Ajax loader
By using our website, you agree to our use of cookies as described in Cookie Policy
 For more images, please visit our Collections page 
Essays On The Interaction Between Financial And Real Sectors
PDF
Balancing tradeoffs in security games: handling defenders and adversaries with multiple objectives
PDF
Modeling human bounded rationality in opportunistic security games
PDF
Pdf
Computational model of human behavior in security games with varying number of targets
Context dependent utility: an appraisal-based approach to modeling context, framing, and decisions
PDF
Thwarting adversaries with unpredictability: massive-scale game-theoretic algorithms for real-world security deployments
PDF
When AI helps wildlife conservation: learning adversary behavior in green security games
PDF
Cooperation in wireless networks with selfish users
PDF
Hierarchical planning in security games: a game theoretic approach to strategic, tactical and operational decision making
PDF
Improving network security through cyber-insurance
PDF
Pdf
Keep the adversary guessing: agent security by policy randomization
The human element: addressing human adversaries in security domains
PDF
Handling attacker’s preference in security domains: robust optimization and learning approaches
PDF
Game theoretic deception and threat screening for cyber security
PDF
Not a Lone Ranger: unleashing defender teamwork in security games
PDF
Addressing uncertainty in Stackelberg games for security: models and algorithms
PDF
PDF
Demand response management in smart grid from distributed optimization perspective
PDF