When will negotiation agents be able to represent us? The challenges and opportunities for autonomous negotiators
Computers that negotiate on our behalf hold great promise for the future and will even
become indispensable in emerging application domains such as the smart grid and the …
become indispensable in emerging application domains such as the smart grid and the …
From physical security to cybersecurity
Security is a critical concern around the world. In many domains from cybersecurity to
sustainability, limited security resources prevent complete security coverage at all times …
sustainability, limited security resources prevent complete security coverage at all times …
[PDF][PDF] Protect: A deployed game theoretic system to protect the ports of the united states
While three deployed applications of game theory for security have recently been reported at
AAMAS [12], we as a community remain in the early stages of these deployments; there is a …
AAMAS [12], we as a community remain in the early stages of these deployments; there is a …
Analyzing the effectiveness of adversary modeling in security games
Recent deployments of Stackelberg security games (SSG) have led to two competing
approaches to handle boundedly rational human adversaries:(1) integrating models of …
approaches to handle boundedly rational human adversaries:(1) integrating models of …
[PDF][PDF] " A Game of Thrones" When Human Behavior Models Compete in Repeated Stackelberg Security Games
Several competing human behavior models have been proposed to model and protect
against boundedly rational adversaries in repeated Stackelberg security games (SSGs) …
against boundedly rational adversaries in repeated Stackelberg security games (SSGs) …
Predicting Human Decision-Making
Designing intelligent agents that interact proficiently with people necessitates the prediction
of human decision-making. We present and discuss three prediction paradigms for …
of human decision-making. We present and discuss three prediction paradigms for …
A game theory based optimal allocation strategy for defense resources of smart grid under cyber-attack
A deep integration of cyber and physical systems will lead to severe risk and security
challenges in the new power system. To address this problem, an optimal defense resource …
challenges in the new power system. To address this problem, an optimal defense resource …
Cloudy with a chance of poaching: Adversary behavior modeling and forecasting with real-world poaching data
Wildlife conservation organizations task rangers to deter and capture wildlife poachers.
Since rangers are responsible for patrolling vast areas, adversary behavior modeling can …
Since rangers are responsible for patrolling vast areas, adversary behavior modeling can …
Game theoretic approaches to attack surface shifting
PK Manadhata - Moving target defense II: Application of game theory …, 2012 - Springer
A software system's attack surface is the set of ways in which the system can be attacked. In
our prior work, we introduced an attack surface measurement and reduction method to …
our prior work, we introduced an attack surface measurement and reduction method to …
[PDF][PDF] Computing optimal strategy against quantal response in security games.
To step beyond the first-generation deployments of attacker-defender security games–for
LAX Police, US FAMS and others–it is critical that we relax the assumption of perfect …
LAX Police, US FAMS and others–it is critical that we relax the assumption of perfect …