• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4696811)   Today's Articles (4829)
For: Korzhyk D, Yin Z, Kiekintveld C, Conitzer V, Tambe M. Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness. J ARTIF INTELL RES 2011. [DOI: 10.1613/jair.3269] [Citation(s) in RCA: 107] [Impact Index Per Article: 7.6] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/04/2022]  Open
Number Cited by Other Article(s)
1
Cheng Z, Chen G, Hong Y. Zero-determinant strategy in stochastic Stackelberg asymmetric security game. Sci Rep 2023;13:11308. [PMID: 37438579 PMCID: PMC10338512 DOI: 10.1038/s41598-023-38460-8] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/02/2023] [Accepted: 07/08/2023] [Indexed: 07/14/2023]  Open
2
Ma W, Liu W, McAreavey K, Luo X, Jiang Y, Zhan J, Chen Z. A decision support framework for security resource allocation under ambiguity. INT J INTELL SYST 2021. [DOI: 10.1002/int.22288] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/08/2022]
3
Durkota K, Lisý V, Bošanský B, Kiekintveld C, Pěchouček M. Hardening networks against strategic attackers using attack graph games. Comput Secur 2019. [DOI: 10.1016/j.cose.2019.101578] [Citation(s) in RCA: 8] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/27/2022]
4
Zeng C, Ren B, Liu H, Chen J. Applying the Bayesian Stackelberg Active Deception Game for Securing Infrastructure Networks. ENTROPY 2019;21:909. [PMCID: PMC7515438 DOI: 10.3390/e21090909] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 08/07/2019] [Accepted: 09/16/2019] [Indexed: 06/17/2023]
5
Tefera MK, Yang X. A Game-Theoretic Framework to Preserve Location Information Privacy in Location-based Service Applications. SENSORS 2019;19:s19071581. [PMID: 30939858 PMCID: PMC6479801 DOI: 10.3390/s19071581] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 01/27/2019] [Revised: 03/07/2019] [Accepted: 03/28/2019] [Indexed: 11/16/2022]
6
Optimal defense against election control by deleting voter groups. ARTIF INTELL 2018. [DOI: 10.1016/j.artint.2018.02.001] [Citation(s) in RCA: 5] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/23/2022]
7
Alvim MS, Chatzikokolakis K, Kawamoto Y, Palamidessi C. A Game-Theoretic Approach to Information-Flow Control via Protocol Composition. ENTROPY 2018;20:e20050382. [PMID: 33265472 PMCID: PMC7512901 DOI: 10.3390/e20050382] [Citation(s) in RCA: 6] [Impact Index Per Article: 0.9] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 03/24/2018] [Revised: 05/08/2018] [Accepted: 05/11/2018] [Indexed: 11/29/2022]
8
Guerrero D, Carsteanu AA, Clempner JB. Solving Stackelberg security Markov games employing the bargaining Nash approach: Convergence analysis. Comput Secur 2018. [DOI: 10.1016/j.cose.2018.01.005] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
9
Piccinelli R, Sansavini G, Lucchetti R, Zio E. A General Framework for the Assessment of Power System Vulnerability to Malicious Attacks. RISK ANALYSIS : AN OFFICIAL PUBLICATION OF THE SOCIETY FOR RISK ANALYSIS 2017;37:2182-2190. [PMID: 28230257 DOI: 10.1111/risa.12781] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 11/15/2013] [Revised: 10/30/2016] [Accepted: 11/30/2016] [Indexed: 06/06/2023]
10
Rota Bulo S, Biggio B, Pillai I, Pelillo M, Roli F. Randomized Prediction Games for Adversarial Machine Learning. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS 2017;28:2466-2478. [PMID: 27514067 DOI: 10.1109/tnnls.2016.2593488] [Citation(s) in RCA: 7] [Impact Index Per Article: 0.9] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/06/2023]
11
Basilico N, De Nittis G, Gatti N. Adversarial patrolling with spatially uncertain alarm signals. ARTIF INTELL 2017. [DOI: 10.1016/j.artint.2017.02.007] [Citation(s) in RCA: 10] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
12
Tominac P, Mahalec V. A game theoretic framework for petroleum refinery strategic production planning. AIChE J 2017. [DOI: 10.1002/aic.15644] [Citation(s) in RCA: 11] [Impact Index Per Article: 1.4] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/10/2022]
13
Barrett S, Rosenfeld A, Kraus S, Stone P. Making friends on the fly: Cooperating with new teammates. ARTIF INTELL 2017. [DOI: 10.1016/j.artint.2016.10.005] [Citation(s) in RCA: 7] [Impact Index Per Article: 0.9] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/20/2022]
14
Jajodia S, Park N, Serra E, Subrahmanian V. Using temporal probabilistic logic for optimal monitoring of security events with limited resources. JOURNAL OF COMPUTER SECURITY 2016. [DOI: 10.3233/jcs-160555] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 01/09/2023]
15
Conforming coalitions in Markov Stackelberg security games: Setting max cooperative defenders vs. non-cooperative attackers. Appl Soft Comput 2016. [DOI: 10.1016/j.asoc.2016.05.037] [Citation(s) in RCA: 11] [Impact Index Per Article: 1.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/22/2022]
16
Yang R, Kiekintveld C, Ordóñez F, Tambe M, John R. Improving resource allocation strategies against human adversaries in security games: An extended study. ARTIF INTELL 2013. [DOI: 10.1016/j.artint.2012.11.004] [Citation(s) in RCA: 70] [Impact Index Per Article: 5.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/29/2022]
17
Pita J, Jain M, Tambe M, Ordóñez F, Kraus S. Robust solutions to Stackelberg games: Addressing bounded rationality and limited observations in human cognition. ARTIF INTELL 2010. [DOI: 10.1016/j.artint.2010.07.002] [Citation(s) in RCA: 106] [Impact Index Per Article: 7.1] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
PrevPage 1 of 1 1Next
© 2004-2025 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA