1. Tambe, M. (2011). Security and Game Theory: Algorithms, Deployed Systems, Lessons Learned, Cambridge University Press.
2. Yang, R., Kiekintveld, C., Ordonez, F., Tambe, M., and John, R. (2011, January 16–22). Improving resource allocation strategy against human adversaries in security games. Proceedings of the Twenty-Second International Joint Conference on Artificial Intelligence, Barcelona, Spain.
3. Nguyen, T.H., Yang, R., Azaria, A., Kraus, S., and Tambe, M. (2013, January 41–18). Analyzing the effectiveness of adversary modeling in security games. Proceedings of the AAAI Conference on Artificial Intelligence, Bellevue, WA, USA.
4. Nguyen, T.H., Vu, N., Yadav, A., and Nguyen, U. (September, January 29). Decoding the Imitation Security Game: Handling Attacker Imitative Behavior Deception. Proceedings of the 24th European Conference on Artificial Intelligence, Compostela, Spain.
5. Gholami, S., Yadav, A., Tran-Thanh, L., Dilkina, B., and Tambe, M. (2019, January 13–17). Do not Put All Your Strategies in One Basket: Playing Green Security Games with Imperfect Prior Knowledge. Proceedings of the 18th International Conference on Autonomous Agents and Multiagent Systems, Montreal, QC, Canada.