The following pages link to Security and Game Theory (Q3225470):
Displaying 50 items.
- Comparing human behavior models in repeated Stackelberg security games: an extended study (Q329050) (← links)
- Optimal design and defense of networks under link attacks (Q502337) (← links)
- Security games on matroids (Q507326) (← links)
- Keeping pace with criminals: an extended study of designing patrol allocation against adaptive opportunistic criminals (Q725011) (← links)
- A repeated imitation model with dependence between stages: decision strategies and rewards (Q747545) (← links)
- Dynamic contract design for systemic cyber risk management of interdependent enterprise networks (Q823843) (← links)
- Optimal defense against election control by deleting voter groups (Q1647508) (← links)
- A Monte Carlo tree search approach to finding efficient patrolling schemes on graphs (Q1735189) (← links)
- Adversarial classification using signaling games with an application to phishing detection (Q1741294) (← links)
- An interdiction game on a queueing network with multiple intruders (Q1753530) (← links)
- A polynomial-time method to compute all Nash equilibria solutions of a general two-person inspection game (Q2028790) (← links)
- Engineering secure self-adaptive systems with Bayesian games (Q2044181) (← links)
- Computing mixed strategies equilibria in presence of switching costs by the solution of nonconvex QP problems (Q2044489) (← links)
- Negotiating team formation using deep reinforcement learning (Q2046007) (← links)
- Protecting elections by recounting ballots (Q2046043) (← links)
- Exploiting bounded rationality in risk-based cyber camouflage games (Q2056937) (← links)
- Harnessing the power of deception in attack graph-based security games (Q2056942) (← links)
- Normalizing flow policies for multi-agent systems (Q2056951) (← links)
- Using one-sided partially observable stochastic games for solving zero-sum security games with sequential attacks (Q2056962) (← links)
- Guessing the game: an individual's awareness and assessment of a game's existence (Q2221261) (← links)
- Using the extraproximal method for computing the shortest-path mixed Lyapunov equilibrium in Stackelberg security games (Q2229090) (← links)
- Recursively modeling other agents for decision making: a research perspective (Q2287201) (← links)
- Leadership in singleton congestion games: what is hard and what is easy (Q2289020) (← links)
- Gradient methods for solving Stackelberg games (Q2290375) (← links)
- Allocating limited resources to protect a massive number of targets using a game theoretic model (Q2298550) (← links)
- Non-equilibrium dynamic games and cyber-physical security: a cognitive hierarchy approach (Q2328122) (← links)
- Static search games played over graphs and general metric spaces (Q2356189) (← links)
- Hitting a path: a generalization of weighted connectivity via game theory (Q2424795) (← links)
- A robust optimization approach to enhancing reliability in production planning under non-compliance risks (Q2454336) (← links)
- Network design and defence (Q2636766) (← links)
- A sequential Stackelberg game for dynamic inspection problems (Q2672097) (← links)
- Multilinear Games (Q2959817) (← links)
- Optimal and Game-Theoretic Deployment of Security Investments in Interdependent Assets (Q3179194) (← links)
- Tackling Sequential Attacks in Security Games (Q3297672) (← links)
- Game-Theoretic Resource Allocation with Real-Time Probabilistic Surveillance Information (Q3451173) (← links)
- Computation of Stackelberg Equilibria of Finite Sequential Games (Q3460789) (← links)
- A continuous-time Markov Stackelberg security game approach for reasoning about real patrol strategies (Q4561198) (← links)
- A game-theoretical approach for policing decision support (Q4594585) (← links)
- A Unified Framework for Multistage Mixed Integer Linear Optimization (Q5014640) (← links)
- How Do You Defend a Network? (Q5022165) (← links)
- Optimally Deceiving a Learning Leader in Stackelberg Games (Q5026202) (← links)
- Tree-Based Structural Twin Support Tensor Clustering with Square Loss Function (Q5045348) (← links)
- Deception in multi-attacker security game with nonfuzzy and fuzzy payoffs (Q5054021) (← links)
- Game Theory and Cyber Defense (Q5140372) (← links)
- Economically Optimal Variable Tag Length Message Authentication (Q5854434) (← links)
- Solving Defender-Attacker Game with Multiple Decision Makers Using Expected-Value Model (Q5878265) (← links)
- Modeling bluffing behavior in signaling security games (Q6071098) (← links)
- Games over probability distributions revisited: new equilibrium models and refinements (Q6105156) (← links)
- A complete analysis on the risk of using quantal response: when attacker maliciously changes behavior under uncertainty (Q6105158) (← links)
- A survey on mixed-integer programming techniques in bilevel optimization (Q6114905) (← links)