Security and Game Theory

From MaRDI portal
Publication:3225470

DOI10.1017/CBO9780511973031zbMath1235.91005OpenAlexW4253730333MaRDI QIDQ3225470

Milind Tambe

Publication date: 21 March 2012

Full work available at URL: https://doi.org/10.1017/cbo9780511973031




Related Items

Dynamic contract design for systemic cyber risk management of interdependent enterprise networksTree-Based Structural Twin Support Tensor Clustering with Square Loss FunctionGame-Theoretic Resource Allocation with Real-Time Probabilistic Surveillance InformationOptimal and Game-Theoretic Deployment of Security Investments in Interdependent AssetsNetwork design and defenceComputation of Stackelberg Equilibria of Finite Sequential GamesComparing human behavior models in repeated Stackelberg security games: an extended studyOptimal defense against election control by deleting voter groupsA continuous-time Markov Stackelberg security game approach for reasoning about real patrol strategiesSolving Defender-Attacker Game with Multiple Decision Makers Using Expected-Value ModelA sequential Stackelberg game for dynamic inspection problemsModeling bluffing behavior in signaling security gamesDecomposition of probability marginals for security games in abstract networksA game-theoretical approach for policing decision supportGames over probability distributions revisited: new equilibrium models and refinementsA complete analysis on the risk of using quantal response: when attacker maliciously changes behavior under uncertaintyA survey on mixed-integer programming techniques in bilevel optimizationHitting a path: a generalization of weighted connectivity via game theoryMultilinear GamesThe risk of attacker behavioral learning: can attacker fool defender under uncertainty?Casino rationale: countering attacker deception in zero-sum Stackelberg security games of bounded rationalityRandomized strategies for robust combinatorial optimization with approximate separationDeception in multi-attacker security game with nonfuzzy and fuzzy payoffsGuessing the game: an individual's awareness and assessment of a game's existenceGame Theory and Cyber DefenseA robust optimization approach to enhancing reliability in production planning under non-compliance risksTackling Sequential Attacks in Security GamesUsing the extraproximal method for computing the shortest-path mixed Lyapunov equilibrium in Stackelberg security gamesA Monte Carlo tree search approach to finding efficient patrolling schemes on graphsAdversarial classification using signaling games with an application to phishing detectionOptimal design and defense of networks under link attacksSecurity games on matroidsAn interdiction game on a queueing network with multiple intrudersA polynomial-time method to compute all Nash equilibria solutions of a general two-person inspection gameKeeping pace with criminals: an extended study of designing patrol allocation against adaptive opportunistic criminalsRecursively modeling other agents for decision making: a research perspectiveLeadership in singleton congestion games: what is hard and what is easyGradient methods for solving Stackelberg gamesEngineering secure self-adaptive systems with Bayesian gamesComputing mixed strategies equilibria in presence of switching costs by the solution of nonconvex QP problemsNegotiating team formation using deep reinforcement learningProtecting elections by recounting ballotsAllocating limited resources to protect a massive number of targets using a game theoretic modelA repeated imitation model with dependence between stages: decision strategies and rewardsExploiting bounded rationality in risk-based cyber camouflage gamesHarnessing the power of deception in attack graph-based security gamesNormalizing flow policies for multi-agent systemsUsing one-sided partially observable stochastic games for solving zero-sum security games with sequential attacksNon-equilibrium dynamic games and cyber-physical security: a cognitive hierarchy approachEconomically Optimal Variable Tag Length Message AuthenticationA Unified Framework for Multistage Mixed Integer Linear OptimizationHow Do You Defend a Network?Optimally Deceiving a Learning Leader in Stackelberg GamesStatic search games played over graphs and general metric spaces