메뉴 건너뛰기




Volumn 1, Issue , 2013, Pages 215-222

Security scheduling for real-world networks

Author keywords

Double oracle; Game theory; Minimax; Zero sum games

Indexed keywords

ALGORITHMS; AUTONOMOUS AGENTS; GAME THEORY; LAW ENFORCEMENT; MULTI AGENT SYSTEMS; NETWORK SECURITY; OPTIMAL SYSTEMS; OPTIMIZATION;

EID: 84899463216     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (73)

References (16)
  • 2
    • 84899414515 scopus 로고    scopus 로고
    • Studying (Non-planar) road networks through an algorithmic lens
    • D. Eppstein and M. T. Goodrich. Studying (Non-Planar) Road Networks Through an Algorithmic Lens. CoRR, abs/0808.3694, 2008.
    • (2008) CoRR, Abs/0808.3694
    • Eppstein, D.1    Goodrich, M.T.2
  • 3
    • 0004194991 scopus 로고
    • Academic Press, New York
    • S. Gal. Search Games. Academic Press, New York, 1980.
    • (1980) Search Games
    • Gal, S.1
  • 4
    • 54849431370 scopus 로고    scopus 로고
    • Openstreetmap: User-generated street maps
    • M. Haklay and P. Weber. Openstreetmap: user-generated street maps. Pervasive Computing, IEEE, 7(4): 12-18, 2008.
    • (2008) Pervasive Computing, IEEE , vol.7 , Issue.4 , pp. 12-18
    • Haklay, M.1    Weber, P.2
  • 5
    • 78751683676 scopus 로고    scopus 로고
    • Multi-step multi-sensor hider-seeker games
    • E. Halvorson, V. Conitzer, and R. Parr. Multi-step Multi-sensor Hider-Seeker Games. In IJCAI, pages 159-166, 2009.
    • (2009) IJCAI , pp. 159-166
    • Halvorson, E.1    Conitzer, V.2    Parr, R.3
  • 7
    • 84896061093 scopus 로고    scopus 로고
    • The deployment-to-saturation ratio in security games
    • M. Jain, K. Leyton-Brown, and M. Tambe. The Deployment-to-Saturation Ratio in Security Games. In AAAI, 2012.
    • (2012) AAAI
    • Jain, M.1    Leyton-Brown, K.2    Tambe, M.3
  • 8
    • 1942452324 scopus 로고    scopus 로고
    • Planning in the presence of cost functions controlled by an adversary
    • H. B. McMahan, G. J. Gordon, and A. Blum. Planning in the Presence of Cost Functions Controlled by an Adversary. In ICML, pages 536-543, 2003.
    • (2003) ICML , pp. 536-543
    • McMahan, H.B.1    Gordon, G.J.2    Blum, A.3
  • 9
    • 0000095809 scopus 로고
    • An analysis of approximations for maximizing submodular set functions-I
    • Dec
    • G. L. Nemhauser, L. A. Wolsey, and M. L. Fisher. An Analysis of Approximations for Maximizing Submodular Set Functions-I. Mathematical Programming, 14(1): 265-294, Dec 1978.
    • (1978) Mathematical Programming , vol.14 , Issue.1 , pp. 265-294
    • Nemhauser, G.L.1    Wolsey, L.A.2    Fisher, M.L.3
  • 10
    • 84899407351 scopus 로고    scopus 로고
    • Solving non-zero sum multiagent network flow security games with attack costs
    • S. Okamoto, N. Hazon, and K. Sycara. Solving non-zero sum multiagent network flow security games with attack costs. In AAMAS, pages 879-888, 2012.
    • (2012) AAMAS , pp. 879-888
    • Okamoto, S.1    Hazon, N.2    Sycara, K.3
  • 12
    • 77958574403 scopus 로고    scopus 로고
    • Urban security: Game-theoretic resource allocation in networked physical domains
    • J. Tsai, Z. Yin, J. young Kwak, D. Kempe, C. Kiekintveld, and M. Tambe. Urban Security: Game-Theoretic Resource Allocation in Networked Physical Domains. In AAAI, pages 881-886, 2010.
    • (2010) AAAI , pp. 881-886
    • Tsai, J.1    Yin, Z.2    Young Kwak, J.3    Kempe, D.4    Kiekintveld, C.5    Tambe, M.6
  • 13
    • 84899445988 scopus 로고    scopus 로고
    • Game-theoretic resource allocation for malicious packet detection in computer networks
    • O. Vanek, Z. Yin, M. Jain, B. Bosansky, M. Tambe, and M. Pechoucek. Game-theoretic resource allocation for malicious packet detection in computer networks. In AAMAS, 2012.
    • (2012) AAMAS
    • Vanek, O.1    Yin, Z.2    Jain, M.3    Bosansky, B.4    Tambe, M.5    Pechoucek, M.6
  • 14
    • 0001590955 scopus 로고
    • Two-person zero-sum games for network interdiction
    • A. Washburn and K. Wood. Two-person Zero-sum Games for Network Interdiction. Operations Research, 43(2): 243-251, 1995.
    • (1995) Operations Research , vol.43 , Issue.2 , pp. 243-251
    • Washburn, A.1    Wood, K.2
  • 15
    • 85014266931 scopus 로고    scopus 로고
    • Designing better strategies against human adversaries in network security games
    • (Extended Abstract)
    • R. Yang, F. Fang, A. X. Jiang, K. Rajagopal, M. Tambe, and R. Maheswaran. Designing Better Strategies against Human Adversaries in Network Security Games. In AAMAS (Extended Abstract), 2012.
    • (2012) AAMAS
    • Yang, R.1    Fang, F.2    Jiang, A.X.3    Rajagopal, K.4    Tambe, M.5    Maheswaran, R.6
  • 16
    • 80053434424 scopus 로고    scopus 로고
    • Stackelberg vs. Nash in security games: Interch-angeability, equivalence, and uniqueness
    • Z. Yin, D. Korzhyk, C. Kiekintveld, V. Conitzer, and M. Tambe. Stackelberg vs. Nash in Security Games: Interch-angeability, Equivalence, and Uniqueness. In AAMAS, pages 1139-1146, 2010.
    • (2010) AAMAS , pp. 1139-1146
    • Yin, Z.1    Korzhyk, D.2    Kiekintveld, C.3    Conitzer, V.4    Tambe, M.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.