[go: up one dir, main page]

Paruchuri et al., 2007 - Google Patents

An efficient heuristic approach for security against multiple adversaries

Paruchuri et al., 2007

View PDF
Document ID
9075194530147578757
Author
Paruchuri P
Pearce J
Tambe M
Ordonez F
Kraus S
Publication year
Publication venue
Proceedings of the 6th international joint conference on Autonomous agents and multiagent systems

External Links

Snippet

In adversarial multiagent domains, security, commonly defined as the ability to deal with intentional threats from other agents, is a critical issue. This paper focuses on domains where these threats come from unknown adversaries. These domains can be modeled as …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
    • G06Q10/063Operations research or analysis
    • G06Q10/0631Resource planning, allocation or scheduling for a business operation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/04Inference methods or devices

Similar Documents

Publication Publication Date Title
Paruchuri et al. An efficient heuristic approach for security against multiple adversaries
US8195490B2 (en) Agent security via approximate solvers
Paruchuri et al. Playing games for security: An efficient exact algorithm for solving Bayesian Stackelberg games
Falco et al. A master attack methodology for an AI-based automated attack planner for smart cities
US8224681B2 (en) Optimizing a security patrolling strategy using decomposed optimal Bayesian Stackelberg solver
Ezell et al. Probabilistic risk analysis and terrorism risk
Lou et al. Multidefender security games
Fan et al. Human–agent collaboration for time-stressed multicontext decision making
Gourisetti et al. Cybersecurity vulnerability mitigation framework through empirical paradigm (CyFEr): prioritized gap analysis
Løvlid et al. Modeling the behavior of a hierarchy of command agents with context-based reasoning
Price et al. Asset criticality in mission reconfigurable cyber systems and its contribution to key cyber terrain
Yin et al. A Semi‐Markov Decision Model for Recognizing the Destination of a Maneuvering Agent in Real Time Strategy Games
Paruchuri et al. An efficient heuristic for security against multiple adversaries in stackelberg games
Nguyen et al. Tackling Imitative Attacker Deception in Repeated Bayesian Stackelberg Security Games.
Dunstatter et al. Solving cyber alert allocation Markov games with deep reinforcement learning
Jackson et al. " Air Force 2025" Operational Analysis
Collins et al. Petri net models of adversarial scenarios in safety and security
Bompard et al. Approaches to the security analysis of power systems: Defence strategies against malicious threats
Park et al. Deep reinforcement learning to assist command and control
Yang et al. Game theory and human behavior: Challenges in security and sustainability
Paruchuri Keep the adversary guessing: Agent security by policy randomization
Hamidoğlu et al. A Novel Nash-Based Matching Approach for Multirobot Task Allocation in Distributed Robotic Networks
Klipstein Seeing is Believing
Latek et al. Optimal blends of history and intelligence for robust antiterrorism policy
Valenzuela et al. Decision support using deterministic equivalents of probabilistic game trees