메뉴 건너뛰기




Volumn 2, Issue , 2012, Pages 1464-1470

Security games for controlling contagion

Author keywords

[No Author keywords available]

Indexed keywords

AFGHANISTAN; INTERCONNECTED NETWORK; MIXED STRATEGY; NONLOCAL; PEACE-KEEPING OPERATIONS; SOCIAL NETWORKS; SPREADING EFFECTS; VIRAL MARKETING;

EID: 84868266435     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (37)

References (27)
  • 1
    • 84868274301 scopus 로고    scopus 로고
    • Automated abstractions for patrolling security games
    • Basilico, N., and Gatti, N. 2011. Automated abstractions for patrolling security games. In AAAI.
    • (2011) AAAI
    • Basilico, N.1    Gatti, N.2
  • 2
    • 83755168026 scopus 로고    scopus 로고
    • Peacekeeping and the contagion of armed conflict
    • Beardsley, K. 2011. Peacekeeping and the contagion of armed conflict. The Journal of Politics 73(4):1051-1064.
    • (2011) The Journal of Politics , vol.73 , Issue.4 , pp. 1051-1064
    • Beardsley, K.1
  • 3
    • 38449123148 scopus 로고    scopus 로고
    • Competitive influence maximization in social networks
    • Bharathi, S.; Kempe, D.; and Salek, M. 2007. Competitive influence maximization in social networks. In WINE, 306-311.
    • (2007) WINE , pp. 306-311
    • Bharathi, S.1    Kempe, D.2    Salek, M.3
  • 4
    • 78650879916 scopus 로고    scopus 로고
    • Threshold models for competitive influence in social networks
    • Borodin, A.; Filmus, Y.; and Oren, J. 2010. Threshold models for competitive influence in social networks. In WINE, 539-550.
    • (2010) WINE , pp. 539-550
    • Borodin, A.1    Filmus, Y.2    Oren, J.3
  • 5
    • 84899453905 scopus 로고    scopus 로고
    • Computing time-dependent policies for patrolling games with mobile targets
    • Bosansky, B.; Lisy, V.; Jakob, M.; and Pechoucek, M. 2011. Computing time-dependent policies for patrolling games with mobile targets. In AAMAS, 989-996.
    • (2011) AAMAS , pp. 989-996
    • Bosansky, B.1    Lisy, V.2    Jakob, M.3    Pechoucek, M.4
  • 6
    • 0038589165 scopus 로고    scopus 로고
    • The anatomy of a large-scale hypertextual web search engine
    • Brin, S., and Page, L. 1998. The anatomy of a large-scale hypertextual web search engine. Computer Networks 30:107-117.
    • (1998) Computer Networks , vol.30 , pp. 107-117
    • Brin, S.1    Page, L.2
  • 7
    • 80052722917 scopus 로고    scopus 로고
    • Limiting the spread of misinformation in social networks
    • Budak, C.; Agrawal, D.; and Abbadi, A. E. 2011. Limiting the spread of misinformation in social networks. In WWW, 665-674.
    • (2011) WWW , pp. 665-674
    • Budak, C.1    Agrawal, D.2    Abbadi, A.E.3
  • 8
    • 77956192689 scopus 로고    scopus 로고
    • Scalable influence maximization for prevalent viral marketing in large-scale social networks
    • Chen, W.; Wang, C.; and Wang, Y. 2010. Scalable influence maximization for prevalent viral marketing in large-scale social networks. In KDD, 1029-1038.
    • (2010) KDD , pp. 1029-1038
    • Chen, W.1    Wang, C.2    Wang, Y.3
  • 9
    • 65549085067 scopus 로고    scopus 로고
    • Power-law distributions in empirical data
    • Clauset, A.; Shalizi, C. R.; and Newman, M. E. J. 2009. Power-law distributions in empirical data. SIAM Rev. 51:661-703.
    • (2009) SIAM Rev. , vol.51 , pp. 661-703
    • Clauset, A.1    Shalizi, C.R.2    Newman, M.E.J.3
  • 11
    • 84899407181 scopus 로고    scopus 로고
    • A Graph-Theoretic Approach to Protect Static and Moving Targets from Adversaries
    • Dickerson, J.; Simari, G.; Subrahmanian, V.; and Kraus, S. 2010. A Graph-Theoretic Approach to Protect Static and Moving Targets from Adversaries. In AAMAS, 299-306.
    • (2010) AAMAS , pp. 299-306
    • Dickerson, J.1    Simari, G.2    Subrahmanian, V.3    Kraus, S.4
  • 12
    • 84862632245 scopus 로고    scopus 로고
    • Competitive contagion in networks
    • Goyal, S., and Kearns, M. 2012. Competitive contagion in networks. In STOC.
    • (2012) STOC.
    • Goyal, S.1    Kearns, M.2
  • 13
    • 78751683676 scopus 로고    scopus 로고
    • Multi-step multi-sensor hider-seeker games
    • Halvorson, E.; Conitzer, V.; and Parr, R. 2009. Multi-step multi-sensor hider-seeker games. In IJCAI, 159-166.
    • (2009) IJCAI , pp. 159-166
    • Halvorson, E.1    Conitzer, V.2    Parr, R.3
  • 14
    • 84880251076 scopus 로고    scopus 로고
    • Influence blocking maximization in social networks under the competitive linear threshold model technical report
    • abs/1110.4723.
    • He, X.; Song, G.; Chen, W.; and Jiang, Q. 2011. Influence blocking maximization in social networks under the competitive linear threshold model technical report. CoRR abs/1110.4723.
    • (2011) CoRR
    • He, X.1    Song, G.2    Chen, W.3    Jiang, Q.4
  • 16
    • 79952401425 scopus 로고    scopus 로고
    • Optimization-based influencing of village social networks in a counterinsurgency
    • Hung, B. W. K.; Kolitz, S. E.; and Ozdaglar, A. E. 2011. Optimization-based influencing of village social networks in a counterinsurgency. In SBP, 10-17.
    • (2011) SBP , pp. 10-17
    • Hung, B.W.K.1    Kolitz, S.E.2    Ozdaglar, A.E.3
  • 18
    • 84899460757 scopus 로고    scopus 로고
    • A double oracle algorithm for zero-sum security games on graphs
    • Jain, M.; Korzhyk, D.; Vanek, O.; Conitzer, V.; Pechoucek, M.; and Tambe, M. 2011. A double oracle algorithm for zero-sum security games on graphs. In AAMAS, 327-334.
    • (2011) AAMAS , pp. 327-334
    • Jain, M.1    Korzhyk, D.2    Vanek, O.3    Conitzer, V.4    Pechoucek, M.5    Tambe, M.6
  • 19
    • 76749098758 scopus 로고    scopus 로고
    • Extracting influential nodes on a social network for information diffusion
    • Kimura, M.; Saito, K.; Nakano, R.; and Motoda, H. 2010. Extracting influential nodes on a social network for information diffusion. Data Min. Knowl. Discov. 20(1):70-97.
    • (2010) Data Min. Knowl. Discov. , vol.20 , Issue.1 , pp. 70-97
    • Kimura, M.1    Saito, K.2    Nakano, R.3    Motoda, H.4
  • 20
    • 48349112328 scopus 로고    scopus 로고
    • Word of mouth: Rumor dissemination in social networks
    • Kostka, J.; Oswald, Y. A.; and Wattenhofer, R. 2008. Word of mouth: Rumor dissemination in social networks. In SIROCCO, 185-196.
    • (2008) SIROCCO , pp. 185-196
    • Kostka, J.1    Oswald, Y.A.2    Wattenhofer, R.3
  • 23
    • 1942452324 scopus 로고    scopus 로고
    • Planning in the presence of cost functions controlled by an adversary
    • McMahan, H. B.; Gordon, G. J.; and Blum, A. 2003. Planning in the presence of cost functions controlled by an adversary. In ICML, 536-543.
    • (2003) ICML , pp. 536-543
    • McMahan, H.B.1    Gordon, G.J.2    Blum, A.3
  • 24
    • 84899919065 scopus 로고    scopus 로고
    • Playing games for security: An efficient exact algorithm for solving bayesian stackelberg games
    • Paruchuri, P.; Pearce, J. P.; Marecki, J.; Tambe, M.; Ordóñez, F.; and Kraus, S. 2008. Playing games for security: An efficient exact algorithm for solving bayesian stackelberg games. In AAMAS.
    • (2008) AAMAS.
    • Paruchuri, P.1    Pearce, J.P.2    Marecki, J.3    Tambe, M.4    Ordóñez, F.5    Kraus, S.6
  • 25
    • 70349307520 scopus 로고    scopus 로고
    • Effects of word-of-mouth versus traditional marketing: Findings from an internet social networking site
    • Trusov, M.; Bucklin, R. E.; and Pauwels, K. 2009. Effects of word-of-mouth versus traditional marketing: Findings from an internet social networking site. Journal of Marketing 73.
    • (2009) Journal of Marketing , pp. 73
    • Trusov, M.1    Bucklin, R.E.2    Pauwels, K.3
  • 26
    • 55849132790 scopus 로고    scopus 로고
    • U.S. Dept. of the Army and U.S. Marine Corps. University of Chicago Press
    • U.S. Dept. of the Army and U.S. Marine Corps. 2007. The U.S. Army/Marine Corps Counterinsurgency Field Manual 3-24. University of Chicago Press.
    • (2007) The U.S. Army/Marine Corps Counterinsurgency Field Manual , pp. 3-24
  • 27
    • 80053434424 scopus 로고    scopus 로고
    • Stackelberg vs. nash in security games: Interchangeability, equivalence, and uniqueness
    • Yin, Z.; Korzhyk, D.; Kiekintveld, C.; Conitzer, V.; ; and Tambe, M. 2010. Stackelberg vs. nash in security games: Interchangeability, equivalence, and uniqueness. In AAMAS.
    • (2010) AAMAS.
    • Yin, Z.1    Korzhyk, D.2    Kiekintveld, C.3    Conitzer, V.4    Tambe, M.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.