Improving resource allocation strategies against human adversaries in security games: an extended study
From MaRDI portal
(Redirected from Publication:360141)
Recommendations
- Robust solutions to Stackelberg games: addressing bounded rationality and limited observations in human cognition
- Comparing human behavior models in repeated Stackelberg security games: an extended study
- Addressing scalability and robustness in security games with multiple boundedly rational adversaries
- Methods and algorithms for infinite Bayesian Stackelberg security games. (Extended abstract)
- Monotonic Maximin: A Robust Stackelberg Solution against Boundedly Rational Followers
Cited in
(20)- A review of attacker-defender games: current state and paths forward
- Identification and prioritization of human resource strategies with employees' creativity approach in administrative organizations using SWOT-ANP
- On the incorporation of adversarial reasoning in course of action analysis and resource allocation
- Security investment over networks with bounded rational agents: analysis and distributed algorithm
- Learning Machiavellian strategies for manipulation in Stackelberg security games
- Addressing scalability and robustness in security games with multiple boundedly rational adversaries
- The risk of attacker behavioral learning: can attacker fool defender under uncertainty?
- Attacker-defender model against quantal response adversaries for cyber security in logistics management: an introductory study
- A game theoretic model for resource allocation among countermeasures with multiple attributes
- Multithreat multisite protection: a security case study
- Comparing human behavior models in repeated Stackelberg security games: an extended study
- Robust solutions to Stackelberg games: addressing bounded rationality and limited observations in human cognition
- Exploiting bounded rationality in risk-based cyber camouflage games
- Risk averse Stackelberg security games with quantal response
- Game-theoretic resource allocation with real-time probabilistic surveillance information
- Methods and algorithms for infinite Bayesian Stackelberg security games. (Extended abstract)
- Modeling credible retaliation threats in deterring the smuggling of nuclear weapons using partial inspection -- a three-stage game
- A complete analysis on the risk of using quantal response: when attacker maliciously changes behavior under uncertainty
- Allocating limited resources to protect a massive number of targets using a game theoretic model
- Network Elicitation in Adversarial Environment
This page was built for publication: Improving resource allocation strategies against human adversaries in security games: an extended study
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q360141)