2015
DOI: 10.1007/978-3-319-19369-4_36
|View full text |Cite
|
Sign up to set email alerts
|

A New Approach to Security Games

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
6
2
1

Relationship

4
5

Authors

Journals

citations
Cited by 11 publications
(9 citation statements)
references
References 10 publications
0
9
0
Order By: Relevance
“…(1) and (2). It is interesting to note that a variety of scenarios in operations research, logistics, transportation research, science, economics, security games, complex engineering design, etc., can in fact be posed (or naturally occur) in the form of BLOPs [1,2,17,18,20,21,30,31,34].…”
Section: Introductionmentioning
confidence: 99%
“…(1) and (2). It is interesting to note that a variety of scenarios in operations research, logistics, transportation research, science, economics, security games, complex engineering design, etc., can in fact be posed (or naturally occur) in the form of BLOPs [1,2,17,18,20,21,30,31,34].…”
Section: Introductionmentioning
confidence: 99%
“…To the best of our knowledge there is only one other approach that utilizes MCTS method to solve general-sum extensive-form SGs (Karwowski and Mańdziuk 2015;2019a) which, however, adopts a different protocol and relies on iterative adjustment of the Leader's strategy by means of direct MCTS sampling against gradually changing Follower's strategy. This method, though, could not be applied to solve games with complex information set (IS) structures, e.g.…”
Section: Contributionmentioning
confidence: 99%
“…Their existence allowed project managers, consultants and the teams themselves with identifying their working style, utilizing their strengths and avoiding their weaknesses in a day-to-day work. Simulation information technology tools have been applied to various aspects of project management like team management [23], project plan construction [28] and building strategies for responses to security threats [15,16]. Also, a general purpose multi-agent frameworks have been developed in order to design systems for modelling human behaviour [27].…”
Section: Introductionmentioning
confidence: 99%