From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Improved computational models of human behavior in security games., , , , и . AAMAS, стр. 1155-1156. IFAAMAS, (2011)How to protect a city: strategic security placement in graph-based domains., , , , , и . AAMAS, стр. 1453-1454. IFAAMAS, (2010)On the Defense Against Adversarial Examples Beyond the Visible Spectrum., , , и . MILCOM, стр. 1-5. IEEE, (2018)Empirical game-theoretic analysis of the TAC Supply Chain game., , и . AAMAS, стр. 193. IFAAMAS, (2007)Market Efficiency, Sales Competition, and the Bullwhip Effect in the TAC SCM Tournaments., , , и . TADA/AMEC, том 4452 из Lecture Notes in Computer Science, стр. 62-74. Springer, (2006)An Analysis of the 2004 Supply Chain Management Trading Agent Competition., , и . AMEC@AAMAS/TADA@IJCAI, том 3937 из Lecture Notes in Computer Science, стр. 99-112. Springer, (2005)Optimal Network Security Hardening Using Attack Graph Games., , , и . IJCAI, стр. 526-532. AAAI Press, (2015)A Game Theoretic Framework for Software Diversity for Network Security., , , и . GameSec, том 12513 из Lecture Notes in Computer Science, стр. 297-311. Springer, (2020)Using Correlated Strategies for Computing Stackelberg Equilibria in Extensive-Form Games., , , , и . AAAI, стр. 439-445. AAAI Press, (2016)Security Games with Limited Surveillance., , , , , , и . AAAI, стр. 1241-1248. AAAI Press, (2012)