hudson. Search Games , 1982 .
[54] Milind Tambe,et al. One Size Does Not Fit All: A Game-Theoretic Approach for Dynamically and Effectively Screening for Threats , 2016, AAAI.