Author:
Li Xueting,Yi Sha,Sycara Katia
Publisher
Springer International Publishing
Reference21 articles.
1. Brown, N., Sandholm, T.: Superhuman AI for multiplayer poker. Science 365(6456), 885–890 (2019)
2. Carroll, T.E., Grosu, D.: A game theoretic investigation of deception in network security. Secur. Commun. Netw. 4(10), 1162–1172 (2011)
3. Chaslot, G., Bakkes, S., Szita, I., Spronck, P.: Monte-Carlo tree search: a new framework for game AI. In: AIIDE (2008)
4. Deng, Z., Kong, Z.: Multi-agent cooperative pursuit-defense strategy against one single attacker. IEEE Robot. Autom. Lett. 5(4), 5772–5778 (2020)
5. Durkota, K., Lisỳ, V., Bošanskỳ, B., Kiekintveld, C.: Optimal network security hardening using attack graph games. In: Twenty-Fourth International Joint Conference on Artificial Intelligence (2015)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献