When will negotiation agents be able to represent us? The challenges and opportunities for autonomous negotiators

T Baarslag, M Kaisers, E Gerding, CM Jonker, J Gratch - 2017 - eprints.soton.ac.uk
Computers that negotiate on our behalf hold great promise for the future and will even
become indispensable in emerging application domains such as the smart grid and the …

From physical security to cybersecurity

A Sinha, TH Nguyen, D Kar, M Brown… - Journal of …, 2015 - academic.oup.com
Security is a critical concern around the world. In many domains from cybersecurity to
sustainability, limited security resources prevent complete security coverage at all times …

[PDF][PDF] Protect: A deployed game theoretic system to protect the ports of the united states

E Shieh, B An, R Yang, M Tambe… - Proceedings of the …, 2012 - projects.iq.harvard.edu
While three deployed applications of game theory for security have recently been reported at
AAMAS [12], we as a community remain in the early stages of these deployments; there is a …

Analyzing the effectiveness of adversary modeling in security games

T Nguyen, R Yang, A Azaria, S Kraus… - Proceedings of the AAAI …, 2013 - ojs.aaai.org
Recent deployments of Stackelberg security games (SSG) have led to two competing
approaches to handle boundedly rational human adversaries:(1) integrating models of …

A game theory based optimal allocation strategy for defense resources of smart grid under cyber-attack

H Ge, L Zhao, D Yue, X **e, L **e, S Gorbachev… - Information …, 2024 - Elsevier
A deep integration of cyber and physical systems will lead to severe risk and security
challenges in the new power system. To address this problem, an optimal defense resource …

Predicting human decision-making: From prediction to action

S Kraus - Proceedings of the 6th International Conference on …, 2018 - dl.acm.org
Automated agents that interact proficiently with people can be useful in supporting, training
or replacing people in complex tasks. The inclusion of people presents novel problems for …

[PDF][PDF] " A Game of Thrones" When Human Behavior Models Compete in Repeated Stackelberg Security Games

D Kar, F Fang, F Delle Fave, N Sintov… - Proceedings of the 2015 …, 2015 - Citeseer
Several competing human behavior models have been proposed to model and protect
against boundedly rational adversaries in repeated Stackelberg security games (SSGs) …

[PDF][PDF] Trends and applications in Stackelberg security games

D Kar, TH Nguyen, F Fang, M Brown… - Handbook of dynamic …, 2017 - andrew.cmu.edu
Security is a critical concern around the world, whether it is the challenge of protecting ports,
airports and other critical infrastructure, interdicting the illegal flow of drugs, weapons and …

Attacker–defender model against quantal response adversaries for cyber security in logistics management: An introductory study

KF Cheung, MGH Bell - European Journal of Operational Research, 2021 - Elsevier
Interest in cyber security in logistics and supply chain management has grown, but this has
not been matched by academic research. Increasingly, the logistics industry is implementing …

Cloudy with a chance of poaching: Adversary behavior modeling and forecasting with real-world poaching data

D Kar, B Ford, S Gholami, F Fang, A Plumptre… - 2017 - dash.lib.harvard.edu
Wildlife conservation organizations task rangers to deter and capture wildlife poachers.
Since rangers are responsible for patrolling vast areas, adversary behavior modeling can …