-
4
-
-
69349098240
-
Settling the complexity of computing two-player Nash equilibria
-
Xi Chen, Xiaotie Deng, and Shang-Hua Teng. Settling the complexity of computing two-player Nash equilibria. J. ACM, 56(3):1-57, 2009.
-
(2009)
J. ACM
, vol.56
, Issue.3
, pp. 1-57
-
-
Chen, X.1
Deng, X.2
Teng, S.-H.3
-
5
-
-
44649117928
-
New complexity results about Nash equilibria
-
Vincent Conitzer and Tuomas Sandholm. New complexity results about Nash equilibria. Games and Economic Behavior, 63(2):621-641, 2008.
-
(2008)
Games and Economic Behavior
, vol.63
, Issue.2
, pp. 621-641
-
-
Conitzer, V.1
Sandholm, T.2
-
6
-
-
84886079232
-
Marco cremonini and dmitri nizovtsev understanding and influencing attackers' decisions: Implications for security investment strategies
-
Second World Congress of the Game Theory Society. Marco Cremonini and Dmitri Nizovtsev. Understanding and influencing attackers' decisions: Implications for security investment strategies. In The Fifth Workshop on the Economics of Information Security (WEIS 2006), 2006.
-
(2006)
The Fifth Workshop on the Economics of Information Security (WEIS 2006)
-
-
-
7
-
-
58849134355
-
The complexity of computing a Nash equilibrium
-
Constantinos Daskalakis, Paul W. Goldberg, and Christos H. Papadimitriou. The complexity of computing a Nash equilibrium. Commun. ACM, 52(2): 89-97, 2009.
-
(2009)
Commun. ACM
, vol.52
, Issue.2
, pp. 89-97
-
-
Goldberg, P.W.1
Papadimitriou, C.H.2
-
9
-
-
70350389209
-
Blue versus red: Towards a model of distributed security attacks
-
Springer-Verlag, Berlin, Heidelberg
-
Neal Fultz and Jens Grossklags. Blue versus red: Towards a model of distributed security attacks. In Roger Dingledine and Philippe Golle, editors, Financial Cryptography and Data Security, pages 167-183. Springer-Verlag, Berlin, Heidelberg, 2009.
-
(2009)
Roger Dingledine and Philippe Golle, Editors, Financial Cryptography and Data Security
, pp. 167-183
-
-
Fultz, N.1
Grossklags, J.2
-
10
-
-
45249127547
-
Nash and correlated equilibria: Some complexity considerations
-
I. Gilboa and E. Zemel. Nash and correlated equilibria: some complexity considerations. Games and Economic Behavior, 1:80-93, 1989.
-
(1989)
Games and Economic Behavior
, vol.1
, pp. 80-93
-
-
Gilboa, I.1
Zemel, E.2
-
11
-
-
84860247903
-
Container transportation as an interdependent security problem
-
Konstantinos Gkonis and Harilaos Psaraftis. Container transportation as an interdependent security problem. Journal of Transportation Security, 3:197-211, 2010.
-
(2010)
Journal of Transportation Security
, vol.3
, pp. 197-211
-
-
Gkonis, K.1
Psaraftis, H.2
-
12
-
-
31144471981
-
Pure Nash equilibria: Hard and easy games
-
Georg Gottlob, Gianluigi Greco, and Francesco Scarcello. Pure Nash equilibria: Hard and easy games. J. Artif. Int. Res., 24(1):357-406, 2005.
-
(2005)
J. Artif. Int. Res., 24
, Issue.1
, pp. 357-406
-
-
Gottlob, G.1
Greco, G.2
Scarcello, F.3
-
13
-
-
16644390753
-
IDS models of airline security
-
April
-
Geoffrey Heal and Howard Kunreuther. IDS models of airline security. Journal of Conflict Resolution, 49 (2):201-217, April 2005.
-
(2005)
Journal of Conflict Resolution
, vol.49
, Issue.2
, pp. 201-217
-
-
Heal, G.1
Kunreuther, H.2
-
14
-
-
34447320540
-
Modeling interdependent risks
-
July
-
Geoffrey Heal and Howard Kunreuther. Modeling interdependent risks. Risk Analysis, 27:621-634, July 2007.
-
(2007)
Risk Analysis
, vol.27
, pp. 621-634
-
-
Heal, G.1
Kunreuther, H.2
-
15
-
-
84899460757
-
A double oracle algorithm for zero-sum security games on graphs
-
Manish Jain, Dmytro Korzhyky, Ondrej Vanek, Vincent Conitzery, Michal Pechoucek, and Milind Tambe. A double oracle algorithm for zero-sum security games on graphs. In AAMAS, 2011.
-
(2011)
AAMAS
-
-
Jain, M.1
Korzhyky, D.2
Vanek, O.3
Conitzery, V.4
Pechoucek, M.5
Tambe, M.6
-
16
-
-
78650721633
-
Uncertainty in interdependent security games
-
Benjamin Johnson, Jens Grossklags, Nicolas Christin, and John Chuang. Uncertainty in interdependent security games. In Proceedings of the First International Conference on Decision and Game Theory for Security, GameSec'10, pages 234-244.
-
Proceedings of the First International Conference on Decision and Game Theory for Security, GameSec'10
, pp. 234-244
-
-
Johnson, B.1
Grossklags, J.2
Christin, N.3
Chuang, J.4
-
17
-
-
0141591857
-
Graphical models for game theory
-
Berlin, Heidelberg, 2010. Springer-Verlag. M. Kearns, M. Littman, and S. Singh. Graphical models for game theory. In Proceedings of the Conference on Uncertainty in Artificial Intelligence, pages 253-260, 2001.
-
(2001)
Proceedings of the Conference on Uncertainty in Artificial Intelligence
, pp. 253-260
-
-
Kearns, M.1
Littman, M.2
Singh, S.3
-
19
-
-
84926111807
-
Graphical games
-
In Noam Nisan, Tim Roughgarden, Eva Tardos, and Vijay V. Vaziran, editors, Cambridge University Press
-
Michael Kearns. Graphical games. In Noam Nisan, Tim Roughgarden, Eva Tardos, and Vijay V. Vaziran, editors, Algorithmic Game Theory, chapter 7, pages 159-180. Cambridge University Press, 2007.
-
(2007)
Algorithmic Game Theory, Chapter 7
, pp. 159-180
-
-
Kearns, M.1
-
21
-
-
77953149312
-
Computing optimal randomized resource allocations for massive security games
-
Christopher Kiekintveld, Manish Jain, Jason Tsai, James Pita, Fernando Ordonez, and Milind Tambe. Computing optimal randomized resource allocations for massive security games. In AAMAS, pages 689-696, 2009.
-
(2009)
AAMAS
, pp. 689-696
-
-
Kiekintveld, C.1
Jain, M.2
Tsai, J.3
Pita, J.4
Ordonez, F.5
Tambe, M.6
-
22
-
-
85167462185
-
Complexity of computing optimal Stackelberg strategies in security resource allocation games
-
Dmytro Korzhyk, Vincent Conitzer, and Ronald Parr. Complexity of computing optimal Stackelberg strategies in security resource allocation games. In AAAI, 2010.
-
(2010)
AAAI
-
-
Korzhyk, D.1
Conitzer, V.2
Parr, R.3
-
23
-
-
84868278172
-
Security games with multiple attacker resources
-
Dmytro Korzhyk, Vincent Conitzer, and Ronald Parr. Security games with multiple attacker resources. In IJCAI, pages 273-279, 2011a.
-
(2011)
IJCAI
, pp. 273-279
-
-
Korzhyk, D.1
Conitzer, V.2
Parr, R.3
-
24
-
-
84899414113
-
Solving Stackelberg games with uncertain observability
-
Dmytro Korzhyk, Vincent Conitzer, and Ronald Parr. Solving Stackelberg games with uncertain observability. In AAMAS, pages 1013-1020, 2011b.
-
(2011)
AAMAS
, pp. 1013-1020
-
-
Korzhyk, D.1
Conitzer, V.2
Parr, R.3
-
29
-
-
77951729734
-
A survey of game theory as applied to network security
-
Sankardas Roy, Charles Ellis, Sajjan Shiva, Dipankar Dasgupta, Vivek Shandilya, and QishiWu. A survey of game theory as applied to network security. In Proceedings of the 2010 43rd Hawaii International Conference on System Sciences, HICSS '10, pages 1-10
-
Proceedings of the 2010 43rd Hawaii International Conference on System Sciences, HICSS '10
, pp. 1-10
-
-
Roy, S.1
Ellis, C.2
Shiva, S.3
Dasgupta, D.4
Shandilya, V.5
Wu, Q.6
-
30
-
-
84886022231
-
IEEE computer society yuval shavitt and eran shir dimes: Let the internet measure itself
-
USA, 2010, October
-
Washington, DC, USA, 2010. IEEE Computer Society. Yuval Shavitt and Eran Shir. DIMES: Let the Internet measure itself. ACM SIGCOMM Computer Communication Review, 35(5):71-74, October 2005.
-
(2005)
ACM SIGCOMM Computer Communication Review
, vol.35
, Issue.5
, pp. 71-74
-
-
Washington, D.C.1
-
31
-
-
34249699690
-
Nash convergence of gradient dynamics in general-sum games
-
Satinder P. Singh, Michael J. Kearns, and Yishay Mansour. Nash convergence of gradient dynamics in general-sum games. In UAI, pages 541-548, 2000.
-
(2000)
UAI
, pp. 541-548
-
-
Singh, S.P.1
Kearns, M.J.2
Mansour, Y.3
|