default search action
BibTeX records: Christopher Kiekintveld
@inproceedings{DBLP:conf/eit/IgeKP24, author = {Tosin Ige and Christopher Kiekintveld and Aritran Piplai}, title = {An Investigation into the Performances of the State-of-the-art Machine Learning Approaches for Various Cyber-attack Detection: {A} Survey}, booktitle = {{IEEE} International Conference on Electro Information Technology, eIT 2024, Eau Claire, WI, USA, May 30 - June 1, 2024}, pages = {135--144}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/eIT60633.2024.10609847}, doi = {10.1109/EIT60633.2024.10609847}, timestamp = {Fri, 30 Aug 2024 08:58:30 +0200}, biburl = {https://dblp.org/rec/conf/eit/IgeKP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-17045, author = {Tosin Ige and Christopher Kiekintveld and Aritran Piplai}, title = {An Investigation into the Performances of the State-of-the-art Machine Learning Approaches for Various Cyber-attack Detection: {A} Survey}, journal = {CoRR}, volume = {abs/2402.17045}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.17045}, doi = {10.48550/ARXIV.2402.17045}, eprinttype = {arXiv}, eprint = {2402.17045}, timestamp = {Mon, 25 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-17045.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-17249, author = {Tosin Ige and Christopher Kiekintveld and Aritran Piplai}, title = {Deep Learning-Based Speech and Vision Synthesis to Improve Phishing Attack Detection through a Multi-layer Adaptive Framework}, journal = {CoRR}, volume = {abs/2402.17249}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.17249}, doi = {10.48550/ARXIV.2402.17249}, eprinttype = {arXiv}, eprint = {2402.17249}, timestamp = {Mon, 25 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-17249.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ai/HorakBKK23, author = {Karel Hor{\'{a}}k and Branislav Bosansk{\'{y}} and Vojtech Kovar{\'{\i}}k and Christopher Kiekintveld}, title = {Solving zero-sum one-sided partially observable stochastic games}, journal = {Artif. Intell.}, volume = {316}, pages = {103838}, year = {2023}, url = {https://doi.org/10.1016/j.artint.2022.103838}, doi = {10.1016/J.ARTINT.2022.103838}, timestamp = {Tue, 19 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ai/HorakBKK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/RoySAKL23, author = {Shanto Roy and Nazia Sharmin and Jaime C. Acosta and Christopher Kiekintveld and Aron Laszka}, title = {Survey and Taxonomy of Adversarial Reconnaissance Techniques}, journal = {{ACM} Comput. Surv.}, volume = {55}, number = {6}, pages = {112:1--112:38}, year = {2023}, url = {https://doi.org/10.1145/3538704}, doi = {10.1145/3538704}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/RoySAKL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aibthings/IgeK23, author = {Tosin Ige and Christopher Kiekintveld}, title = {Performance Comparison and Implementation of Bayesian Variants for Network Intrusion Detection}, booktitle = {{IEEE} International Conference on Artificial Intelligence, Blockchain, and Internet of Things, AIBThings 2023, Mount Pleasant, MI, USA, September 16-17, 2023}, pages = {1--5}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/AIBThings58340.2023.10292485}, doi = {10.1109/AIBTHINGS58340.2023.10292485}, timestamp = {Thu, 16 Nov 2023 16:28:41 +0100}, biburl = {https://dblp.org/rec/conf/aibthings/IgeK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccn/SharminAK23, author = {Nazia Sharmin and Jaime C. Acosta and Christopher Kiekintveld}, title = {A Systematic Approach for Temporal Traffic Selection Across Various Applications}, booktitle = {32nd International Conference on Computer Communications and Networks, {ICCCN} 2023, Honolulu, HI, USA, July 24-27, 2023}, pages = {1--7}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICCCN58024.2023.10230120}, doi = {10.1109/ICCCN58024.2023.10230120}, timestamp = {Wed, 13 Sep 2023 08:43:36 +0200}, biburl = {https://dblp.org/rec/conf/icccn/SharminAK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iotsms/SharminK23, author = {Nazia Sharmin and Christopher Kiekintveld}, editor = {Muhannad Quwaider and Yaser Jararweh}, title = {Enhancing IoT Device Security: Predicting and Analyzing Reconnaissance Attacks Using Flags and Time-Based Attributes}, booktitle = {10th International Conference on Internet of Things: Systems, Management and Security, {IOTSMS} 2023, San Antonio, TX, USA, October 23-25, 2023}, pages = {23--30}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/IOTSMS59855.2023.10325811}, doi = {10.1109/IOTSMS59855.2023.10325811}, timestamp = {Sat, 09 Dec 2023 09:49:48 +0100}, biburl = {https://dblp.org/rec/conf/iotsms/SharminK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secon/SharminK23, author = {Nazia Sharmin and Christopher Kiekintveld}, title = {Optimizing Crop Recommendations for Sustainable Agriculture: Leveraging Bayesian Networks in a Smart Crop Recommendation System}, booktitle = {20th Annual {IEEE} International Conference on Sensing, Communication, and Networking, {SECON} 2023, Madrid, Spain, September 11-14, 2023}, pages = {20--26}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SECON58729.2023.10287510}, doi = {10.1109/SECON58729.2023.10287510}, timestamp = {Mon, 06 Nov 2023 17:21:38 +0100}, biburl = {https://dblp.org/rec/conf/secon/SharminK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/syscon/SharminRLAK23, author = {Nazia Sharmin and Shanto Roy and Aron Laszka and Jaime C. Acosta and Christopher Kiekintveld}, title = {Bayesian Models for Node-Based Inference Techniques}, booktitle = {{IEEE} International Systems Conference, SysCon 2023, Vancouver, BC, Canada, April 17-20, 2023}, pages = {1--8}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SysCon53073.2023.10131168}, doi = {10.1109/SYSCON53073.2023.10131168}, timestamp = {Fri, 09 Jun 2023 15:18:18 +0200}, biburl = {https://dblp.org/rec/conf/syscon/SharminRLAK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-06769, author = {Shanto Roy and Nazia Sharmin and Mohammad Sujan Miah and Jaime C. Acosta and Christopher Kiekintveld and Aron Laszka}, title = {Adversarial Reconnaissance Mitigation and Modeling}, journal = {CoRR}, volume = {abs/2306.06769}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.06769}, doi = {10.48550/ARXIV.2306.06769}, eprinttype = {arXiv}, eprint = {2306.06769}, timestamp = {Fri, 16 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-06769.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2307-13107, author = {Md. Abu Sayed and Ahmed H. Anwar and Christopher Kiekintveld and Branislav Bosansk{\'{y}} and Charles A. Kamhoua}, title = {Cyber Deception against Zero-day Attacks: {A} Game Theoretic Approach}, journal = {CoRR}, volume = {abs/2307.13107}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2307.13107}, doi = {10.48550/ARXIV.2307.13107}, eprinttype = {arXiv}, eprint = {2307.13107}, timestamp = {Tue, 01 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2307-13107.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-11817, author = {Md. Abu Sayed and Ahmed H. Anwar and Christopher Kiekintveld and Charles A. Kamhoua}, title = {Honeypot Allocation for Cyber Deception in Dynamic Tactical Networks: {A} Game Theoretic Approach}, journal = {CoRR}, volume = {abs/2308.11817}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.11817}, doi = {10.48550/ARXIV.2308.11817}, eprinttype = {arXiv}, eprint = {2308.11817}, timestamp = {Wed, 30 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-11817.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-11834, author = {Tosin Ige and Christopher Kiekintveld}, title = {Performance Comparison and Implementation of Bayesian Variants for Network Intrusion Detection}, journal = {CoRR}, volume = {abs/2308.11834}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.11834}, doi = {10.48550/ARXIV.2308.11834}, eprinttype = {arXiv}, eprint = {2308.11834}, timestamp = {Wed, 30 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-11834.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2311-16781, author = {David Milec and Viliam Lis{\'{y}} and Christopher Kiekintveld}, title = {Generation of Games for Opponent Model Differentiation}, journal = {CoRR}, volume = {abs/2311.16781}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2311.16781}, doi = {10.48550/ARXIV.2311.16781}, eprinttype = {arXiv}, eprint = {2311.16781}, timestamp = {Mon, 04 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2311-16781.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/AnwarKLK22, author = {Ahmed H. Anwar and Charles A. Kamhoua and Nandi O. Leslie and Christopher Kiekintveld}, title = {Honeypot Allocation for Cyber Deception Under Uncertainty}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {19}, number = {3}, pages = {3438--3452}, year = {2022}, url = {https://doi.org/10.1109/TNSM.2022.3179965}, doi = {10.1109/TNSM.2022.3179965}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnsm/AnwarKLK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/SayedAKBK22, author = {Md. Abu Sayed and Ahmed H. Anwar and Christopher Kiekintveld and Branislav Bosansk{\'{y}} and Charles A. Kamhoua}, editor = {Fei Fang and Haifeng Xu and Yezekael Hayel}, title = {Cyber Deception Against Zero-Day Attacks: {A} Game Theoretic Approach}, booktitle = {Decision and Game Theory for Security - 13th International Conference, GameSec 2022, Pittsburgh, PA, USA, October 26-28, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13727}, pages = {44--63}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-26369-9\_3}, doi = {10.1007/978-3-031-26369-9\_3}, timestamp = {Wed, 07 Feb 2024 17:23:12 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/SayedAKBK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chb/JonesPCK21, author = {Daniel Jones and Edgar Padilla and Shelby R. Curtis and Christopher Kiekintveld}, title = {Network discovery and scanning strategies and the Dark Triad}, journal = {Comput. Hum. Behav.}, volume = {122}, pages = {106799}, year = {2021}, url = {https://doi.org/10.1016/j.chb.2021.106799}, doi = {10.1016/J.CHB.2021.106799}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chb/JonesPCK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/AcostaBKK21, author = {Jaime C. Acosta and Anjon Basak and Christopher Kiekintveld and Charles A. Kamhoua}, editor = {Pavel Gladyshev and Sanjay Goel and Joshua James and George Markowsky and Daryl Johnson}, title = {Lightweight On-Demand Honeypot Deployment for Cyber Deception}, booktitle = {Digital Forensics and Cyber Crime - 12th {EAI} International Conference, {ICDF2C} 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {441}, pages = {294--312}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-06365-7\_18}, doi = {10.1007/978-3-031-06365-7\_18}, timestamp = {Fri, 19 Apr 2024 14:54:06 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/AcostaBKK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-04749, author = {Shanto Roy and Nazia Sharmin and Jaime C. Acosta and Christopher Kiekintveld and Aron Laszka}, title = {Survey and Taxonomy of Adversarial Reconnaissance Techniques}, journal = {CoRR}, volume = {abs/2105.04749}, year = {2021}, url = {https://arxiv.org/abs/2105.04749}, eprinttype = {arXiv}, eprint = {2105.04749}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-04749.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/OrtizRMFKHJ20, author = {Anthony Ortiz and Caleb Robinson and Dan Morris and Olac Fuentes and Christopher Kiekintveld and Md Mahmudulla Hassan and Nebojsa Jojic}, title = {Local Context Normalization: Revisiting Local Normalization}, booktitle = {2020 {IEEE/CVF} Conference on Computer Vision and Pattern Recognition, {CVPR} 2020, Seattle, WA, USA, June 13-19, 2020}, pages = {11273--11282}, publisher = {Computer Vision Foundation / {IEEE}}, year = {2020}, url = {https://openaccess.thecvf.com/content\_CVPR\_2020/html/Ortiz\_Local\_Context\_Normalization\_Revisiting\_Local\_Normalization\_CVPR\_2020\_paper.html}, doi = {10.1109/CVPR42600.2020.01129}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cvpr/OrtizRMFKHJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/GranadosMOK20, author = {Alonso Granados and Mohammad Sujan Miah and Anthony Ortiz and Christopher Kiekintveld}, editor = {Quanyan Zhu and John S. Baras and Radha Poovendran and Juntao Chen}, title = {A Realistic Approach for Network Traffic Obfuscation Using Adversarial Machine Learning}, booktitle = {Decision and Game Theory for Security - 11th International Conference, GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12513}, pages = {45--57}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64793-3\_3}, doi = {10.1007/978-3-030-64793-3\_3}, timestamp = {Tue, 05 Jan 2021 16:25:03 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/GranadosMOK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/AnwarLKK20, author = {Ahmed H. Anwar and Nandi O. Leslie and Charles A. Kamhoua and Christopher Kiekintveld}, editor = {Quanyan Zhu and John S. Baras and Radha Poovendran and Juntao Chen}, title = {A Game Theoretic Framework for Software Diversity for Network Security}, booktitle = {Decision and Game Theory for Security - 11th International Conference, GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12513}, pages = {297--311}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64793-3\_16}, doi = {10.1007/978-3-030-64793-3\_16}, timestamp = {Sat, 09 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/AnwarLKK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/MiahGVTK20, author = {Mohammad Sujan Miah and Marcus Gutierrez and Oscar Veliz and Omkar Thakoor and Christopher Kiekintveld}, title = {Concealing Cyber-Decoys using Two-Sided Feature Deception Games}, booktitle = {53rd Hawaii International Conference on System Sciences, {HICSS} 2020, Maui, Hawaii, USA, January 7-10, 2020}, pages = {1--10}, publisher = {ScholarSpace}, year = {2020}, url = {https://hdl.handle.net/10125/63974}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hicss/MiahGVTK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/PadillaAK20, author = {Edgar Padilla and Jaime C. Acosta and Christopher D. Kiekintveld}, editor = {Sanjay Goel and Pavel Gladyshev and Daryl Johnson and Makan Pourzandi and Suryadipta Majumdar}, title = {Cybersecurity Methodology for Specialized Behavior Analysis}, booktitle = {Digital Forensics and Cyber Crime - 11th {EAI} International Conference, {ICDF2C} 2020, Boston, MA, USA, October 15-16, 2020, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {351}, pages = {237--243}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-68734-2\_14}, doi = {10.1007/978-3-030-68734-2\_14}, timestamp = {Fri, 19 Apr 2024 15:03:30 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/PadillaAK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/Kiekintveld20, author = {Christopher Kiekintveld}, editor = {Christian Riess and Franziska Schirrmacher and Irene Amerini and Paolo Bestagini and Tom{\'{a}}s Pevn{\'{y}}}, title = {Game-Theoretic Perspectives and Algorithms for Cybersecurity}, booktitle = {IH{\&}MMSec '20: {ACM} Workshop on Information Hiding and Multimedia Security, Denver, CO, USA, June 22-24, 2020}, pages = {3}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3369412.3396883}, doi = {10.1145/3369412.3396883}, timestamp = {Mon, 06 Jul 2020 09:55:49 +0200}, biburl = {https://dblp.org/rec/conf/ih/Kiekintveld20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/AcostaBKLK20, author = {Jaime C. Acosta and Anjon Basak and Christopher Kiekintveld and Nandi Leslie and Charles A. Kamhoua}, title = {Cybersecurity Deception Experimentation System}, booktitle = {{IEEE} Secure Development, SecDev 2020, Atlanta, GA, USA, September 28-30, 2020}, pages = {34--40}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SecDev45635.2020.00022}, doi = {10.1109/SECDEV45635.2020.00022}, timestamp = {Wed, 28 Oct 2020 10:41:43 +0100}, biburl = {https://dblp.org/rec/conf/secdev/AcostaBKLK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/20/GutierrezK20, author = {Marcus Gutierrez and Christopher Kiekintveld}, editor = {Sushil Jajodia and George Cybenko and V. S. Subrahmanian and Vipin Swarup and Cliff Wang and Michael P. Wellman}, title = {Online Learning Methods for Controlling Dynamic Cyber Deception Strategies}, booktitle = {Adaptive Autonomous Secure Cyber Systems}, pages = {231--251}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-33432-1\_11}, doi = {10.1007/978-3-030-33432-1\_11}, timestamp = {Mon, 03 Jan 2022 21:52:41 +0100}, biburl = {https://dblp.org/rec/books/sp/20/GutierrezK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2002-09069, author = {Iffat Anjum and Mohammad Sujan Miah and Mu Zhu and Nazia Sharmin and Christopher Kiekintveld and William Enck and Munindar P. Singh}, title = {Optimizing Vulnerability-Driven Honey Traffic Using Game Theory}, journal = {CoRR}, volume = {abs/2002.09069}, year = {2020}, url = {https://arxiv.org/abs/2002.09069}, eprinttype = {arXiv}, eprint = {2002.09069}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2002-09069.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-11243, author = {Karel Hor{\'{a}}k and Branislav Bosansk{\'{y}} and Vojtech Kovar{\'{\i}}k and Christopher Kiekintveld}, title = {Solving Zero-Sum One-Sided Partially Observable Stochastic Games}, journal = {CoRR}, volume = {abs/2010.11243}, year = {2020}, url = {https://arxiv.org/abs/2010.11243}, eprinttype = {arXiv}, eprint = {2010.11243}, timestamp = {Tue, 19 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-11243.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DurkotaLBKP19, author = {Karel Durkota and Viliam Lis{\'{y}} and Branislav Bosansk{\'{y}} and Christopher Kiekintveld and Michal Pechoucek}, title = {Hardening networks against strategic attackers using attack graph games}, journal = {Comput. Secur.}, volume = {87}, year = {2019}, url = {https://doi.org/10.1016/j.cose.2019.101578}, doi = {10.1016/J.COSE.2019.101578}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DurkotaLBKP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HorakBTKK19, author = {Karel Hor{\'{a}}k and Branislav Bosansk{\'{y}} and Petr Tom{\'{a}}sek and Christopher Kiekintveld and Charles A. Kamhoua}, title = {Optimizing honeypot strategies against dynamic lateral movement using partially observable stochastic games}, journal = {Comput. Secur.}, volume = {87}, year = {2019}, url = {https://doi.org/10.1016/j.cose.2019.101579}, doi = {10.1016/J.COSE.2019.101579}, timestamp = {Tue, 19 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/HorakBTKK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atal/ThakoorTVXK19, author = {Omkar Thakoor and Milind Tambe and Phebe Vayanos and Haifeng Xu and Christopher Kiekintveld}, editor = {Edith Elkind and Manuela Veloso and Noa Agmon and Matthew E. Taylor}, title = {General-Sum Cyber Deception Games under Partial Attacker Valuation Information}, booktitle = {Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, {AAMAS} '19, Montreal, QC, Canada, May 13-17, 2019}, pages = {2215--2217}, publisher = {International Foundation for Autonomous Agents and Multiagent Systems}, year = {2019}, url = {http://dl.acm.org/citation.cfm?id=3332062}, timestamp = {Wed, 29 May 2019 16:36:58 +0200}, biburl = {https://dblp.org/rec/conf/atal/ThakoorTVXK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cogsci/GutierrezCBABKG19, author = {Marcus Gutierrez and Jakub Cern{\'{y}} and Noam Ben{-}Asher and Efrat Aharonov{-}Majar and Branislav Bosansk{\'{y}} and Christopher Kiekintveld and Cleotilde Gonzalez}, editor = {Ashok K. Goel and Colleen M. Seifert and Christian Freksa}, title = {Evaluating Models of Human Behavior in an Adversarial Multi-Armed Bandit Problem}, booktitle = {Proceedings of the 41th Annual Meeting of the Cognitive Science Society, CogSci 2019: Creativity + Cognition + Computation, Montreal, Canada, July 24-27, 2019}, pages = {394--400}, publisher = {cognitivesciencesociety.org}, year = {2019}, url = {https://mindmodeling.org/cogsci2019/papers/0088/index.html}, timestamp = {Wed, 17 Apr 2024 12:43:09 +0200}, biburl = {https://dblp.org/rec/conf/cogsci/GutierrezCBABKG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/BasakKVGAK19, author = {Anjon Basak and Charles A. Kamhoua and Sridhar Venkatesan and Marcus Gutierrez and Ahmed H. Anwar and Christopher Kiekintveld}, editor = {Tansu Alpcan and Yevgeniy Vorobeychik and John S. Baras and Gy{\"{o}}rgy D{\'{a}}n}, title = {Identifying Stealthy Attackers in a Game Theoretic Framework Using Deception}, booktitle = {Decision and Game Theory for Security - 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11836}, pages = {21--32}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32430-8\_2}, doi = {10.1007/978-3-030-32430-8\_2}, timestamp = {Sat, 27 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/BasakKVGAK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/ThakoorTVXKF19, author = {Omkar Thakoor and Milind Tambe and Phebe Vayanos and Haifeng Xu and Christopher Kiekintveld and Fei Fang}, editor = {Tansu Alpcan and Yevgeniy Vorobeychik and John S. Baras and Gy{\"{o}}rgy D{\'{a}}n}, title = {Cyber Camouflage Games for Strategic Deception}, booktitle = {Decision and Game Theory for Security - 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11836}, pages = {525--541}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32430-8\_31}, doi = {10.1007/978-3-030-32430-8\_31}, timestamp = {Wed, 07 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/ThakoorTVXKF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/HorakBKK19, author = {Karel Hor{\'{a}}k and Branislav Bosansk{\'{y}} and Christopher Kiekintveld and Charles A. Kamhoua}, editor = {Sarit Kraus}, title = {Compact Representation of Value Function in Partially Observable Stochastic Games}, booktitle = {Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, {IJCAI} 2019, Macao, China, August 10-16, 2019}, pages = {350--356}, publisher = {ijcai.org}, year = {2019}, url = {https://doi.org/10.24963/ijcai.2019/50}, doi = {10.24963/IJCAI.2019/50}, timestamp = {Tue, 19 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ijcai/HorakBKK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1903-05511, author = {Karel Hor{\'{a}}k and Branislav Bosansk{\'{y}} and Christopher Kiekintveld and Charles A. Kamhoua}, title = {Compact Representation of Value Function in Partially Observable Stochastic Games}, journal = {CoRR}, volume = {abs/1903.05511}, year = {2019}, url = {http://arxiv.org/abs/1903.05511}, eprinttype = {arXiv}, eprint = {1903.05511}, timestamp = {Tue, 19 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1903-05511.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1912-05845, author = {Anthony Ortiz and Caleb Robinson and Dan Morris and Olac Fuentes and Christopher Kiekintveld and Mahmudulla Hassan and Nebojsa Jojic}, title = {Local Context Normalization: Revisiting Local Normalization}, journal = {CoRR}, volume = {abs/1912.05845}, year = {2019}, url = {http://arxiv.org/abs/1912.05845}, eprinttype = {arXiv}, eprint = {1912.05845}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1912-05845.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atal/ChowdhuryKS018, author = {Moinul Morshed Porag Chowdhury and Christopher Kiekintveld and Tran Cao Son and William Yeoh}, editor = {Elisabeth Andr{\'{e}} and Sven Koenig and Mehdi Dastani and Gita Sukthankar}, title = {Bidding Strategy for Periodic Double Auctions Using Monte Carlo Tree Search}, booktitle = {Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, {AAMAS} 2018, Stockholm, Sweden, July 10-15, 2018}, pages = {1897--1899}, publisher = {International Foundation for Autonomous Agents and Multiagent Systems Richland, SC, {USA} / {ACM}}, year = {2018}, url = {http://dl.acm.org/citation.cfm?id=3238016}, timestamp = {Sat, 30 Sep 2023 09:34:53 +0200}, biburl = {https://dblp.org/rec/conf/atal/ChowdhuryKS018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/OrtizGFKRB18, author = {Anthony Ortiz and Alonso Granados and Olac Fuentes and Christopher Kiekintveld and Dalton S. Rosario and Zachary Bell}, title = {Integrated Learning and Feature Selection for Deep Neural Networks in Multispectral Images}, booktitle = {2018 {IEEE} Conference on Computer Vision and Pattern Recognition Workshops, {CVPR} Workshops 2018, Salt Lake City, UT, USA, June 18-22, 2018}, pages = {1196--1205}, publisher = {Computer Vision Foundation / {IEEE} Computer Society}, year = {2018}, url = {http://openaccess.thecvf.com/content\_cvpr\_2018\_workshops/w21/html/Ortiz\_Integrated\_Learning\_and\_CVPR\_2018\_paper.html}, doi = {10.1109/CVPRW.2018.00165}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cvpr/OrtizGFKRB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/BasakGK18, author = {Anjon Basak and Marcus Gutierrez and Christopher Kiekintveld}, editor = {Linda Bushnell and Radha Poovendran and Tamer Basar}, title = {Algorithms for Subgame Abstraction with Applications to Cyber Defense}, booktitle = {Decision and Game Theory for Security - 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11199}, pages = {556--568}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01554-1\_32}, doi = {10.1007/978-3-030-01554-1\_32}, timestamp = {Tue, 07 May 2024 20:08:32 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/BasakGK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/BasakCGCKJBK18, author = {Anjon Basak and Jakub Cern{\'{y}} and Marcus Gutierrez and Shelby R. Curtis and Charles A. Kamhoua and Daniel Jones and Branislav Bosansk{\'{y}} and Christopher Kiekintveld}, editor = {Linda Bushnell and Radha Poovendran and Tamer Basar}, title = {An Initial Study of Targeted Personality Models in the FlipIt Game}, booktitle = {Decision and Game Theory for Security - 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11199}, pages = {623--636}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01554-1\_36}, doi = {10.1007/978-3-030-01554-1\_36}, timestamp = {Fri, 05 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/BasakCGCKJBK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/ChowdhuryKT018, author = {Moinul Morshed Porag Chowdhury and Christopher Kiekintveld and Son Tran and William Yeoh}, editor = {J{\'{e}}r{\^{o}}me Lang}, title = {Bidding in Periodic Double Auctions Using Heuristics and Dynamic Monte Carlo Tree Search}, booktitle = {Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, {IJCAI} 2018, July 13-19, 2018, Stockholm, Sweden}, pages = {166--172}, publisher = {ijcai.org}, year = {2018}, url = {https://doi.org/10.24963/ijcai.2018/23}, doi = {10.24963/IJCAI.2018/23}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ijcai/ChowdhuryKT018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/SinhaFAKT18, author = {Arunesh Sinha and Fei Fang and Bo An and Christopher Kiekintveld and Milind Tambe}, editor = {J{\'{e}}r{\^{o}}me Lang}, title = {Stackelberg Security Games: Looking Beyond a Decade of Success}, booktitle = {Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, {IJCAI} 2018, July 13-19, 2018, Stockholm, Sweden}, pages = {5494--5501}, publisher = {ijcai.org}, year = {2018}, url = {https://doi.org/10.24963/ijcai.2018/775}, doi = {10.24963/IJCAI.2018/775}, timestamp = {Wed, 07 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ijcai/SinhaFAKT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/OrtizFRK18, author = {Anthony Ortiz and Olac Fuentes and Dalton S. Rosario and Christopher Kiekintveld}, title = {On the Defense Against Adversarial Examples Beyond the Visible Spectrum}, booktitle = {2018 {IEEE} Military Communications Conference, {MILCOM} 2018, Los Angeles, CA, USA, October 29-31, 2018}, pages = {1--5}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/MILCOM.2018.8599763}, doi = {10.1109/MILCOM.2018.8599763}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/milcom/OrtizFRK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigecom/CernyBK18, author = {Jakub Cern{\'{y}} and Branislav Bosansk{\'{y}} and Christopher Kiekintveld}, editor = {{\'{E}}va Tardos and Edith Elkind and Rakesh Vohra}, title = {Incremental Strategy Generation for Stackelberg Equilibria in Extensive-Form Games}, booktitle = {Proceedings of the 2018 {ACM} Conference on Economics and Computation, Ithaca, NY, USA, June 18-22, 2018}, pages = {151--168}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3219166.3219219}, doi = {10.1145/3219166.3219219}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigecom/CernyBK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/GuoABK17, author = {Qingyu Guo and Bo An and Branislav Bosansk{\'{y}} and Christopher Kiekintveld}, title = {Strategic Information Revelation and Commitment in Security Games}, booktitle = {The Workshops of the The Thirty-First {AAAI} Conference on Artificial Intelligence, Saturday, February 4-9, 2017, San Francisco, California, {USA}}, series = {{AAAI} Technical Report}, volume = {{WS-17}}, publisher = {{AAAI} Press}, year = {2017}, url = {http://aaai.org/ocs/index.php/WS/AAAIW17/paper/view/15104}, timestamp = {Mon, 04 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aaai/GuoABK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/GutierrezK17, author = {Marcus Paul Gutierrez and Christopher Kiekintveld}, title = {Adapting Honeypot Configurations to Detect Evolving Exploits}, booktitle = {The Workshops of the The Thirty-First {AAAI} Conference on Artificial Intelligence, Saturday, February 4-9, 2017, San Francisco, California, {USA}}, series = {{AAAI} Technical Report}, volume = {{WS-17}}, publisher = {{AAAI} Press}, year = {2017}, url = {http://aaai.org/ocs/index.php/WS/AAAIW17/paper/view/15230}, timestamp = {Mon, 04 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aaai/GutierrezK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atal/GutierrezK17, author = {Marcus Gutierrez and Christopher Kiekintveld}, editor = {Kate Larson and Michael Winikoff and Sanmay Das and Edmund H. Durfee}, title = {Adapting with Honeypot Configurations to Detect Evolving Exploits}, booktitle = {Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, {AAMAS} 2017, S{\~{a}}o Paulo, Brazil, May 8-12, 2017}, pages = {1565--1567}, publisher = {{ACM}}, year = {2017}, url = {http://dl.acm.org/citation.cfm?id=3091363}, timestamp = {Wed, 27 Sep 2017 07:24:00 +0200}, biburl = {https://dblp.org/rec/conf/atal/GutierrezK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/DurkotaLKHBP17, author = {Karel Durkota and Viliam Lis{\'{y}} and Christopher Kiekintveld and Karel Hor{\'{a}}k and Branislav Bosansk{\'{y}} and Tom{\'{a}}s Pevn{\'{y}}}, editor = {Stefan Rass and Bo An and Christopher Kiekintveld and Fei Fang and Stefan Schauer}, title = {Optimal Strategies for Detecting Data Exfiltration by Internal and External Attackers}, booktitle = {Decision and Game Theory for Security - 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10575}, pages = {171--192}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68711-7\_10}, doi = {10.1007/978-3-319-68711-7\_10}, timestamp = {Tue, 19 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/DurkotaLKHBP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/SchlenkerXGKSTS17, author = {Aaron Schlenker and Haifeng Xu and Mina Guirguis and Christopher Kiekintveld and Arunesh Sinha and Milind Tambe and Solomon Y. Sonya and Darryl Balderas and Noah Dunstatter}, editor = {Carles Sierra}, title = {Don't Bury your Head in Warnings: {A} Game-Theoretic Approach for Intelligent Allocation of Cyber-security Alerts}, booktitle = {Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, {IJCAI} 2017, Melbourne, Australia, August 19-25, 2017}, pages = {381--387}, publisher = {ijcai.org}, year = {2017}, url = {https://doi.org/10.24963/ijcai.2017/54}, doi = {10.24963/IJCAI.2017/54}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ijcai/SchlenkerXGKSTS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/GuoABK17, author = {Qingyu Guo and Bo An and Branislav Bosansk{\'{y}} and Christopher Kiekintveld}, editor = {Carles Sierra}, title = {Comparing Strategic Secrecy and Stackelberg Commitment in Security Games}, booktitle = {Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, {IJCAI} 2017, Melbourne, Australia, August 19-25, 2017}, pages = {3691--3699}, publisher = {ijcai.org}, year = {2017}, url = {https://doi.org/10.24963/ijcai.2017/516}, doi = {10.24963/IJCAI.2017/516}, timestamp = {Wed, 06 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ijcai/GuoABK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/gamesec/2017, editor = {Stefan Rass and Bo An and Christopher Kiekintveld and Fei Fang and Stefan Schauer}, title = {Decision and Game Theory for Security - 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10575}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68711-7}, doi = {10.1007/978-3-319-68711-7}, isbn = {978-3-319-68710-0}, timestamp = {Wed, 07 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/expert/DurkotaLKBP16, author = {Karel Durkota and Viliam Lis{\'{y}} and Christopher Kiekintveld and Branislav Bosansk{\'{y}} and Michal Pechoucek}, title = {Case Studies of Network Defense with Attack Graph Games}, journal = {{IEEE} Intell. Syst.}, volume = {31}, number = {5}, pages = {24--30}, year = {2016}, url = {https://doi.org/10.1109/MIS.2016.74}, doi = {10.1109/MIS.2016.74}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/expert/DurkotaLKBP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/CermakBDLK16, author = {Jiri Cermak and Branislav Bosansk{\'{y}} and Karel Durkota and Viliam Lis{\'{y}} and Christopher Kiekintveld}, editor = {Dale Schuurmans and Michael P. Wellman}, title = {Using Correlated Strategies for Computing Stackelberg Equilibria in Extensive-Form Games}, booktitle = {Proceedings of the Thirtieth {AAAI} Conference on Artificial Intelligence, February 12-17, 2016, Phoenix, Arizona, {USA}}, pages = {439--445}, publisher = {{AAAI} Press}, year = {2016}, url = {https://doi.org/10.1609/aaai.v30i1.10045}, doi = {10.1609/AAAI.V30I1.10045}, timestamp = {Mon, 04 Sep 2023 15:08:28 +0200}, biburl = {https://dblp.org/rec/conf/aaai/CermakBDLK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/GutierrezK16, author = {Marcus Paul Gutierrez and Christopher Kiekintveld}, editor = {David R. Martinez and William W. Streilein and Kevin M. Carter and Arunesh Sinha}, title = {Bandits for Cybersecurity: Adaptive Intrusion Detection Using Honeypots}, booktitle = {Artificial Intelligence for Cyber Security, Papers from the 2016 {AAAI} Workshop, Phoenix, Arizona, USA, February 12, 2016}, series = {{AAAI} Technical Report}, volume = {{WS-16-03}}, publisher = {{AAAI} Press}, year = {2016}, url = {http://www.aaai.org/ocs/index.php/WS/AAAIW16/paper/view/12655}, timestamp = {Tue, 05 Sep 2023 08:59:27 +0200}, biburl = {https://dblp.org/rec/conf/aaai/GutierrezK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/ZhaoAK16, author = {Mengchen Zhao and Bo An and Christopher Kiekintveld}, editor = {Dale Schuurmans and Michael P. Wellman}, title = {Optimizing Personalized Email Filtering Thresholds to Mitigate Sequential Spear Phishing Attacks}, booktitle = {Proceedings of the Thirtieth {AAAI} Conference on Artificial Intelligence, February 12-17, 2016, Phoenix, Arizona, {USA}}, pages = {658--665}, publisher = {{AAAI} Press}, year = {2016}, url = {https://doi.org/10.1609/aaai.v30i1.10030}, doi = {10.1609/AAAI.V30I1.10030}, timestamp = {Mon, 04 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aaai/ZhaoAK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/McCarthyTKGK16, author = {Sara Marie McCarthy and Milind Tambe and Christopher Kiekintveld and Meredith L. Gore and Alex Killion}, editor = {Dale Schuurmans and Michael P. Wellman}, title = {Preventing Illegal Logging: Simultaneous Optimization of Resource Teams and Tactics for Security}, booktitle = {Proceedings of the Thirtieth {AAAI} Conference on Artificial Intelligence, February 12-17, 2016, Phoenix, Arizona, {USA}}, pages = {3880--3886}, publisher = {{AAAI} Press}, year = {2016}, url = {https://doi.org/10.1609/aaai.v30i1.9904}, doi = {10.1609/AAAI.V30I1.9904}, timestamp = {Mon, 04 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aaai/McCarthyTKGK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/VelizGK16, author = {Oscar Veliz and Marcus Gutierrez and Christopher Kiekintveld}, editor = {Dale Schuurmans and Michael P. Wellman}, title = {Teaching Automated Strategic Reasoning Using Capstone Tournaments}, booktitle = {Proceedings of the Thirtieth {AAAI} Conference on Artificial Intelligence, February 12-17, 2016, Phoenix, Arizona, {USA}}, pages = {4134--4135}, publisher = {{AAAI} Press}, year = {2016}, url = {https://doi.org/10.1609/aaai.v30i1.9865}, doi = {10.1609/AAAI.V30I1.9865}, timestamp = {Mon, 04 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aaai/VelizGK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amec/ChowdhuryFFK016, author = {Moinul Morshed Porag Chowdhury and Russell Y. Folk and Ferdinando Fioretto and Christopher Kiekintveld and William Yeoh}, editor = {Sofia Ceppi and Esther David and Chen Hajaj and Valentin Robu and Ioannis A. Vetsikas}, title = {Investigation of Learning Strategies for the {SPOT} Broker in Power {TAC}}, booktitle = {Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets - {AMEC/TADA} 2015, Istanbul, Turkey, May 4, 2015, and {AMEC/TADA} 2016, New York, NY, USA, July 10, 2016, Revised Selected Papers}, series = {Lecture Notes in Business Information Processing}, volume = {271}, pages = {96--111}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-54229-4\_7}, doi = {10.1007/978-3-319-54229-4\_7}, timestamp = {Mon, 05 Feb 2024 20:33:00 +0100}, biburl = {https://dblp.org/rec/conf/amec/ChowdhuryFFK016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atal/BasakFNK16, author = {Anjon Basak and Fei Fang and Thanh Hong Nguyen and Christopher Kiekintveld}, editor = {Nardine Osman and Carles Sierra}, title = {Abstraction Methods for Solving Graph-Based Security Games}, booktitle = {Autonomous Agents and Multiagent Systems - {AAMAS} 2016 Workshops, - Visionary Papers - , Singapore, Singapore, May 9-10, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10003}, pages = {13--33}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-46840-2\_2}, doi = {10.1007/978-3-319-46840-2\_2}, timestamp = {Wed, 07 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/atal/BasakFNK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/BasakFNK16, author = {Anjon Basak and Fei Fang and Thanh Hong Nguyen and Christopher Kiekintveld}, editor = {Quanyan Zhu and Tansu Alpcan and Emmanouil A. Panaousis and Milind Tambe and William Casey}, title = {Combining Graph Contraction and Strategy Generation for Green Security Games}, booktitle = {Decision and Game Theory for Security - 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9996}, pages = {251--271}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47413-7\_15}, doi = {10.1007/978-3-319-47413-7\_15}, timestamp = {Wed, 07 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/BasakFNK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/paams/FordBYSSSKT16, author = {Benjamin J. Ford and Matthew Brown and Amulya Yadav and Amandeep Singh and Arunesh Sinha and Biplav Srivastava and Christopher Kiekintveld and Milind Tambe}, editor = {Yves Demazeau and Takayuki Ito and Javier Bajo and Mar{\'{\i}}a Jos{\'{e}} Escalona Cuaresma}, title = {Protecting the {NECTAR} of the Ganga River Through Game-Theoretic Factory Inspections}, booktitle = {Advances in Practical Applications of Scalable Multi-agent Systems. The {PAAMS} Collection - 14th International Conference, {PAAMS} 2016, Sevilla, Spain, June 1-3, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9662}, pages = {97--108}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39324-7\_9}, doi = {10.1007/978-3-319-39324-7\_9}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/paams/FordBYSSSKT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aim/AgarwalABFFKKKL15, author = {Nitin Agarwal and Sean Andrist and Dan Bohus and Fei Fang and Laurie Fenstermacher and Lalana Kagal and Takashi Kido and Christopher Kiekintveld and William F. Lawless and Huan Liu and Andrew McCallum and Hemant Purohit and Oshani Seneviratne and Keiki Takadama and Gavin Taylor}, title = {Reports on the 2015 {AAAI} Spring Symposium Series}, journal = {{AI} Mag.}, volume = {36}, number = {3}, pages = {113--119}, year = {2015}, url = {https://doi.org/10.1609/aimag.v36i3.2608}, doi = {10.1609/AIMAG.V36I3.2608}, timestamp = {Wed, 07 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/aim/AgarwalABFFKKKL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/BosanskyJTK15, author = {Branislav Bosansk{\'{y}} and Albert Xin Jiang and Milind Tambe and Christopher Kiekintveld}, editor = {Blai Bonet and Sven Koenig}, title = {Combining Compact Representation and Incremental Generation in Large Games with Sequential Strategies}, booktitle = {Proceedings of the Twenty-Ninth {AAAI} Conference on Artificial Intelligence, January 25-30, 2015, Austin, Texas, {USA}}, pages = {812--818}, publisher = {{AAAI} Press}, year = {2015}, url = {https://doi.org/10.1609/aaai.v29i1.9319}, doi = {10.1609/AAAI.V29I1.9319}, timestamp = {Mon, 18 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aaai/BosanskyJTK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atal/DurkotaLKB15, author = {Karel Durkota and Viliam Lis{\'{y}} and Christopher Kiekintveld and Branislav Bosansk{\'{y}}}, editor = {Gerhard Weiss and Pinar Yolum and Rafael H. Bordini and Edith Elkind}, title = {Game-Theoretic Algorithms for Optimal Network Security Hardening Using Attack Graphs}, booktitle = {Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, {AAMAS} 2015, Istanbul, Turkey, May 4-8, 2015}, pages = {1773--1774}, publisher = {{ACM}}, year = {2015}, url = {http://dl.acm.org/citation.cfm?id=2773429}, timestamp = {Tue, 08 Mar 2022 10:12:47 +0100}, biburl = {https://dblp.org/rec/conf/atal/DurkotaLKB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atal/VelizK15, author = {Oscar Veliz and Christopher Kiekintveld}, editor = {Gerhard Weiss and Pinar Yolum and Rafael H. Bordini and Edith Elkind}, title = {Selecting Robust Strategies Based on Abstracted Game Models}, booktitle = {Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, {AAMAS} 2015, Istanbul, Turkey, May 4-8, 2015}, pages = {1877--1878}, publisher = {{ACM}}, year = {2015}, url = {http://dl.acm.org/citation.cfm?id=2773482}, timestamp = {Fri, 15 May 2015 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/atal/VelizK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/KlimaLK15, author = {Richard Kl{\'{\i}}ma and Viliam Lis{\'{y}} and Christopher Kiekintveld}, editor = {M. H. R. Khouzani and Emmanouil A. Panaousis and George Theodorakopoulos}, title = {Combining Online Learning and Equilibrium Computation in Security Games}, booktitle = {Decision and Game Theory for Security - 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9406}, pages = {130--149}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25594-1\_8}, doi = {10.1007/978-3-319-25594-1\_8}, timestamp = {Thu, 17 Sep 2020 10:44:10 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/KlimaLK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/DurkotaLBK15, author = {Karel Durkota and Viliam Lis{\'{y}} and Branislav Bosansk{\'{y}} and Christopher Kiekintveld}, editor = {M. H. R. Khouzani and Emmanouil A. Panaousis and George Theodorakopoulos}, title = {Approximate Solutions for Attack Graph Games with Imperfect Information}, booktitle = {Decision and Game Theory for Security - 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9406}, pages = {228--249}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25594-1\_13}, doi = {10.1007/978-3-319-25594-1\_13}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/DurkotaLBK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/DurkotaLBK15, author = {Karel Durkota and Viliam Lis{\'{y}} and Branislav Bosansk{\'{y}} and Christopher Kiekintveld}, editor = {Qiang Yang and Michael J. Wooldridge}, title = {Optimal Network Security Hardening Using Attack Graph Games}, booktitle = {Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, {IJCAI} 2015, Buenos Aires, Argentina, July 25-31, 2015}, pages = {526--532}, publisher = {{AAAI} Press}, year = {2015}, url = {http://ijcai.org/Abstract/15/080}, timestamp = {Tue, 20 Aug 2019 16:16:43 +0200}, biburl = {https://dblp.org/rec/conf/ijcai/DurkotaLBK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/KiekintveldLP15, author = {Christopher Kiekintveld and Viliam Lis{\'{y}} and Radek P{\'{\i}}bil}, editor = {Sushil Jajodia and Paulo Shakarian and V. S. Subrahmanian and Vipin Swarup and Cliff Wang}, title = {Game-Theoretic Foundations for the Strategic Use of Honeypots in Network Security}, booktitle = {Cyber Warfare - Building the Scientific Foundation}, series = {Advances in Information Security}, volume = {56}, pages = {81--101}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-14039-1\_5}, doi = {10.1007/978-3-319-14039-1\_5}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/KiekintveldLP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aamas/BrownAKOT14, author = {Matthew Brown and Bo An and Christopher Kiekintveld and Fernando Ord{\'{o}}{\~{n}}ez and Milind Tambe}, title = {An extended study on multi-objective security games}, journal = {Auton. Agents Multi Agent Syst.}, volume = {28}, number = {1}, pages = {31--71}, year = {2014}, url = {https://doi.org/10.1007/s10458-012-9209-6}, doi = {10.1007/S10458-012-9209-6}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/aamas/BrownAKOT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jair/BosanskyKLP14, author = {Branislav Bosansk{\'{y}} and Christopher Kiekintveld and Viliam Lis{\'{y}} and Michal Pechoucek}, title = {An Exact Double-Oracle Algorithm for Zero-Sum Extensive-Form Games with Imperfect Information}, journal = {J. Artif. Intell. Res.}, volume = {51}, pages = {829--866}, year = {2014}, url = {https://doi.org/10.1613/jair.4477}, doi = {10.1613/JAIR.4477}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jair/BosanskyKLP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/KlimaKL14, author = {Richard Kl{\'{\i}}ma and Christopher Kiekintveld and Viliam Lis{\'{y}}}, editor = {Radha Poovendran and Walid Saad}, title = {Online Learning Methods for Border Patrol Resource Allocation}, booktitle = {Decision and Game Theory for Security - 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8840}, pages = {340--349}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12601-2\_20}, doi = {10.1007/978-3-319-12601-2\_20}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/KlimaKL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KorzhykYKCT14, author = {Dmytro Korzhyk and Zhengyu Yin and Christopher Kiekintveld and Vincent Conitzer and Milind Tambe}, title = {Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness}, journal = {CoRR}, volume = {abs/1401.3888}, year = {2014}, url = {http://arxiv.org/abs/1401.3888}, eprinttype = {arXiv}, eprint = {1401.3888}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KorzhykYKCT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ai/YangKOTJ13, author = {Rong Yang and Christopher Kiekintveld and Fernando Ord{\'{o}}{\~{n}}ez and Milind Tambe and Richard John}, title = {Improving resource allocation strategies against human adversaries in security games: An extended study}, journal = {Artif. Intell.}, volume = {195}, pages = {440--469}, year = {2013}, url = {https://doi.org/10.1016/j.artint.2012.11.004}, doi = {10.1016/J.ARTINT.2012.11.004}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ai/YangKOTJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/ParraK13, author = {Jaime Parra Jr. and Christopher Kiekintveld}, title = {Initial Exploration of Machine Learning to Predict Customer Demand in an Energy Market Simulation}, booktitle = {Trading Agent Design and Analysis, Papers from the 2013 {AAAI} Workshop, Bellevue, Washington, USA, July 15, 2013}, series = {{AAAI} Technical Report}, volume = {{WS-13-15}}, publisher = {{AAAI}}, year = {2013}, url = {http://www.aaai.org/ocs/index.php/WS/AAAIW13/paper/view/7150}, timestamp = {Tue, 05 Sep 2023 08:59:27 +0200}, biburl = {https://dblp.org/rec/conf/aaai/ParraK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atal/KiekintveldIK13, author = {Christopher Kiekintveld and Towhidul Islam and Vladik Kreinovich}, editor = {Maria L. Gini and Onn Shehory and Takayuki Ito and Catholijn M. Jonker}, title = {Security games with interval uncertainty}, booktitle = {International conference on Autonomous Agents and Multi-Agent Systems, {AAMAS} '13, Saint Paul, MN, USA, May 6-10, 2013}, pages = {231--238}, publisher = {{IFAAMAS}}, year = {2013}, url = {http://dl.acm.org/citation.cfm?id=2484959}, timestamp = {Thu, 09 Sep 2021 16:09:54 +0200}, biburl = {https://dblp.org/rec/conf/atal/KiekintveldIK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atal/BosanskyKLCP13, author = {Branislav Bosansk{\'{y}} and Christopher Kiekintveld and Viliam Lis{\'{y}} and Jiri Cermak and Michal Pechoucek}, editor = {Maria L. Gini and Onn Shehory and Takayuki Ito and Catholijn M. Jonker}, title = {Double-oracle algorithm for computing an exact nash equilibrium in zero-sum extensive-form games}, booktitle = {International conference on Autonomous Agents and Multi-Agent Systems, {AAMAS} '13, Saint Paul, MN, USA, May 6-10, 2013}, pages = {335--342}, publisher = {{IFAAMAS}}, year = {2013}, url = {http://dl.acm.org/citation.cfm?id=2484975}, timestamp = {Fri, 28 Jun 2013 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/atal/BosanskyKLCP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atal/TsaiQVKT13, author = {Jason Tsai and Yundi Qian and Yevgeniy Vorobeychik and Christopher Kiekintveld and Milind Tambe}, editor = {Maria L. Gini and Onn Shehory and Takayuki Ito and Catholijn M. Jonker}, title = {Security games with contagion: handling asymmetric information}, booktitle = {International conference on Autonomous Agents and Multi-Agent Systems, {AAMAS} '13, Saint Paul, MN, USA, May 6-10, 2013}, pages = {1185--1186}, publisher = {{IFAAMAS}}, year = {2013}, url = {http://dl.acm.org/citation.cfm?id=2485134}, timestamp = {Fri, 28 Jun 2013 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/atal/TsaiQVKT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socialcom/TsaiQVKT13, author = {Jason Tsai and Yundi Qian and Yevgeniy Vorobeychik and Christopher Kiekintveld and Milind Tambe}, title = {Bayesian Security Games for Controlling Contagion}, booktitle = {International Conference on Social Computing, SocialCom 2013, SocialCom/PASSAT/BigData/EconCom/BioMedCom 2013, Washington, DC, USA, 8-14 September, 2013}, pages = {33--38}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SocialCom.2013.11}, doi = {10.1109/SOCIALCOM.2013.11}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/socialcom/TsaiQVKT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/amec/2012, editor = {Esther David and Christopher Kiekintveld and Valentin Robu and Onn Shehory and Sebastian Stein}, title = {Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets - {AMEC} and {TADA} 2012, Valencia, Spain, June 4th, 2012, Revised Selected Papers}, series = {Lecture Notes in Business Information Processing}, volume = {136}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40864-9}, doi = {10.1007/978-3-642-40864-9}, isbn = {978-3-642-40863-2}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/amec/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aim/AgmonAAABDGGGJKKLLMMMOOOPPRRTSSSSSSUW12, author = {Noa Agmon and Vikas Agrawal and David W. Aha and Yiannis Aloimonos and Donagh Buckley and Prashant Doshi and Christopher W. Geib and Floriana Grasso and Nancy L. Green and Benjamin Johnston and Burt Kaliski and Christopher Kiekintveld and Edith Law and Henry Lieberman and Ole J. Mengshoel and Ted Metzler and Joseph Modayil and Douglas W. Oard and Nilufer Onder and Barry O'Sullivan and Katerina Pastra and Doina Precup and Sowmya Ramachandran and Chris Reed and Sanem Sariel Talay and Ted Selker and Lokendra Shastri and Stephen F. Smith and Satinder Singh and Siddharth Srivastava and Gita Sukthankar and David C. Uthus and Mary{-}Anne Williams}, title = {Reports of the {AAAI} 2011 Conference Workshops}, journal = {{AI} Mag.}, volume = {33}, number = {1}, pages = {57--70}, year = {2012}, url = {https://doi.org/10.1609/aimag.v33i1.2390}, doi = {10.1609/AIMAG.V33I1.2390}, timestamp = {Thu, 10 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/aim/AgmonAAABDGGGJKKLLMMMOOOPPRRTSSSSSSUW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aim/YinJTKLSS12, author = {Zhengyu Yin and Albert Xin Jiang and Milind Tambe and Christopher Kiekintveld and Kevin Leyton{-}Brown and Tuomas Sandholm and John P. Sullivan}, title = {{TRUSTS:} Scheduling Randomized Patrols for Fare Inspection in Transit Systems Using Game Theory}, journal = {{AI} Mag.}, volume = {33}, number = {4}, pages = {59--72}, year = {2012}, url = {https://doi.org/10.1609/aimag.v33i4.2432}, doi = {10.1609/AIMAG.V33I4.2432}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/aim/YinJTKLSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/AnKKSSTV12, author = {Bo An and David Kempe and Christopher Kiekintveld and Eric Shieh and Satinder Singh and Milind Tambe and Yevgeniy Vorobeychik}, editor = {J{\"{o}}rg Hoffmann and Bart Selman}, title = {Security Games with Limited Surveillance}, booktitle = {Proceedings of the Twenty-Sixth {AAAI} Conference on Artificial Intelligence, July 22-26, 2012, Toronto, Ontario, Canada}, pages = {1241--1248}, publisher = {{AAAI} Press}, year = {2012}, url = {https://doi.org/10.1609/aaai.v26i1.8236}, doi = {10.1609/AAAI.V26I1.8236}, timestamp = {Mon, 04 Sep 2023 15:56:47 +0200}, biburl = {https://dblp.org/rec/conf/aaai/AnKKSSTV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaaiss/AnKKSSTV12, author = {Bo An and David Kempe and Christopher Kiekintveld and Eric Anyung Shieh and Satinder Singh and Milind Tambe and Yevgeniy Vorobeychik}, title = {Security Games with Limited Surveillance: An Initial Report}, booktitle = {Game Theory for Security, Sustainability, and Health, Papers from the 2012 {AAAI} Spring Symposium, Palo Alto, California, USA, March 26-28, 2012}, series = {{AAAI} Technical Report}, volume = {{SS-12-03}}, publisher = {{AAAI}}, year = {2012}, url = {http://www.aaai.org/ocs/index.php/SSS/SSS12/paper/view/4262}, timestamp = {Tue, 19 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aaaiss/AnKKSSTV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaaiss/JiangYJTKLS12, author = {Albert Xin Jiang and Zhengyu Yin and Matthew P. Johnson and Milind Tambe and Christopher Kiekintveld and Kevin Leyton{-}Brown and Tuomas Sandholm}, title = {Towards Optimal Patrol Strategies for Fare Inspection in Transit Systems}, booktitle = {Game Theory for Security, Sustainability, and Health, Papers from the 2012 {AAAI} Spring Symposium, Palo Alto, California, USA, March 26-28, 2012}, series = {{AAAI} Technical Report}, volume = {{SS-12-03}}, publisher = {{AAAI}}, year = {2012}, url = {http://www.aaai.org/ocs/index.php/SSS/SSS12/paper/view/4263}, timestamp = {Wed, 03 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aaaiss/JiangYJTKLS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaaiss/KiekintveldK12, author = {Christopher Kiekintveld and Vladik Kreinovich}, title = {Efficient Approximation for Security Games with Interval Uncertainty}, booktitle = {Game Theory for Security, Sustainability, and Health, Papers from the 2012 {AAAI} Spring Symposium, Palo Alto, California, USA, March 26-28, 2012}, series = {{AAAI} Technical Report}, volume = {{SS-12-03}}, publisher = {{AAAI}}, year = {2012}, url = {http://www.aaai.org/ocs/index.php/SSS/SSS12/paper/view/4346}, timestamp = {Wed, 25 Sep 2013 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aaaiss/KiekintveldK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aamas/BrownAKOT12, author = {Matthew Brown and Bo An and Christopher Kiekintveld and Fernando Ord{\'{o}}{\~{n}}ez and Milind Tambe}, editor = {Wiebe van der Hoek and Lin Padgham and Vincent Conitzer and Michael Winikoff}, title = {Multi-objective optimization for security games}, booktitle = {International Conference on Autonomous Agents and Multiagent Systems, {AAMAS} 2012, Valencia, Spain, June 4-8, 2012 {(3} Volumes)}, pages = {863--870}, publisher = {{IFAAMAS}}, year = {2012}, url = {http://dl.acm.org/citation.cfm?id=2343820}, timestamp = {Wed, 06 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aamas/BrownAKOT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecai/BosanskyKLP12, author = {Branislav Bosansk{\'{y}} and Christopher Kiekintveld and Viliam Lis{\'{y}} and Michal Pechoucek}, editor = {Luc De Raedt and Christian Bessiere and Didier Dubois and Patrick Doherty and Paolo Frasconi and Fredrik Heintz and Peter J. F. Lucas}, title = {Iterative Algorithm for Solving Two-player Zero-sum Extensive-form Games with Imperfect Information}, booktitle = {{ECAI} 2012 - 20th European Conference on Artificial Intelligence. Including Prestigious Applications of Artificial Intelligence {(PAIS-2012)} System Demonstrations Track, Montpellier, France, August 27-31 , 2012}, series = {Frontiers in Artificial Intelligence and Applications}, volume = {242}, pages = {193--198}, publisher = {{IOS} Press}, year = {2012}, url = {https://doi.org/10.3233/978-1-61499-098-7-193}, doi = {10.3233/978-1-61499-098-7-193}, timestamp = {Mon, 19 Jun 2023 16:36:09 +0200}, biburl = {https://dblp.org/rec/conf/ecai/BosanskyKLP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/PibilLKBP12, author = {Radek P{\'{\i}}bil and Viliam Lis{\'{y}} and Christopher Kiekintveld and Branislav Bosansk{\'{y}} and Michal Pechoucek}, editor = {Jens Grossklags and Jean C. Walrand}, title = {Game Theoretic Model of Strategic Honeypot Selection in Computer Networks}, booktitle = {Decision and Game Theory for Security - Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7638}, pages = {201--220}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34266-0\_12}, doi = {10.1007/978-3-642-34266-0\_12}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/PibilLKBP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iaai/YinJJKLSTS12, author = {Zhengyu Yin and Albert Xin Jiang and Matthew Paul Johnson and Christopher Kiekintveld and Kevin Leyton{-}Brown and Tuomas Sandholm and Milind Tambe and John P. Sullivan}, editor = {Markus P. J. Fromherz and Hector Mu{\~{n}}oz{-}Avila}, title = {{TRUSTS:} Scheduling Randomized Patrols for Fare Inspection in Transit Systems}, booktitle = {Proceedings of the Twenty-Fourth Conference on Innovative Applications of Artificial Intelligence, July 22-26, 2012, Toronto, Ontario, Canada}, pages = {2348--2355}, publisher = {{AAAI}}, year = {2012}, url = {https://doi.org/10.1609/aaai.v26i2.18975}, doi = {10.1609/AAAI.V26I2.18975}, timestamp = {Tue, 05 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iaai/YinJJKLSTS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jair/KorzhykYKCT11, author = {Dmytro Korzhyk and Zhengyu Yin and Christopher Kiekintveld and Vincent Conitzer and Milind Tambe}, title = {Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness}, journal = {J. Artif. Intell. Res.}, volume = {41}, pages = {297--327}, year = {2011}, url = {https://doi.org/10.1613/jair.3269}, doi = {10.1613/JAIR.3269}, timestamp = {Mon, 21 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jair/KorzhykYKCT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigecom/AnPSTKM11, author = {Bo An and James Pita and Eric Anyung Shieh and Milind Tambe and Christopher Kiekintveld and Janusz Marecki}, title = {{GUARDS} and {PROTECT:} next generation applications of security games}, journal = {SIGecom Exch.}, volume = {10}, number = {1}, pages = {31--34}, year = {2011}, url = {https://doi.org/10.1145/1978721.1978729}, doi = {10.1145/1978721.1978729}, timestamp = {Thu, 04 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigecom/AnPSTKM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/AguirreLGTEK11, author = {Oswaldo Aguirre and Nicolas Lopez and Eric Gutierrez and Heidi A. Taboada and Jose Epiritu and Christopher Kiekintveld}, title = {Towards the Integration of Multi-Attribute Optimization and Game Theory for Border Security Patrolling Strategies}, booktitle = {Applied Adversarial Reasoning and Risk Modeling, Papers from the 2011 {AAAI} Workshop, San Francisco, California, USA, August 7, 2011}, series = {{AAAI} Technical Report}, volume = {{WS-11-06}}, publisher = {{AAAI}}, year = {2011}, url = {http://www.aaai.org/ocs/index.php/WS/AAAIW11/paper/view/3853}, timestamp = {Tue, 05 Sep 2023 08:59:27 +0200}, biburl = {https://dblp.org/rec/conf/aaai/AguirreLGTEK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/AnTOSK11, author = {Bo An and Milind Tambe and Fernando Ord{\'{o}}{\~{n}}ez and Eric Anyung Shieh and Christopher Kiekintveld}, editor = {Wolfram Burgard and Dan Roth}, title = {Refinement of Strong Stackelberg Equilibria in Security Games}, booktitle = {Proceedings of the Twenty-Fifth {AAAI} Conference on Artificial Intelligence, {AAAI} 2011, San Francisco, California, USA, August 7-11, 2011}, pages = {587--593}, publisher = {{AAAI} Press}, year = {2011}, url = {https://doi.org/10.1609/aaai.v25i1.7864}, doi = {10.1609/AAAI.V25I1.7864}, timestamp = {Mon, 04 Sep 2023 16:05:54 +0200}, biburl = {https://dblp.org/rec/conf/aaai/AnTOSK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/LermaKK11, author = {Octavio Lerma and Vladik Kreinovich and Christopher Kiekintveld}, title = {Linear-Time Resource Allocation in Security Games with Identical Fully Protective Resources}, booktitle = {Applied Adversarial Reasoning and Risk Modeling, Papers from the 2011 {AAAI} Workshop, San Francisco, California, USA, August 7, 2011}, series = {{AAAI} Technical Report}, volume = {{WS-11-06}}, publisher = {{AAAI}}, year = {2011}, url = {http://www.aaai.org/ocs/index.php/WS/AAAIW11/paper/view/3978}, timestamp = {Tue, 05 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aaai/LermaKK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaaiss/AnJTK11, author = {Bo An and Manish Jain and Milind Tambe and Christopher Kiekintveld}, title = {Mixed-Initiative Optimization in Security Games: {A} Preliminary Report}, booktitle = {Help Me Help You: Bridging the Gaps in Human-Agent Collaboration, Papers from the 2011 {AAAI} Spring Symposium, Technical Report SS-11-05, Stanford, California, USA, March 21-23, 2011}, publisher = {{AAAI}}, year = {2011}, url = {http://www.aaai.org/ocs/index.php/SSS/SSS11/paper/view/2375}, timestamp = {Wed, 06 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aaaiss/AnJTK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atal/PitaTKCS11, author = {James Pita and Milind Tambe and Christopher Kiekintveld and Shane Cullen and Erin Steigerwald}, editor = {Liz Sonenberg and Peter Stone and Kagan Tumer and Pinar Yolum}, title = {{GUARDS:} game theoretic security allocation on a national scale}, booktitle = {10th International Conference on Autonomous Agents and Multiagent Systems {(AAMAS} 2011), Taipei, Taiwan, May 2-6, 2011, Volume 1-3}, pages = {37--44}, publisher = {{IFAAMAS}}, year = {2011}, url = {http://portal.acm.org/citation.cfm?id=2030476\&\#38;CFID=69153967\&\#38;CFTOKEN=38069692}, timestamp = {Fri, 18 Nov 2011 09:09:28 +0100}, biburl = {https://dblp.org/rec/conf/atal/PitaTKCS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atal/JainKT11, author = {Manish Jain and Christopher Kiekintveld and Milind Tambe}, editor = {Liz Sonenberg and Peter Stone and Kagan Tumer and Pinar Yolum}, title = {Quality-bounded solutions for finite Bayesian Stackelberg games: scaling up}, booktitle = {10th International Conference on Autonomous Agents and Multiagent Systems {(AAMAS} 2011), Taipei, Taiwan, May 2-6, 2011, Volume 1-3}, pages = {997--1004}, publisher = {{IFAAMAS}}, year = {2011}, url = {http://portal.acm.org/citation.cfm?id=2034411\&\#38;CFID=69154334\&\#38;CFTOKEN=45298625}, timestamp = {Fri, 18 Nov 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/atal/JainKT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atal/KiekintveldMT11, author = {Christopher Kiekintveld and Janusz Marecki and Milind Tambe}, editor = {Liz Sonenberg and Peter Stone and Kagan Tumer and Pinar Yolum}, title = {Approximation methods for infinite Bayesian Stackelberg games: modeling distributional payoff uncertainty}, booktitle = {10th International Conference on Autonomous Agents and Multiagent Systems {(AAMAS} 2011), Taipei, Taiwan, May 2-6, 2011, Volume 1-3}, pages = {1005--1012}, publisher = {{IFAAMAS}}, year = {2011}, url = {http://portal.acm.org/citation.cfm?id=2034412\&\#38;CFID=69154334\&\#38;CFTOKEN=45298625}, timestamp = {Fri, 18 Nov 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/atal/KiekintveldMT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atal/YangKOTJ11, author = {Rong Yang and Christopher Kiekintveld and Fernando Ord{\'{o}}{\~{n}}ez and Milind Tambe and Richard John}, editor = {Liz Sonenberg and Peter Stone and Kagan Tumer and Pinar Yolum}, title = {Improved computational models of human behavior in security games}, booktitle = {10th International Conference on Autonomous Agents and Multiagent Systems {(AAMAS} 2011), Taipei, Taiwan, May 2-6, 2011, Volume 1-3}, pages = {1155--1156}, publisher = {{IFAAMAS}}, year = {2011}, url = {http://portal.acm.org/citation.cfm?id=2034464\&\#38;CFID=69154334\&\#38;CFTOKEN=45298625}, timestamp = {Fri, 18 Nov 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/atal/YangKOTJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/YangKOTJ11, author = {Rong Yang and Christopher Kiekintveld and Fernando Ord{\'{o}}{\~{n}}ez and Milind Tambe and Richard John}, editor = {Toby Walsh}, title = {Improving Resource Allocation Strategy against Human Adversaries in Security Games}, booktitle = {{IJCAI} 2011, Proceedings of the 22nd International Joint Conference on Artificial Intelligence, Barcelona, Catalonia, Spain, July 16-22, 2011}, pages = {458--464}, publisher = {{IJCAI/AAAI}}, year = {2011}, url = {https://doi.org/10.5591/978-1-57735-516-8/IJCAI11-084}, doi = {10.5591/978-1-57735-516-8/IJCAI11-084}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ijcai/YangKOTJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/PitaTKCS11, author = {James Pita and Milind Tambe and Christopher Kiekintveld and Shane Cullen and Erin Steigerwald}, editor = {Toby Walsh}, title = {{GUARDS} - Innovative Application of Game Theory for National Airport Security}, booktitle = {{IJCAI} 2011, Proceedings of the 22nd International Joint Conference on Artificial Intelligence, Barcelona, Catalonia, Spain, July 16-22, 2011}, pages = {2710--2715}, publisher = {{IJCAI/AAAI}}, year = {2011}, url = {https://doi.org/10.5591/978-1-57735-516-8/IJCAI11-451}, doi = {10.5591/978-1-57735-516-8/IJCAI11-451}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ijcai/PitaTKCS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/informaticaSI/KiekintveldMPS10, author = {Christopher Kiekintveld and Janusz Marecki and Praveen Paruchuri and Katia P. Sycara}, title = {Editor's Introduction to the Special Issue on Quantitative Risk Analysis Techniques for Security Applications}, journal = {Informatica (Slovenia)}, volume = {34}, number = {2}, pages = {127--128}, year = {2010}, url = {http://www.informatica.si/index.php/informatica/article/view/283}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/informaticaSI/KiekintveldMPS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/informaticaSI/TaylorKWT10, author = {Matthew E. Taylor and Christopher Kiekintveld and Craig Western and Milind Tambe}, title = {A Framework for Evaluating Deployed Security Systems: Is There a Chink in your ARMOR?}, journal = {Informatica (Slovenia)}, volume = {34}, number = {2}, pages = {129--140}, year = {2010}, url = {http://www.informatica.si/index.php/informatica/article/view/284}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/informaticaSI/TaylorKWT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/interfaces/JainTPKRTO10, author = {Manish Jain and Jason Tsai and James Pita and Christopher Kiekintveld and Shyamsunder Rathi and Milind Tambe and Fernando Ord{\'{o}}{\~{n}}ez}, title = {Software Assistants for Randomized Patrol Planning for the {LAX} Airport Police and the Federal Air Marshal Service}, journal = {Interfaces}, volume = {40}, number = {4}, pages = {267--290}, year = {2010}, url = {https://doi.org/10.1287/inte.1100.0505}, doi = {10.1287/INTE.1100.0505}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/interfaces/JainTPKRTO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/JainKKOT10, author = {Manish Jain and Erim Kardes and Christopher Kiekintveld and Fernando Ord{\'{o}}{\~{n}}ez and Milind Tambe}, editor = {Maria Fox and David Poole}, title = {Security Games with Arbitrary Schedules: {A} Branch and Price Approach}, booktitle = {Proceedings of the Twenty-Fourth {AAAI} Conference on Artificial Intelligence, {AAAI} 2010, Atlanta, Georgia, USA, July 11-15, 2010}, pages = {792--797}, publisher = {{AAAI} Press}, year = {2010}, url = {https://doi.org/10.1609/aaai.v24i1.7611}, doi = {10.1609/AAAI.V24I1.7611}, timestamp = {Mon, 04 Sep 2023 16:23:45 +0200}, biburl = {https://dblp.org/rec/conf/aaai/JainKKOT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/TsaiYKKKT10, author = {Jason Tsai and Zhengyu Yin and Jun{-}young Kwak and David Kempe and Christopher Kiekintveld and Milind Tambe}, editor = {Maria Fox and David Poole}, title = {Urban Security: Game-Theoretic Resource Allocation in Networked Domains}, booktitle = {Proceedings of the Twenty-Fourth {AAAI} Conference on Artificial Intelligence, {AAAI} 2010, Atlanta, Georgia, USA, July 11-15, 2010}, pages = {881--886}, publisher = {{AAAI} Press}, year = {2010}, url = {https://doi.org/10.1609/aaai.v24i1.7612}, doi = {10.1609/AAAI.V24I1.7612}, timestamp = {Mon, 04 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aaai/TsaiYKKKT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atal/KiekintveldYKT10, author = {Christopher Kiekintveld and Zhengyu Yin and Atul Kumar and Milind Tambe}, editor = {Wiebe van der Hoek and Gal A. Kaminka and Yves Lesp{\'{e}}rance and Michael Luck and Sandip Sen}, title = {Asynchronous algorithms for approximate distributed constraint optimization with quality bounds}, booktitle = {9th International Conference on Autonomous Agents and Multiagent Systems {(AAMAS} 2010), Toronto, Canada, May 10-14, 2010, Volume 1-3}, pages = {133--140}, publisher = {{IFAAMAS}}, year = {2010}, url = {https://dl.acm.org/citation.cfm?id=1838225}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/atal/KiekintveldYKT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atal/YinKKCT10, author = {Zhengyu Yin and Dmytro Korzhyk and Christopher Kiekintveld and Vincent Conitzer and Milind Tambe}, editor = {Wiebe van der Hoek and Gal A. Kaminka and Yves Lesp{\'{e}}rance and Michael Luck and Sandip Sen}, title = {Stackelberg vs. Nash in security games: interchangeability, equivalence, and uniqueness}, booktitle = {9th International Conference on Autonomous Agents and Multiagent Systems {(AAMAS} 2010), Toronto, Canada, May 10-14, 2010, Volume 1-3}, pages = {1139--1146}, publisher = {{IFAAMAS}}, year = {2010}, url = {https://dl.acm.org/citation.cfm?id=1838360}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/atal/YinKKCT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atal/TsaiYKKKT10, author = {Jason Tsai and Zhengyu Yin and Jun{-}young Kwak and David Kempe and Christopher Kiekintveld and Milind Tambe}, editor = {Wiebe van der Hoek and Gal A. Kaminka and Yves Lesp{\'{e}}rance and Michael Luck and Sandip Sen}, title = {How to protect a city: strategic security placement in graph-based domains}, booktitle = {9th International Conference on Autonomous Agents and Multiagent Systems {(AAMAS} 2010), Toronto, Canada, May 10-14, 2010, Volume 1-3}, pages = {1453--1454}, publisher = {{IFAAMAS}}, year = {2010}, url = {https://dl.acm.org/citation.cfm?id=1838428}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/atal/TsaiYKKKT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atal/KiekintveldTM10, author = {Christopher Kiekintveld and Milind Tambe and Janusz Marecki}, editor = {Wiebe van der Hoek and Gal A. Kaminka and Yves Lesp{\'{e}}rance and Michael Luck and Sandip Sen}, title = {Robust Bayesian methods for Stackelberg security games}, booktitle = {9th International Conference on Autonomous Agents and Multiagent Systems {(AAMAS} 2010), Toronto, Canada, May 10-14, 2010, Volume 1-3}, pages = {1467--1468}, publisher = {{IFAAMAS}}, year = {2010}, url = {https://dl.acm.org/citation.cfm?id=1838435}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/atal/KiekintveldTM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/KiekintveldMT10, author = {Christopher Kiekintveld and Janusz Marecki and Milind Tambe}, editor = {Tansu Alpcan and Levente Butty{\'{a}}n and John S. Baras}, title = {Methods and Algorithms for Infinite Bayesian Stackelberg Security Games - (Extended Abstract)}, booktitle = {Decision and Game Theory for Security - First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6442}, pages = {257--265}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17197-0\_18}, doi = {10.1007/978-3-642-17197-0\_18}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/KiekintveldMT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ecra/KiekintveldMJCW09, author = {Christopher Kiekintveld and Jason Miller and Patrick R. Jordan and Lee F. Callender and Michael P. Wellman}, title = {Forecasting market prices in a supply chain game}, journal = {Electron. Commer. Res. Appl.}, volume = {8}, number = {2}, pages = {63--77}, year = {2009}, url = {https://doi.org/10.1016/j.elerap.2008.11.005}, doi = {10.1016/J.ELERAP.2008.11.005}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ecra/KiekintveldMJCW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigecom/PitaBJKTOT09, author = {James Pita and Harish Bellamane and Manish Jain and Christopher Kiekintveld and Jason Tsai and Fernando Ord{\'{o}}{\~{n}}ez and Milind Tambe}, title = {Security applications: lessons of real-world deployment}, journal = {SIGecom Exch.}, volume = {8}, number = {2}, pages = {5}, year = {2009}, url = {https://doi.org/10.1145/1980522.1980527}, doi = {10.1145/1980522.1980527}, timestamp = {Thu, 04 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigecom/PitaBJKTOT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atal/KiekintveldJTPOT09, author = {Christopher Kiekintveld and Manish Jain and Jason Tsai and James Pita and Fernando Ord{\'{o}}{\~{n}}ez and Milind Tambe}, editor = {Carles Sierra and Cristiano Castelfranchi and Keith S. Decker and Jaime Sim{\~{a}}o Sichman}, title = {Computing optimal randomized resource allocations for massive security games}, booktitle = {8th International Joint Conference on Autonomous Agents and Multiagent Systems {(AAMAS} 2009), Budapest, Hungary, May 10-15, 2009, Volume 1}, pages = {689--696}, publisher = {{IFAAMAS}}, year = {2009}, url = {https://dl.acm.org/citation.cfm?id=1558108}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/atal/KiekintveldJTPOT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/us/Kiekintveld08, author = {Christopher Kiekintveld}, title = {Empirical Game-Theoretic Methods for Strategy Design and Analysis in Complex Games}, school = {University of Michigan, {USA}}, year = {2008}, url = {https://hdl.handle.net/2027.42/61590}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/us/Kiekintveld08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atal/KiekintveldW08, author = {Christopher Kiekintveld and Michael P. Wellman}, editor = {Lin Padgham and David C. Parkes and J{\"{o}}rg P. M{\"{u}}ller and Simon Parsons}, title = {Selecting strategies using empirical game models: an experimental analysis of meta-strategies}, booktitle = {7th International Joint Conference on Autonomous Agents and Multiagent Systems {(AAMAS} 2008), Estoril, Portugal, May 12-16, 2008, Volume 2}, pages = {1095--1101}, publisher = {{IFAAMAS}}, year = {2008}, url = {https://dl.acm.org/citation.cfm?id=1402373}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/atal/KiekintveldW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/Kiekintveld07, author = {Christopher Kiekintveld}, title = {Empirical Game-Theoretic Methods for Strategy Design and Analysis in Complex Games}, booktitle = {Proceedings of the Twenty-Second {AAAI} Conference on Artificial Intelligence, July 22-26, 2007, Vancouver, British Columbia, Canada}, pages = {1935--1936}, publisher = {{AAAI} Press}, year = {2007}, url = {http://www.aaai.org/Library/AAAI/2007/aaai07-342.php}, timestamp = {Tue, 05 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aaai/Kiekintveld07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atal/JordanKW07, author = {Patrick R. Jordan and Christopher Kiekintveld and Michael P. Wellman}, editor = {Edmund H. Durfee and Makoto Yokoo and Michael N. Huhns and Onn Shehory}, title = {Empirical game-theoretic analysis of the {TAC} Supply Chain game}, booktitle = {6th International Joint Conference on Autonomous Agents and Multiagent Systems {(AAMAS} 2007), Honolulu, Hawaii, USA, May 14-18, 2007}, pages = {193}, publisher = {{IFAAMAS}}, year = {2007}, url = {https://doi.org/10.1145/1329125.1329359}, doi = {10.1145/1329125.1329359}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/atal/JordanKW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atal/KiekintveldMJW07, author = {Christopher Kiekintveld and Jason Miller and Patrick R. Jordan and Michael P. Wellman}, editor = {Edmund H. Durfee and Makoto Yokoo and Michael N. Huhns and Onn Shehory}, title = {Forecasting market prices in a supply chain game}, booktitle = {6th International Joint Conference on Autonomous Agents and Multiagent Systems {(AAMAS} 2007), Honolulu, Hawaii, USA, May 14-18, 2007}, pages = {234}, publisher = {{IFAAMAS}}, year = {2007}, url = {https://doi.org/10.1145/1329125.1329408}, doi = {10.1145/1329125.1329408}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/atal/KiekintveldMJW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atal/JordanKMW06, author = {Patrick R. Jordan and Christopher Kiekintveld and Jason Miller and Michael P. Wellman}, editor = {Maria Fasli and Onn Shehory}, title = {Market Efficiency, Sales Competition, and the Bullwhip Effect in the {TAC} {SCM} Tournaments}, booktitle = {Agent-Mediated Electronic Commerce. Automated Negotiation and Strategy Design for Electronic Markets, {AAMAS} 2006 Workshop, {TADA/AMEC} 2006, Hakodate, Japan, May 9, 2006, Selected and Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {4452}, pages = {62--74}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-72502-2\_5}, doi = {10.1007/978-3-540-72502-2\_5}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/atal/JordanKMW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigecom/KiekintveldMJW06, author = {Christopher Kiekintveld and Jason Miller and Patrick R. Jordan and Michael P. Wellman}, editor = {Joan Feigenbaum and John C.{-}I. Chuang and David M. Pennock}, title = {Controlling a supply chain agent using value-based decomposition}, booktitle = {Proceedings 7th {ACM} Conference on Electronic Commerce (EC-2006), Ann Arbor, Michigan, USA, June 11-15, 2006}, pages = {208--217}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1134707.1134730}, doi = {10.1145/1134707.1134730}, timestamp = {Tue, 27 Nov 2018 11:56:48 +0100}, biburl = {https://dblp.org/rec/conf/sigecom/KiekintveldMJW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigecom/VorobeychikKW06, author = {Yevgeniy Vorobeychik and Christopher Kiekintveld and Michael P. Wellman}, editor = {Joan Feigenbaum and John C.{-}I. Chuang and David M. Pennock}, title = {Empirical mechanism design: methods, with application to a supply-chain scenario}, booktitle = {Proceedings 7th {ACM} Conference on Electronic Commerce (EC-2006), Ann Arbor, Michigan, USA, June 11-15, 2006}, pages = {306--315}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1134707.1134741}, doi = {10.1145/1134707.1134741}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigecom/VorobeychikKW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ci/WellmanESVKS05, author = {Michael P. Wellman and Joshua Estelle and Satinder Singh and Yevgeniy Vorobeychik and Christopher Kiekintveld and Vishal Soni}, title = {Strategic Interactions in a Supply Chain Game}, journal = {Comput. Intell.}, volume = {21}, number = {1}, pages = {1--26}, year = {2005}, url = {https://doi.org/10.1111/j.0824-7935.2005.00263.x}, doi = {10.1111/J.0824-7935.2005.00263.X}, timestamp = {Tue, 19 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ci/WellmanESVKS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/KiekintveldVW05, author = {Christopher Kiekintveld and Yevgeniy Vorobeychik and Michael P. Wellman}, editor = {Han La Poutr{\'{e}} and Norman M. Sadeh and Sverker Janson}, title = {An Analysis of the 2004 Supply Chain Management Trading Agent Competition}, booktitle = {Agent-Mediated Electronic Commerce. Designing Trading Agents and Mechanisms - {AAMAS} 2005 Workshop, {AMEC} 2005, Utrecht, Netherlands, July 25, 2005, and {IJCAI} 2005 Workshop, {TADA} 2005, Edinburgh, UK, August 1, 2005, Selected and Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3937}, pages = {99--112}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11888727\_8}, doi = {10.1007/11888727\_8}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ijcai/KiekintveldVW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigecom/KiekintveldWSS04, author = {Christopher Kiekintveld and Michael P. Wellman and Satinder Singh and Vishal Soni}, title = {Value-driven procurement in the {TAC} supply chain game}, journal = {SIGecom Exch.}, volume = {4}, number = {3}, pages = {9--18}, year = {2004}, url = {https://doi.org/10.1145/1120701.1120704}, doi = {10.1145/1120701.1120704}, timestamp = {Tue, 19 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigecom/KiekintveldWSS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aips/KiekintveldWSEVSR04, author = {Christopher Kiekintveld and Michael P. Wellman and Satinder Singh and Joshua Estelle and Yevgeniy Vorobeychik and Vishal Soni and Matthew R. Rudary}, editor = {Shlomo Zilberstein and Jana Koehler and Sven Koenig}, title = {Distributed Feedback Control for Decision Making on Supply Chains}, booktitle = {Proceedings of the Fourteenth International Conference on Automated Planning and Scheduling {(ICAPS} 2004), June 3-7 2004, Whistler, British Columbia, Canada}, pages = {384--392}, publisher = {{AAAI}}, year = {2004}, url = {http://www.aaai.org/Library/ICAPS/2004/icaps04-045.php}, timestamp = {Tue, 19 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aips/KiekintveldWSEVSR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cg/EstelleVWSKS04, author = {Joshua Estelle and Yevgeniy Vorobeychik and Michael P. Wellman and Satinder Singh and Christopher Kiekintveld and Vishal Soni}, editor = {H. Jaap van den Herik and Yngvi Bj{\"{o}}rnsson and Nathan S. Netanyahu}, title = {Strategic Interactions in the {TAC} 2003 Supply Chain Tournament}, booktitle = {Computers and Games, 4th International Conference, {CG} 2004, Ramat-Gan, Israel, July 5-7, 2004, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3846}, pages = {316--331}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11674399\_22}, doi = {10.1007/11674399\_22}, timestamp = {Tue, 19 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cg/EstelleVWSKS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.