Author of the publication

Game-theoretic resource allocation for malicious packet detection in computer networks.

, , , , , and . AAMAS, page 905-912. IFAAMAS, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Game-theoretic resource allocation for malicious packet detection in computer networks., , , , , and . AAMAS, page 905-912. IFAAMAS, (2012)AgentC: agent-based system for securing maritime transit., , , , and . AAMAS, page 1309-1310. IFAAMAS, (2011)Extending Security Games to Defenders with Constrained Mobility., , , , and . AAAI Spring Symposium: Game Theory for Security, Sustainability, and Health, volume SS-12-03 of AAAI Technical Report, AAAI, (2012)Agents vs. pirates: multi-agent simulation and optimization to fight maritime piracy., , , and . AAMAS, page 37-44. IFAAMAS, (2012)A double oracle algorithm for zero-sum security games on graphs., , , , , and . AAMAS, page 327-334. IFAAMAS, (2011)Iterative game-theoretic route selection for hostile area transit and patrolling., , , , and . AAMAS, page 1273-1274. IFAAMAS, (2011)Security games with mobile patrollers.. AAMAS, page 1371-1372. IFAAMAS, (2011)AgentC: agent-based testbed for adversarial modeling and reasoning in the maritime domain., , , , and . AAMAS, page 1641-1642. IFAAMAS, (2010)Using Agents to Improve International Maritime Transport Security., , and . IEEE Intell. Syst., 26 (1): 90-96 (2011)Transiting areas patrolled by a mobile adversary., , , and . CIG, page 9-16. IEEE, (2010)