-
2
-
-
80051534209
-
Mixed-initiative optimization in security games: A preliminary report
-
B. An, M. Jain, M. Tambe, and C. Kiekintveld, "Mixed-Initiative Optimization in Security Games: A Preliminary Report," in Proc. of the AAAI Spring Symposium on Help Me Help You: Bridging the Gaps in Human-Agent Collaboration, 2011, pp. 8-11.
-
(2011)
Proc. of the AAAI Spring Symposium on Help Me Help You: Bridging the Gaps in Human-Agent Collaboration
, pp. 8-11
-
-
An, B.1
Jain, M.2
Tambe, M.3
Kiekintveld, C.4
-
3
-
-
82955160678
-
GUARDS and PROTECT: Next generation applications of security games
-
March
-
B. An, J. Pita, E. Shieh, M. Tambe, C. Kiekintveld, and J. Marecki, "GUARDS and PROTECT: Next Generation Applications of Security Games," SIGECOM, vol. 10, pp. 31-34, March 2011.
-
(2011)
SIGECOM
, vol.10
, pp. 31-34
-
-
An, B.1
Pita, J.2
Shieh, E.3
Tambe, M.4
Kiekintveld, C.5
Marecki, J.6
-
4
-
-
80055055241
-
Refinement of strong stackelberg equilibria in security games
-
B. An, M. Tambe, F. Ordonez, E. Shieh, and C. Kiekintveld, "Refinement of Strong Stackelberg Equilibria in Security Games," in Proc. of the 25th Conference on Artificial Intelligence, 2011, pp. 587-593.
-
(2011)
Proc. of the 25th Conference on Artificial Intelligence
, pp. 587-593
-
-
An, B.1
Tambe, M.2
Ordonez, F.3
Shieh, E.4
Kiekintveld, C.5
-
5
-
-
67649304665
-
Inspection games
-
R. J. Aumann and S. Hart, Eds. Amsterdam: North-Holland, ch. 51
-
R. Avenhaus, B. von Stengel, and S. Zamir, "Inspection Games," in Handbook of Game Theory, R. J. Aumann and S. Hart, Eds. Amsterdam: North-Holland, 2002, vol. 3, ch. 51, pp. 1947-1987.
-
(2002)
Handbook of Game Theory
, vol.3
, pp. 1947-1987
-
-
Avenhaus, R.1
Von Stengel, B.2
Zamir, S.3
-
7
-
-
0024092299
-
Sequential stackelberg equilibria in two-person games
-
M. Breton, A. Alg, and A. Haurie, "Sequential stackelberg equilibria in two-person games," Optimization Theory and Applications, vol. 59, no. 1, pp. 71-97, 1988.
-
(1988)
Optimization Theory and Applications
, vol.59
, Issue.1
, pp. 71-97
-
-
Breton, M.1
Alg, A.2
Haurie, A.3
-
8
-
-
27344439516
-
A two-sided optimization for theater ballistic missile defense
-
G. Brown, M. Carlyle, J. Kline, and K.Wood, "A Two-Sided Optimization for Theater Ballistic Missile Defense," in Operations Research, vol. 53, 2005, pp. 263-275.
-
(2005)
Operations Research
, vol.53
, pp. 263-275
-
-
Brown, G.1
Carlyle, M.2
Kline, J.3
Wood, K.4
-
9
-
-
33845439386
-
Defending critical infrastructure
-
DOI 10.1287/inte.1060.0252
-
G. Brown, M. Carlyle, J. Salmeron, and K. Wood, "Defending Critical Infrastructure," in Interfaces, vol. 36, no. 6, 2006, pp. 530 - 544. (Pubitemid 44905062)
-
(2006)
Interfaces
, vol.36
, Issue.6
, pp. 530-544
-
-
Brown, G.1
Carlyle, M.2
Salmeron, J.3
Wood, K.4
-
10
-
-
84899426629
-
Multi-objective optimization for security games
-
M. Brown, B. An, C. Kiekintveld, F. Ordonez, and M. Tambe, "Multi-objective optimization for security games," in Proc. of The 11th International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2012.
-
(2012)
Proc. of the 11th International Conference on Autonomous Agents and Multiagent Systems (AAMAS)
-
-
Brown, M.1
An, B.2
Kiekintveld, C.3
Ordonez, F.4
Tambe, M.5
-
11
-
-
77958587143
-
Battle for mumbai ends, death toll rises to 195
-
29 November
-
R. Chandran and G. Beitchman, "Battle for Mumbai Ends, Death Toll Rises to 195," Times of India, 29 November 2008, http://articles. timesofindia.indiatimes.com/2008-11-29/india/279301711taj-hotel-three- terrorists-nariman-house.
-
(2008)
Times of India
-
-
Chandran, R.1
Beitchman, G.2
-
12
-
-
33748712836
-
Computing the optimal strategy to commit to
-
Proceedings of the 7th ACM Conference on Electronic Commerce 2006
-
V. Conitzer and T. Sandholm, "Computing the Optimal Strategy to Commit to," in Proc. of the ACM Conference on Electronic Commerce (ACM-EC), 2006, pp. 82-90. (Pubitemid 44393627)
-
(2006)
Proceedings of the ACM Conference on Electronic Commerce
, vol.2006
, pp. 82-90
-
-
Conitzer, V.1
Sandholm, T.2
-
13
-
-
85051929411
-
Game theoretical insights in strategic patrolling: Model and algorithm in normal-form
-
N. Gatti, "Game Theoretical Insights in Strategic Patrolling: Model and Algorithm in Normal-Form," in ECAI-08, 2008, pp. 403-407.
-
(2008)
ECAI-08
, pp. 403-407
-
-
Gatti, N.1
-
16
-
-
77958590576
-
Security games with arbitrary schedules: A branch and price approach
-
M. Jain, E. Kardes, C. Kiekintveld, F. Ordonez, and M. Tambe, "Security Games with Arbitrary Schedules: A Branch and Price Approach," in Proc. of The 24th AAAI Conference on Artificial Intelligence, 2010, pp. 792-797.
-
(2010)
Proc. of the 24th AAAI Conference on Artificial Intelligence
, pp. 792-797
-
-
Jain, M.1
Kardes, E.2
Kiekintveld, C.3
Ordonez, F.4
Tambe, M.5
-
18
-
-
84899460757
-
A double oracle algorithm for zero-sum security games on graphs
-
M. Jain, D. Korzhyk, O. Vanek, M. Pechoucek, V. Conitzer, and M. Tambe, "A Double Oracle Algorithm for Zero-Sum SEcurity games on Graphs," in Proc. of The 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2011.
-
(2011)
Proc. of the 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS)
-
-
Jain, M.1
Korzhyk, D.2
Vanek, O.3
Pechoucek, M.4
Conitzer, V.5
Tambe, M.6
-
19
-
-
77955458634
-
Software assistants for randomized patrol planning for the LAX airport police and the federal air marshal service
-
M. Jain, J. Tsai, J. Pita, C. Kiekintveld, S. Rathi, M. Tambe, and F. Ordonez, "Software Assistants for Randomized Patrol Planning for the LAX Airport Police and the Federal Air Marshal Service," Interfaces, vol. 40, pp. 267-290, 2010.
-
(2010)
Interfaces
, vol.40
, pp. 267-290
-
-
Jain, M.1
Tsai, J.2
Pita, J.3
Kiekintveld, C.4
Rathi, S.5
Tambe, M.6
Ordonez, F.7
-
20
-
-
84864955350
-
Towards optimal patrol strategies for urban security in transit systems
-
A. X. Jiang, Z. Yin, C. Kietkintveld, K. Leyton-Brown, T. Sandholm, and M. Tambe, "Towards Optimal Patrol Strategies for Urban Security in Transit Systems," in Proc. of the AAAI Spring Symposium on Game Theory for Security, Sustainability and Health, 2012.
-
(2012)
Proc. of the AAAI Spring Symposium on Game Theory for Security, Sustainability and Health
-
-
Jiang, A.X.1
Yin, Z.2
Kietkintveld, C.3
Leyton-Brown, K.4
Sandholm, T.5
Tambe, M.6
-
21
-
-
85098241874
-
Patrolling to maximize pristine forest area
-
M. Johnson, F. Fang, R. Yang, M. Tambe, and H. Albers, "Patrolling to Maximize Pristine Forest Area," in Proc. of the AAAI Spring Symposium on Game Theory for Security, Sustainability and Health, 2012.
-
(2012)
Proc. of the AAAI Spring Symposium on Game Theory for Security, Sustainability and Health
-
-
Johnson, M.1
Fang, F.2
Yang, R.3
Tambe, M.4
Albers, H.5
-
22
-
-
0000125532
-
Prospect theory: An analysis of decision under risk
-
D. Kahneman and A. Tvesky, "Prospect Theory: An Analysis of Decision Under Risk," Econometrica, vol. 47, no. 2, pp. 263-291, 1979.
-
(1979)
Econometrica
, vol.47
, Issue.2
, pp. 263-291
-
-
Kahneman, D.1
Tvesky, A.2
-
23
-
-
84875703427
-
-
Retrieved Feb 1, 2011
-
A. Keteyian, "TSA: Federal Air Marshals," 2010, http://www.cbsnews.com/stories/2010/02/01/earlyshow/main6162291.shtml, retrieved Feb 1, 2011.
-
(2010)
TSA: Federal Air Marshals
-
-
Keteyian, A.1
-
24
-
-
84899860443
-
Computing optimal randomized resource allocations for massive security games
-
C. Kiekintveld, M. Jain, J. Tsai, J. Pita, M. Tambe, and F. Ordonez, "Computing Optimal Randomized Resource Allocations for Massive Security Games," in Proc. of The 8th International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2009, pp. 689-696.
-
(2009)
Proc. of the 8th International Conference on Autonomous Agents and Multiagent Systems (AAMAS)
, pp. 689-696
-
-
Kiekintveld, C.1
Jain, M.2
Tsai, J.3
Pita, J.4
Tambe, M.5
Ordonez, F.6
-
26
-
-
0018060592
-
On generalized Stackelberg strategies
-
G. Leitmann, "On Generalized Stackelberg Strategies," Optimization Theory and Applications, vol. 26, no. 4, pp. 637-643, 1978.
-
(1978)
Optimization Theory and Applications
, vol.26
, Issue.4
, pp. 637-643
-
-
Leitmann, G.1
-
27
-
-
14844293542
-
Game strategies in network security
-
DOI 10.1007/s10207-004-0060-x
-
K. Lye and J. M. Wing, "Game Strategies in Network Security," International Journal of Information Security, vol. 4, no. 1-2, pp. 71-86, 2005. (Pubitemid 40347202)
-
(2005)
International Journal of Information Security
, vol.4
, Issue.1-2
, pp. 71-86
-
-
Lye, K.-W.1
Wing, J.M.2
-
28
-
-
0348166371
-
Quantal response equilibria for normal form games
-
R. D. McKelvey and T. R. Palfrey, "Quantal Response Equilibria for Normal Form Games," Games and Economic Behavior, vol. 10, no. 1, pp. 6-38, 1995.
-
(1995)
Games and Economic Behavior
, vol.10
, Issue.1
, pp. 6-38
-
-
McKelvey, R.D.1
Palfrey, T.R.2
-
30
-
-
84899919065
-
Playing games with security: An efficient exact algorithm for Bayesian Stackelberg games
-
P. Paruchuri, J. P. Pearce, J. Marecki, M. Tambe, F. Ordonez, and S. Kraus, "Playing Games with Security: An Efficient Exact Algorithm for Bayesian Stackelberg Games," in Proc. of The 7th International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2008, pp. 895-902.
-
(2008)
Proc. of the 7th International Conference on Autonomous Agents and Multiagent Systems (AAMAS)
, pp. 895-902
-
-
Paruchuri, P.1
Pearce, J.P.2
Marecki, J.3
Tambe, M.4
Ordonez, F.5
Kraus, S.6
-
31
-
-
77955848771
-
Robust solutions to Stackelberg games: Addressing bounded rationality and limited observations in human cognition
-
J. Pita, M. Jain, M. Tambe, F. Ordóñez, and S. Kraus, "Robust Solutions to Stackelberg Games: Addressing Bounded Rationality and Limited Observations in Human Cognition," Artificial Intelligence, vol. 174, no. 15, pp. 1142-1171, 2010.
-
(2010)
Artificial Intelligence
, vol.174
, Issue.15
, pp. 1142-1171
-
-
Pita, J.1
Jain, M.2
Tambe, M.3
Ordóñez, F.4
Kraus, S.5
-
32
-
-
84899939869
-
Deployed ARMOR protection: The application of a game-theoretic model for security at the los angeles international airport
-
J. Pita, M. Jain, C. Western, C. Portway, M. Tambe, F. Ordonez, S. Kraus, and P. Parachuri, "Deployed ARMOR protection: The Application of a Game-Theoretic Model for Security at the Los Angeles International Airport," in Proc. of The 7th International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2008, pp. 125-132.
-
(2008)
Proc. of the 7th International Conference on Autonomous Agents and Multiagent Systems (AAMAS)
, pp. 125-132
-
-
Pita, J.1
Jain, M.2
Western, C.3
Portway, C.4
Tambe, M.5
Ordonez, F.6
Kraus, S.7
Parachuri, P.8
-
33
-
-
84899442804
-
GUARDS - Game theoretic security allocation on a national scale
-
J. Pita, M. Tambe, C. Kiekintveld, S. Cullen, and E. Steigerwald, "GUARDS - Game Theoretic Security Allocation on a National Scale," in Proc. of The 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2011.
-
(2011)
Proc. of the 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS)
-
-
Pita, J.1
Tambe, M.2
Kiekintveld, C.3
Cullen, S.4
Steigerwald, E.5
-
34
-
-
46649106463
-
Terrorism and game theory
-
T. Sandler and D. G. A. M., "Terrorism and Game Theory," Simulation and Gaming, vol. 34, no. 3, pp. 319-337, 2003.
-
(2003)
Simulation and Gaming
, vol.34
, Issue.3
, pp. 319-337
-
-
Sandler, T.1
-
35
-
-
84899424114
-
PROTECT: A deployed game theoretic system to protect the ports of the united states
-
E. Shieh, B. An, R. Yang, M. Tambe, C. Baldwin, J. DiRenzo, B. Maule, and G. Meyer, "PROTECT: A Deployed Game Theoretic System to Protect the Ports of the United States," in Proc. of The 11th International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2012.
-
(2012)
Proc. of the 11th International Conference on Autonomous Agents and Multiagent Systems (AAMAS)
-
-
Shieh, E.1
An, B.2
Yang, R.3
Tambe, M.4
Baldwin, C.5
Direnzo, J.6
Maule, B.7
Meyer, G.8
-
36
-
-
70349307520
-
Effects of word-of-mouth versus traditional marketing: Findings from an internet social networking site
-
M. Trusov, R. E. Bucklin, and K. Pauwels, "Effects of Word-of-Mouth versus Traditional Marketing: Findings from an Internet Social Networking Site," Journal of Marketing, vol. 73, 2009.
-
(2009)
Journal of Marketing
, vol.73
-
-
Trusov, M.1
Bucklin, R.E.2
Pauwels, K.3
-
37
-
-
84899861231
-
IRIS: A tool for strategic security allocation in transportation networks
-
J. Tsai, S. Rathi, C. Kiekintveld, F. Ordonez, and M. Tambe, "IRIS: a Tool for Strategic Security Allocation in Transportation Networks," in Proc. of The 8th International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2009, pp. 37-44.
-
(2009)
Proc. of the 8th International Conference on Autonomous Agents and Multiagent Systems (AAMAS)
, pp. 37-44
-
-
Tsai, J.1
Rathi, S.2
Kiekintveld, C.3
Ordonez, F.4
Tambe, M.5
-
39
-
-
84875728579
-
-
U.S. Department of Homeland Security
-
- "Transportation Security Administration - U.S. Department of Homeland Security," 2011, http://www.tsa.gov/.
-
(2011)
-
-
-
40
-
-
84899445988
-
Game-theoretic resource allocation for malicious packet detection in computer networks
-
O. Vanek, Z. Yin, M. Jain, B. Bosansky, M. Tambe, and M. Pechoucek, "Game-Theoretic Resource Allocation for Malicious Packet Detection in Computer Networks," in Proc. of The 11th International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2012.
-
(2012)
Proc. of the 11th International Conference on Autonomous Agents and Multiagent Systems (AAMAS)
-
-
Vanek, O.1
Yin, Z.2
Jain, M.3
Bosansky, B.4
Tambe, M.5
Pechoucek, M.6
-
43
-
-
84876903792
-
Improving resource allocation strategy against human adversaries in security games
-
R. Yang, C. Kiekintveld, F. Ordonez, M. Tambe, and R. John, "Improving Resource Allocation Strategy Against Human Adversaries in Security Games," in IJCAI, 2011.
-
(2011)
IJCAI
-
-
Yang, R.1
Kiekintveld, C.2
Ordonez, F.3
Tambe, M.4
John, R.5
-
44
-
-
80055033132
-
Risk-averse strategies for security games with execution and observational uncertainty
-
Z. Yin, M. Jain, M. Tambe, and F. Ordonez, "Risk-Averse Strategies for Security Games with Execution and Observational Uncertainty," in Proc. of The 25th AAAI Conference on Artificial Intelligence (AAAI), 2011, pp. 758-763.
-
(2011)
Proc. of the 25th AAAI Conference on Artificial Intelligence (AAAI)
, pp. 758-763
-
-
Yin, Z.1
Jain, M.2
Tambe, M.3
Ordonez, F.4
-
45
-
-
84868295022
-
TRUSTS: Scheduling randomized patrols for fare inspection in transit systems
-
Z. Yin, A. Jiang, M. Johnson, M. Tambe, C. Kiekintveld, K. Leyton-Brown, T. Sandholm, and J. Sullivan, "TRUSTS: Scheduling Randomized Patrols for Fare Inspection in Transit Systems," in Proc. of The 24th Conference on Innovative Applications of Artificial Intelligence (IAAI), 2012.
-
(2012)
Proc. of the 24th Conference on Innovative Applications of Artificial Intelligence (IAAI)
-
-
Yin, Z.1
Jiang, A.2
Johnson, M.3
Tambe, M.4
Kiekintveld, C.5
Leyton-Brown, K.6
Sandholm, T.7
Sullivan, J.8
|