Author of the publication

Beware the Soothsayer: From Attack Prediction Accuracy to Predictive Reliability in Security Games.

, , , , and . GameSec, volume 9406 of Lecture Notes in Computer Science, page 35-56. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal Patrol Planning for Green Security Games with Black-Box Attackers., , , , , , , , , and 1 other author(s). GameSec, volume 10575 of Lecture Notes in Computer Science, page 458-477. Springer, (2017)Taking It for a Test Drive: A Hybrid Spatio-Temporal Model for Wildlife Poaching Prediction Evaluated Through a Controlled Field Test., , , , , , , , , and . ECML/PKDD (3), volume 10536 of Lecture Notes in Computer Science, page 292-304. Springer, (2017)Protecting the NECTAR of the Ganga River Through Game-Theoretic Factory Inspections., , , , , , , and . PAAMS, volume 9662 of Lecture Notes in Computer Science, page 97-108. Springer, (2016)Evaluation of Predictive Models for Wildlife Poaching Activity through Controlled Field Test in Uganda., , , , , , , , , and 1 other author(s). AAAI Workshops, volume WS-18 of AAAI Technical Report, page 344-347. AAAI Press, (2018)PAWS: adaptive game-theoretic patrolling for wildlife protection., , , , and . AAMAS, page 1641-1642. IFAAMAS/ACM, (2014)Cloudy with a Chance of Poaching: Adversary Behavior Modeling and Forecasting with Real-World Poaching Data., , , , , , , , , and 1 other author(s). AAMAS, page 159-167. ACM, (2017)Identifying Suspicious Bidders Utilizing Hierarchical Clustering and Decision Trees., , and . IC-AI, page 195-201. CSREA Press, (2010)Model-Based Specification of Flexible and Complex Bidding Strategies in Agent-Based Online Auctions., , , and . ITNG, page 894-900. IEEE Computer Society, (2009)Real-World Evaluation and Deployment of Adversary Attack Prediction Models.. AAMAS, page 1830-1831. ACM, (2017)Adaptive resource allocation for wildlife protection against illegal poachers., , , and . AAMAS, page 453-460. IFAAMAS/ACM, (2014)