Paruchuri et al., 2007 - Google Patents
An efficient heuristic approach for security against multiple adversariesParuchuri et al., 2007
View PDF- Document ID
- 9075194530147578757
- Author
- Paruchuri P
- Pearce J
- Tambe M
- Ordonez F
- Kraus S
- Publication year
- Publication venue
- Proceedings of the 6th international joint conference on Autonomous agents and multiagent systems
External Links
Snippet
In adversarial multiagent domains, security, commonly defined as the ability to deal with intentional threats from other agents, is a critical issue. This paper focuses on domains where these threats come from unknown adversaries. These domains can be modeled as …
- 238000006243 chemical reaction 0 abstract description 3
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
- G06Q10/063—Operations research or analysis
- G06Q10/0631—Resource planning, allocation or scheduling for a business operation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/04—Inference methods or devices
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Paruchuri et al. | An efficient heuristic approach for security against multiple adversaries | |
| US8195490B2 (en) | Agent security via approximate solvers | |
| Paruchuri et al. | Playing games for security: An efficient exact algorithm for solving Bayesian Stackelberg games | |
| Falco et al. | A master attack methodology for an AI-based automated attack planner for smart cities | |
| US8224681B2 (en) | Optimizing a security patrolling strategy using decomposed optimal Bayesian Stackelberg solver | |
| Ezell et al. | Probabilistic risk analysis and terrorism risk | |
| Lou et al. | Multidefender security games | |
| Fan et al. | Human–agent collaboration for time-stressed multicontext decision making | |
| Gourisetti et al. | Cybersecurity vulnerability mitigation framework through empirical paradigm (CyFEr): prioritized gap analysis | |
| Løvlid et al. | Modeling the behavior of a hierarchy of command agents with context-based reasoning | |
| Price et al. | Asset criticality in mission reconfigurable cyber systems and its contribution to key cyber terrain | |
| Yin et al. | A Semi‐Markov Decision Model for Recognizing the Destination of a Maneuvering Agent in Real Time Strategy Games | |
| Paruchuri et al. | An efficient heuristic for security against multiple adversaries in stackelberg games | |
| Nguyen et al. | Tackling Imitative Attacker Deception in Repeated Bayesian Stackelberg Security Games. | |
| Dunstatter et al. | Solving cyber alert allocation Markov games with deep reinforcement learning | |
| Jackson et al. | " Air Force 2025" Operational Analysis | |
| Collins et al. | Petri net models of adversarial scenarios in safety and security | |
| Bompard et al. | Approaches to the security analysis of power systems: Defence strategies against malicious threats | |
| Park et al. | Deep reinforcement learning to assist command and control | |
| Yang et al. | Game theory and human behavior: Challenges in security and sustainability | |
| Paruchuri | Keep the adversary guessing: Agent security by policy randomization | |
| Hamidoğlu et al. | A Novel Nash-Based Matching Approach for Multirobot Task Allocation in Distributed Robotic Networks | |
| Klipstein | Seeing is Believing | |
| Latek et al. | Optimal blends of history and intelligence for robust antiterrorism policy | |
| Valenzuela et al. | Decision support using deterministic equivalents of probabilistic game trees |