From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Multi-objective optimization for security games., , , , и . AAMAS, стр. 863-870. IFAAMAS, (2012)An extended study on multi-objective security games., , , , и . Auton. Agents Multi Agent Syst., 28 (1): 31-71 (2014)Value-driven procurement in the TAC supply chain game., , , и . SIGecom Exch., 4 (3): 9-18 (2004)Software Assistants for Randomized Patrol Planning for the LAX Airport Police and the Federal Air Marshal Service., , , , , , и . Interfaces, 40 (4): 267-290 (2010)Local Context Normalization: Revisiting Local Normalization., , , , , , и . CoRR, (2019)Protecting the NECTAR of the Ganga River Through Game-Theoretic Factory Inspections., , , , , , , и . PAAMS, том 9662 из Lecture Notes in Computer Science, стр. 97-108. Springer, (2016)Adapting Honeypot Configurations to Detect Evolving Exploits., и . AAAI Workshops, том WS-17 из AAAI Technical Report, AAAI Press, (2017)Towards the Integration of Multi-Attribute Optimization and Game Theory for Border Security Patrolling Strategies., , , , , и . Applied Adversarial Reasoning and Risk Modeling, том WS-11-06 из AAAI Technical Report, AAAI, (2011)Bandits for Cybersecurity: Adaptive Intrusion Detection Using Honeypots., и . AAAI Workshop: Artificial Intelligence for Cyber Security, том WS-16-03 из AAAI Technical Report, AAAI Press, (2016)978-1-57735-759-9.Integrated Learning and Feature Selection for Deep Neural Networks in Multispectral Images., , , , , и . CVPR Workshops, стр. 1196-1205. Computer Vision Foundation / IEEE Computer Society, (2018)