From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An extended study on multi-objective security games., , , , и . Auton. Agents Multi Agent Syst., 28 (1): 31-71 (2014)Software Assistants for Randomized Patrol Planning for the LAX Airport Police and the Federal Air Marshal Service., , , , , , и . Interfaces, 40 (4): 267-290 (2010)Value-driven procurement in the TAC supply chain game., , , и . SIGecom Exch., 4 (3): 9-18 (2004)Local Context Normalization: Revisiting Local Normalization., , , , , , и . CoRR, (2019)Multi-objective optimization for security games., , , , и . AAMAS, стр. 863-870. IFAAMAS, (2012)General-Sum Cyber Deception Games under Partial Attacker Valuation Information., , , , и . AAMAS, стр. 2215-2217. International Foundation for Autonomous Agents and Multiagent Systems, (2019)Methods and Algorithms for Infinite Bayesian Stackelberg Security Games - (Extended Abstract)., , и . GameSec, том 6442 из Lecture Notes in Computer Science, стр. 257-265. Springer, (2010)Bandits for Cybersecurity: Adaptive Intrusion Detection Using Honeypots., и . AAAI Workshop: Artificial Intelligence for Cyber Security, том WS-16-03 из AAAI Technical Report, AAAI Press, (2016)978-1-57735-759-9.Adapting Honeypot Configurations to Detect Evolving Exploits., и . AAAI Workshops, том WS-17 из AAAI Technical Report, AAAI Press, (2017)Towards the Integration of Multi-Attribute Optimization and Game Theory for Border Security Patrolling Strategies., , , , , и . Applied Adversarial Reasoning and Risk Modeling, том WS-11-06 из AAAI Technical Report, AAAI, (2011)