Year |
Citation |
Score |
2021 |
Curtis SR, Basak A, Carre JR, Bošanský B, Černý J, Ben-Asher N, Gutierrez M, Jones DN, Kiekintveld C. The Dark Triad and strategic resource control in a competitive computer game Personality and Individual Differences. 168: 110343. DOI: 10.1016/J.Paid.2020.110343 |
0.399 |
|
2019 |
Horák K, Bosanský B, Tomásek P, Kiekintveld C, Kamhoua CA. Optimizing honeypot strategies against dynamic lateral movement using partially observable stochastic games Computers & Security. 87: 101579. DOI: 10.1016/J.Cose.2019.101579 |
0.467 |
|
2019 |
Durkota K, Lisý V, Bošanský B, Kiekintveld C, Pěchouček M. Hardening networks against strategic attackers using attack graph games Computers & Security. 87: 101578. DOI: 10.1016/J.Cose.2019.101578 |
0.438 |
|
2016 |
Durkota K, Lisy V, Kiekintveld C, Bosansky B, Pechoucek M. Case Studies of Network Defense with Attack Graph Games Ieee Intelligent Systems. 31: 24-30. DOI: 10.1109/Mis.2016.74 |
0.416 |
|
2014 |
Bošanský B, Kiekintveld C, Lisý V, Pěchouček M. An exact double-oracle algorithm for zero-sum extensive-form games with imperfect information Journal of Artificial Intelligence Research. 51: 829-866. DOI: 10.1613/Jair.4477 |
0.422 |
|
2014 |
Brown M, An B, Kiekintveld C, Ordóñez F, Tambe M. An extended study on multi-objective security games Autonomous Agents and Multi-Agent Systems. 28: 31-71. DOI: 10.1007/S10458-012-9209-6 |
0.411 |
|
2013 |
Yang R, Kiekintveld C, Ordóñez F, Tambe M, John R. Improving resource allocation strategies against human adversaries in security games: An extended study Artificial Intelligence. 195: 440-469. DOI: 10.1016/J.Artint.2012.11.004 |
0.433 |
|
2012 |
Yin Z, Jiang AX, Tambe M, Kiekintveld C, Leyton-Brown K, Sandholm T, Sullivan JP. TRUSTS: Scheduling randomized patrols for fare inspection in transit systems using game theory Ai Magazine. 33: 59-72. DOI: 10.1609/Aimag.V33I4.2432 |
0.366 |
|
2012 |
Agmon N, Agrawal V, Aha DW, Aloimonos Y, Buckley D, Doshi P, Geib C, Grasso F, Green N, Johnston B, Kaliski B, Kiekintveld C, Law E, Lieberman H, Mengshoel OJ, et al. Reports of the AAAI 2011 conference workshops Ai Magazine. 33: 57-70. DOI: 10.1609/Aimag.V33I1.2390 |
0.32 |
|
2011 |
Korzhyk D, Yin Z, Kiekintveld C, Conitzer V, Tambe M. Stackelberg vs. nash in security games: An extended investigation of interchangeability, equivalence, and uniqueness Journal of Artificial Intelligence Research. 41: 297-327. DOI: 10.1613/Jair.3269 |
0.469 |
|
2011 |
An B, Pita J, Shieh E, Tambe M, Kiekintveld C, Marecki J. GUARDS and PROTECT: next generation applications of security games Sigecom Exchanges. 10: 31-34. DOI: 10.1145/1978721.1978729 |
0.354 |
|
2010 |
Jain M, Tsai J, Pita J, Kiekintveld C, Rathi S, Tambe M, Ordóñez F. Software assistants for randomized patrol planning for the lax airport police and the Federal Air Marshal Service Interfaces. 40: 267-290. DOI: 10.1287/Inte.1100.0505 |
0.374 |
|
2009 |
Pita J, Bellamane H, Jain M, Kiekintveld C, Tsai J, Ordóñez F, Tambe M. Security applications: lessons of real-world deployment Sigecom Exchanges. 8: 5. DOI: 10.1145/1980522.1980527 |
0.331 |
|
2007 |
Kiekintveld C, Miller J, Jordan PR, Wellman MP. Forecasting market prices in a supply chain game Proceedings of the International Conference On Autonomous Agents. 1323-1330. DOI: 10.1016/J.Elerap.2008.11.005 |
0.482 |
|
2004 |
Kiekintveld C, Wellman MP, Singh S, Soni V. Value-driven procurement in the TAC supply chain game Acm Sigecom Exchanges. 4: 9-18. DOI: 10.1145/1120701.1120704 |
0.594 |
|
Show low-probability matches. |