-
1
-
-
1542288809
-
A Game Theoretic Approach to Decision and Analysis in Network Intrusion Detection
-
Hawaii, USA
-
T. Alpcan and T. Başar, "A Game Theoretic Approach to Decision and Analysis in Network Intrusion Detection", Proceedings of the 42nd IEEE Conference on Decision and Control, Hawaii, USA, 2003, pp. 2595-2600.
-
(2003)
Proceedings of the 42nd IEEE Conference on Decision and Control
, pp. 2595-2600
-
-
Alpcan, T.1
Başar, T.2
-
2
-
-
14344257107
-
A game theoretic analysis of intrusion detection in access control systems
-
Paradise Island, Bahamas
-
T. Alpcan and T. Başar, "A game theoretic analysis of intrusion detection in access control systems," Proceedings of the 43rd IEEE Conference on Decision and Control, Paradise Island, Bahamas, 2004, pp. 1568-1573.
-
(2004)
Proceedings of the 43rd IEEE Conference on Decision and Control
, pp. 1568-1573
-
-
Alpcan, T.1
Başar, T.2
-
4
-
-
70449507886
-
Trust-based game-theoretic intrusion detection,
-
M.S. thesis, University of Illinois at Urbana-Champaign
-
Z. Yin, "Trust-based game-theoretic intrusion detection," M.S. thesis, University of Illinois at Urbana-Champaign, 2006.
-
(2006)
-
-
Yin, Z.1
-
5
-
-
60649107168
-
A Bayesian game approach for intrusion detection in wireless ad hoc networks
-
Pisa, Italy
-
Y. Liu, C. Comaniciu, and H. Man, "A Bayesian game approach for intrusion detection in wireless ad hoc networks," Proceedings of the Workshop on Game Theory for Networks (GameNets), Pisa, Italy, 2006.
-
(2006)
Proceedings of the Workshop on Game Theory for Networks (GameNets)
-
-
Liu, Y.1
Comaniciu, C.2
Man, H.3
-
6
-
-
0001402950
-
An iterative method of solving a game
-
J. Robinson, "An iterative method of solving a game," Ann. Math., vol. 54, pp. 296-301, 1951.
-
(1951)
Ann. Math
, vol.54
, pp. 296-301
-
-
Robinson, J.1
-
7
-
-
0003646168
-
On the convergence of learning processes in a 2 x 2 nonzero-sum two person game
-
October, Available at
-
K. Miyasawa, "On the convergence of learning processes in a 2 x 2 nonzero-sum two person game," Econometrics Research Program, Princeton University, Research Momorandum No. 33, October 1961. Available at http://www.princeton.edu/ erp/ERParchives/archivepdfs/M33.pdf
-
(1961)
Econometrics Research Program, Princeton University, Research Momorandum
, Issue.33
-
-
Miyasawa, K.1
-
8
-
-
70449467508
-
Fictitious play in 2 x n games
-
Available at
-
U. Berger, "Fictitious play in 2 x n games," Economics Working Paper Archive at WUSTL. Available at: http://econpapers.repec.org/paper/wpawuwpga/0303009.htm
-
Economics Working Paper Archive at WUSTL
-
-
Berger, U.1
-
9
-
-
3843059082
-
Unified convergence proofs of continuous-time fictitious play
-
July
-
J. S. Shamma and G. Arslan, "Unified convergence proofs of continuous-time fictitious play," IEEE Transactions on Automatic Control, Vol. 49, No.7, July 2004.
-
(2004)
IEEE Transactions on Automatic Control
, vol.49
, Issue.7
-
-
Shamma, J.S.1
Arslan, G.2
-
10
-
-
16244381482
-
Dynamic fictitious play, dynamic gradient play, and distributed convergence to Nash equilibria
-
March
-
J. S. Shamma and G. Arslan, "Dynamic fictitious play, dynamic gradient play, and distributed convergence to Nash equilibria," IEEE Transactions on Automatic Control, Vol. 50, No.3, March 2005.
-
(2005)
IEEE Transactions on Automatic Control
, vol.50
, Issue.3
-
-
Shamma, J.S.1
Arslan, G.2
-
12
-
-
70449487446
-
-
R. D. McKelvey, A. M. McLennan, and T. L. Turocy, Gambit: Software Tools for Game Theory, Version 0.2007.01.30, 2007. Available at
-
R. D. McKelvey, A. M. McLennan, and T. L. Turocy, Gambit: Software Tools for Game Theory, Version 0.2007.01.30, 2007. Available at http://gambit.sourceforge.net.
-
-
-
-
13
-
-
70449505184
-
Lecture 11: Fictitious Play and Extensions
-
Available at
-
A. Ozdaglar, "Lecture 11: Fictitious Play and Extensions," Game Theory and Mechanism Design, MIT OpenCourseWare. Available at http://ocw.mit.edu/OcwWeb/Electrical-Engineering-and-Computer-Science/ 6-972Spring-2005/CourseHome/index.htm.
-
Game Theory and Mechanism Design, MIT OpenCourseWare
-
-
Ozdaglar, A.1
-
14
-
-
70449470863
-
Security Games with Incomplete Information,
-
Technical Report, UIUC, Sep. 2008. Available at
-
K. C. Nguyen, T. Alpcan, and T. Başar, "Security Games with Incomplete Information," Technical Report, UIUC, Sep. 2008. Available at http://decision.csl.uiuc.edu/~knguyen4/research/research.html
-
-
-
Nguyen, K.C.1
Alpcan, T.2
Başar, T.3
|