When will negotiation agents be able to represent us? The challenges and opportunities for autonomous negotiators

T Baarslag, M Kaisers, E Gerding, CM Jonker, J Gratch - 2017 - eprints.soton.ac.uk
Computers that negotiate on our behalf hold great promise for the future and will even
become indispensable in emerging application domains such as the smart grid and the …

From physical security to cybersecurity

A Sinha, TH Nguyen, D Kar, M Brown… - Journal of …, 2015 - academic.oup.com
Security is a critical concern around the world. In many domains from cybersecurity to
sustainability, limited security resources prevent complete security coverage at all times …

[PDF][PDF] Protect: A deployed game theoretic system to protect the ports of the united states

E Shieh, B An, R Yang, M Tambe… - Proceedings of the …, 2012 - projects.iq.harvard.edu
While three deployed applications of game theory for security have recently been reported at
AAMAS [12], we as a community remain in the early stages of these deployments; there is a …

Analyzing the effectiveness of adversary modeling in security games

T Nguyen, R Yang, A Azaria, S Kraus… - Proceedings of the AAAI …, 2013 - ojs.aaai.org
Recent deployments of Stackelberg security games (SSG) have led to two competing
approaches to handle boundedly rational human adversaries:(1) integrating models of …

[PDF][PDF] " A Game of Thrones" When Human Behavior Models Compete in Repeated Stackelberg Security Games

D Kar, F Fang, F Delle Fave, N Sintov… - Proceedings of the 2015 …, 2015 - Citeseer
Several competing human behavior models have been proposed to model and protect
against boundedly rational adversaries in repeated Stackelberg security games (SSGs) …

Predicting Human Decision-Making

A Rosenfeld, S Kraus - … Human Decision-Making: From Prediction to Action, 2018 - Springer
Designing intelligent agents that interact proficiently with people necessitates the prediction
of human decision-making. We present and discuss three prediction paradigms for …

A game theory based optimal allocation strategy for defense resources of smart grid under cyber-attack

H Ge, L Zhao, D Yue, X **e, L **e, S Gorbachev… - Information …, 2024 - Elsevier
A deep integration of cyber and physical systems will lead to severe risk and security
challenges in the new power system. To address this problem, an optimal defense resource …

Cloudy with a chance of poaching: Adversary behavior modeling and forecasting with real-world poaching data

D Kar, B Ford, S Gholami, F Fang, A Plumptre… - 2017 - nru.uncst.go.ug
Wildlife conservation organizations task rangers to deter and capture wildlife poachers.
Since rangers are responsible for patrolling vast areas, adversary behavior modeling can …

Game theoretic approaches to attack surface shifting

PK Manadhata - Moving target defense II: Application of game theory …, 2012 - Springer
A software system's attack surface is the set of ways in which the system can be attacked. In
our prior work, we introduced an attack surface measurement and reduction method to …

[PDF][PDF] Computing optimal strategy against quantal response in security games.

R Yang, F Ordonez, M Tambe - AAMAS, 2012 - Citeseer
To step beyond the first-generation deployments of attacker-defender security games–for
LAX Police, US FAMS and others–it is critical that we relax the assumption of perfect …