BibTeX records: Christopher Kiekintveld

download as .bib file

@article{DBLP:journals/corr/abs-2402-17045,
  author       = {Tosin Ige and
                  Christopher Kiekintveld and
                  Aritran Piplai},
  title        = {An Investigation into the Performances of the State-of-the-art Machine
                  Learning Approaches for Various Cyber-attack Detection: {A} Survey},
  journal      = {CoRR},
  volume       = {abs/2402.17045},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.17045},
  doi          = {10.48550/ARXIV.2402.17045},
  eprinttype    = {arXiv},
  eprint       = {2402.17045},
  timestamp    = {Mon, 25 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-17045.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-17249,
  author       = {Tosin Ige and
                  Christopher Kiekintveld and
                  Aritran Piplai},
  title        = {Deep Learning-Based Speech and Vision Synthesis to Improve Phishing
                  Attack Detection through a Multi-layer Adaptive Framework},
  journal      = {CoRR},
  volume       = {abs/2402.17249},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.17249},
  doi          = {10.48550/ARXIV.2402.17249},
  eprinttype    = {arXiv},
  eprint       = {2402.17249},
  timestamp    = {Mon, 25 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-17249.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ai/HorakBKK23,
  author       = {Karel Hor{\'{a}}k and
                  Branislav Bosansk{\'{y}} and
                  Vojtech Kovar{\'{\i}}k and
                  Christopher Kiekintveld},
  title        = {Solving zero-sum one-sided partially observable stochastic games},
  journal      = {Artif. Intell.},
  volume       = {316},
  pages        = {103838},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.artint.2022.103838},
  doi          = {10.1016/J.ARTINT.2022.103838},
  timestamp    = {Tue, 19 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ai/HorakBKK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/RoySAKL23,
  author       = {Shanto Roy and
                  Nazia Sharmin and
                  Jaime C. Acosta and
                  Christopher Kiekintveld and
                  Aron Laszka},
  title        = {Survey and Taxonomy of Adversarial Reconnaissance Techniques},
  journal      = {{ACM} Comput. Surv.},
  volume       = {55},
  number       = {6},
  pages        = {112:1--112:38},
  year         = {2023},
  url          = {https://doi.org/10.1145/3538704},
  doi          = {10.1145/3538704},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/RoySAKL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aibthings/IgeK23,
  author       = {Tosin Ige and
                  Christopher Kiekintveld},
  title        = {Performance Comparison and Implementation of Bayesian Variants for
                  Network Intrusion Detection},
  booktitle    = {{IEEE} International Conference on Artificial Intelligence, Blockchain,
                  and Internet of Things, AIBThings 2023, Mount Pleasant, MI, USA, September
                  16-17, 2023},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/AIBThings58340.2023.10292485},
  doi          = {10.1109/AIBTHINGS58340.2023.10292485},
  timestamp    = {Thu, 16 Nov 2023 16:28:41 +0100},
  biburl       = {https://dblp.org/rec/conf/aibthings/IgeK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/SharminAK23,
  author       = {Nazia Sharmin and
                  Jaime C. Acosta and
                  Christopher Kiekintveld},
  title        = {A Systematic Approach for Temporal Traffic Selection Across Various
                  Applications},
  booktitle    = {32nd International Conference on Computer Communications and Networks,
                  {ICCCN} 2023, Honolulu, HI, USA, July 24-27, 2023},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICCCN58024.2023.10230120},
  doi          = {10.1109/ICCCN58024.2023.10230120},
  timestamp    = {Wed, 13 Sep 2023 08:43:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icccn/SharminAK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iotsms/SharminK23,
  author       = {Nazia Sharmin and
                  Christopher Kiekintveld},
  editor       = {Muhannad Quwaider and
                  Yaser Jararweh},
  title        = {Enhancing IoT Device Security: Predicting and Analyzing Reconnaissance
                  Attacks Using Flags and Time-Based Attributes},
  booktitle    = {10th International Conference on Internet of Things: Systems, Management
                  and Security, {IOTSMS} 2023, San Antonio, TX, USA, October 23-25,
                  2023},
  pages        = {23--30},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/IOTSMS59855.2023.10325811},
  doi          = {10.1109/IOTSMS59855.2023.10325811},
  timestamp    = {Sat, 09 Dec 2023 09:49:48 +0100},
  biburl       = {https://dblp.org/rec/conf/iotsms/SharminK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secon/SharminK23,
  author       = {Nazia Sharmin and
                  Christopher Kiekintveld},
  title        = {Optimizing Crop Recommendations for Sustainable Agriculture: Leveraging
                  Bayesian Networks in a Smart Crop Recommendation System},
  booktitle    = {20th Annual {IEEE} International Conference on Sensing, Communication,
                  and Networking, {SECON} 2023, Madrid, Spain, September 11-14, 2023},
  pages        = {20--26},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SECON58729.2023.10287510},
  doi          = {10.1109/SECON58729.2023.10287510},
  timestamp    = {Mon, 06 Nov 2023 17:21:38 +0100},
  biburl       = {https://dblp.org/rec/conf/secon/SharminK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/syscon/SharminRLAK23,
  author       = {Nazia Sharmin and
                  Shanto Roy and
                  Aron Laszka and
                  Jaime C. Acosta and
                  Christopher Kiekintveld},
  title        = {Bayesian Models for Node-Based Inference Techniques},
  booktitle    = {{IEEE} International Systems Conference, SysCon 2023, Vancouver, BC,
                  Canada, April 17-20, 2023},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SysCon53073.2023.10131168},
  doi          = {10.1109/SYSCON53073.2023.10131168},
  timestamp    = {Fri, 09 Jun 2023 15:18:18 +0200},
  biburl       = {https://dblp.org/rec/conf/syscon/SharminRLAK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-06769,
  author       = {Shanto Roy and
                  Nazia Sharmin and
                  Mohammad Sujan Miah and
                  Jaime C. Acosta and
                  Christopher Kiekintveld and
                  Aron Laszka},
  title        = {Adversarial Reconnaissance Mitigation and Modeling},
  journal      = {CoRR},
  volume       = {abs/2306.06769},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.06769},
  doi          = {10.48550/ARXIV.2306.06769},
  eprinttype    = {arXiv},
  eprint       = {2306.06769},
  timestamp    = {Fri, 16 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-06769.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2307-13107,
  author       = {Md. Abu Sayed and
                  Ahmed H. Anwar and
                  Christopher Kiekintveld and
                  Branislav Bosansk{\'{y}} and
                  Charles A. Kamhoua},
  title        = {Cyber Deception against Zero-day Attacks: {A} Game Theoretic Approach},
  journal      = {CoRR},
  volume       = {abs/2307.13107},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2307.13107},
  doi          = {10.48550/ARXIV.2307.13107},
  eprinttype    = {arXiv},
  eprint       = {2307.13107},
  timestamp    = {Tue, 01 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2307-13107.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2308-11817,
  author       = {Md. Abu Sayed and
                  Ahmed H. Anwar and
                  Christopher Kiekintveld and
                  Charles A. Kamhoua},
  title        = {Honeypot Allocation for Cyber Deception in Dynamic Tactical Networks:
                  {A} Game Theoretic Approach},
  journal      = {CoRR},
  volume       = {abs/2308.11817},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2308.11817},
  doi          = {10.48550/ARXIV.2308.11817},
  eprinttype    = {arXiv},
  eprint       = {2308.11817},
  timestamp    = {Wed, 30 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2308-11817.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2308-11834,
  author       = {Tosin Ige and
                  Christopher Kiekintveld},
  title        = {Performance Comparison and Implementation of Bayesian Variants for
                  Network Intrusion Detection},
  journal      = {CoRR},
  volume       = {abs/2308.11834},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2308.11834},
  doi          = {10.48550/ARXIV.2308.11834},
  eprinttype    = {arXiv},
  eprint       = {2308.11834},
  timestamp    = {Wed, 30 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2308-11834.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2311-16781,
  author       = {David Milec and
                  Viliam Lis{\'{y}} and
                  Christopher Kiekintveld},
  title        = {Generation of Games for Opponent Model Differentiation},
  journal      = {CoRR},
  volume       = {abs/2311.16781},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2311.16781},
  doi          = {10.48550/ARXIV.2311.16781},
  eprinttype    = {arXiv},
  eprint       = {2311.16781},
  timestamp    = {Mon, 04 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2311-16781.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/AnwarKLK22,
  author       = {Ahmed H. Anwar and
                  Charles A. Kamhoua and
                  Nandi O. Leslie and
                  Christopher Kiekintveld},
  title        = {Honeypot Allocation for Cyber Deception Under Uncertainty},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {19},
  number       = {3},
  pages        = {3438--3452},
  year         = {2022},
  url          = {https://doi.org/10.1109/TNSM.2022.3179965},
  doi          = {10.1109/TNSM.2022.3179965},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnsm/AnwarKLK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/SayedAKBK22,
  author       = {Md. Abu Sayed and
                  Ahmed H. Anwar and
                  Christopher Kiekintveld and
                  Branislav Bosansk{\'{y}} and
                  Charles A. Kamhoua},
  editor       = {Fei Fang and
                  Haifeng Xu and
                  Yezekael Hayel},
  title        = {Cyber Deception Against Zero-Day Attacks: {A} Game Theoretic Approach},
  booktitle    = {Decision and Game Theory for Security - 13th International Conference,
                  GameSec 2022, Pittsburgh, PA, USA, October 26-28, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13727},
  pages        = {44--63},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-26369-9\_3},
  doi          = {10.1007/978-3-031-26369-9\_3},
  timestamp    = {Wed, 07 Feb 2024 17:23:12 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/SayedAKBK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chb/JonesPCK21,
  author       = {Daniel Jones and
                  Edgar Padilla and
                  Shelby R. Curtis and
                  Christopher Kiekintveld},
  title        = {Network discovery and scanning strategies and the Dark Triad},
  journal      = {Comput. Hum. Behav.},
  volume       = {122},
  pages        = {106799},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.chb.2021.106799},
  doi          = {10.1016/J.CHB.2021.106799},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chb/JonesPCK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/AcostaBKK21,
  author       = {Jaime C. Acosta and
                  Anjon Basak and
                  Christopher Kiekintveld and
                  Charles A. Kamhoua},
  editor       = {Pavel Gladyshev and
                  Sanjay Goel and
                  Joshua James and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Lightweight On-Demand Honeypot Deployment for Cyber Deception},
  booktitle    = {Digital Forensics and Cyber Crime - 12th {EAI} International Conference,
                  {ICDF2C} 2021, Virtual Event, Singapore, December 6-9, 2021, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {441},
  pages        = {294--312},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-06365-7\_18},
  doi          = {10.1007/978-3-031-06365-7\_18},
  timestamp    = {Fri, 19 Apr 2024 14:54:06 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/AcostaBKK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-04749,
  author       = {Shanto Roy and
                  Nazia Sharmin and
                  Jaime C. Acosta and
                  Christopher Kiekintveld and
                  Aron Laszka},
  title        = {Survey and Taxonomy of Adversarial Reconnaissance Techniques},
  journal      = {CoRR},
  volume       = {abs/2105.04749},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.04749},
  eprinttype    = {arXiv},
  eprint       = {2105.04749},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-04749.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cvpr/OrtizRMFKHJ20,
  author       = {Anthony Ortiz and
                  Caleb Robinson and
                  Dan Morris and
                  Olac Fuentes and
                  Christopher Kiekintveld and
                  Md Mahmudulla Hassan and
                  Nebojsa Jojic},
  title        = {Local Context Normalization: Revisiting Local Normalization},
  booktitle    = {2020 {IEEE/CVF} Conference on Computer Vision and Pattern Recognition,
                  {CVPR} 2020, Seattle, WA, USA, June 13-19, 2020},
  pages        = {11273--11282},
  publisher    = {Computer Vision Foundation / {IEEE}},
  year         = {2020},
  url          = {https://openaccess.thecvf.com/content\_CVPR\_2020/html/Ortiz\_Local\_Context\_Normalization\_Revisiting\_Local\_Normalization\_CVPR\_2020\_paper.html},
  doi          = {10.1109/CVPR42600.2020.01129},
  timestamp    = {Wed, 01 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cvpr/OrtizRMFKHJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/GranadosMOK20,
  author       = {Alonso Granados and
                  Mohammad Sujan Miah and
                  Anthony Ortiz and
                  Christopher Kiekintveld},
  editor       = {Quanyan Zhu and
                  John S. Baras and
                  Radha Poovendran and
                  Juntao Chen},
  title        = {A Realistic Approach for Network Traffic Obfuscation Using Adversarial
                  Machine Learning},
  booktitle    = {Decision and Game Theory for Security - 11th International Conference,
                  GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12513},
  pages        = {45--57},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64793-3\_3},
  doi          = {10.1007/978-3-030-64793-3\_3},
  timestamp    = {Tue, 05 Jan 2021 16:25:03 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/GranadosMOK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/AnwarLKK20,
  author       = {Ahmed H. Anwar and
                  Nandi O. Leslie and
                  Charles A. Kamhoua and
                  Christopher Kiekintveld},
  editor       = {Quanyan Zhu and
                  John S. Baras and
                  Radha Poovendran and
                  Juntao Chen},
  title        = {A Game Theoretic Framework for Software Diversity for Network Security},
  booktitle    = {Decision and Game Theory for Security - 11th International Conference,
                  GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12513},
  pages        = {297--311},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64793-3\_16},
  doi          = {10.1007/978-3-030-64793-3\_16},
  timestamp    = {Sat, 09 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/AnwarLKK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/MiahGVTK20,
  author       = {Mohammad Sujan Miah and
                  Marcus Gutierrez and
                  Oscar Veliz and
                  Omkar Thakoor and
                  Christopher Kiekintveld},
  title        = {Concealing Cyber-Decoys using Two-Sided Feature Deception Games},
  booktitle    = {53rd Hawaii International Conference on System Sciences, {HICSS} 2020,
                  Maui, Hawaii, USA, January 7-10, 2020},
  pages        = {1--10},
  publisher    = {ScholarSpace},
  year         = {2020},
  url          = {https://hdl.handle.net/10125/63974},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hicss/MiahGVTK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/PadillaAK20,
  author       = {Edgar Padilla and
                  Jaime C. Acosta and
                  Christopher D. Kiekintveld},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Daryl Johnson and
                  Makan Pourzandi and
                  Suryadipta Majumdar},
  title        = {Cybersecurity Methodology for Specialized Behavior Analysis},
  booktitle    = {Digital Forensics and Cyber Crime - 11th {EAI} International Conference,
                  {ICDF2C} 2020, Boston, MA, USA, October 15-16, 2020, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {351},
  pages        = {237--243},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-68734-2\_14},
  doi          = {10.1007/978-3-030-68734-2\_14},
  timestamp    = {Fri, 19 Apr 2024 15:03:30 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/PadillaAK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/Kiekintveld20,
  author       = {Christopher Kiekintveld},
  editor       = {Christian Riess and
                  Franziska Schirrmacher and
                  Irene Amerini and
                  Paolo Bestagini and
                  Tom{\'{a}}s Pevn{\'{y}}},
  title        = {Game-Theoretic Perspectives and Algorithms for Cybersecurity},
  booktitle    = {IH{\&}MMSec '20: {ACM} Workshop on Information Hiding and Multimedia
                  Security, Denver, CO, USA, June 22-24, 2020},
  pages        = {3},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3369412.3396883},
  doi          = {10.1145/3369412.3396883},
  timestamp    = {Mon, 06 Jul 2020 09:55:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/Kiekintveld20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/AcostaBKLK20,
  author       = {Jaime C. Acosta and
                  Anjon Basak and
                  Christopher Kiekintveld and
                  Nandi Leslie and
                  Charles A. Kamhoua},
  title        = {Cybersecurity Deception Experimentation System},
  booktitle    = {{IEEE} Secure Development, SecDev 2020, Atlanta, GA, USA, September
                  28-30, 2020},
  pages        = {34--40},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SecDev45635.2020.00022},
  doi          = {10.1109/SECDEV45635.2020.00022},
  timestamp    = {Wed, 28 Oct 2020 10:41:43 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/AcostaBKLK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/20/GutierrezK20,
  author       = {Marcus Gutierrez and
                  Christopher Kiekintveld},
  editor       = {Sushil Jajodia and
                  George Cybenko and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang and
                  Michael P. Wellman},
  title        = {Online Learning Methods for Controlling Dynamic Cyber Deception Strategies},
  booktitle    = {Adaptive Autonomous Secure Cyber Systems},
  pages        = {231--251},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-33432-1\_11},
  doi          = {10.1007/978-3-030-33432-1\_11},
  timestamp    = {Mon, 03 Jan 2022 21:52:41 +0100},
  biburl       = {https://dblp.org/rec/books/sp/20/GutierrezK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2002-09069,
  author       = {Iffat Anjum and
                  Mohammad Sujan Miah and
                  Mu Zhu and
                  Nazia Sharmin and
                  Christopher Kiekintveld and
                  William Enck and
                  Munindar P. Singh},
  title        = {Optimizing Vulnerability-Driven Honey Traffic Using Game Theory},
  journal      = {CoRR},
  volume       = {abs/2002.09069},
  year         = {2020},
  url          = {https://arxiv.org/abs/2002.09069},
  eprinttype    = {arXiv},
  eprint       = {2002.09069},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2002-09069.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-11243,
  author       = {Karel Hor{\'{a}}k and
                  Branislav Bosansk{\'{y}} and
                  Vojtech Kovar{\'{\i}}k and
                  Christopher Kiekintveld},
  title        = {Solving Zero-Sum One-Sided Partially Observable Stochastic Games},
  journal      = {CoRR},
  volume       = {abs/2010.11243},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.11243},
  eprinttype    = {arXiv},
  eprint       = {2010.11243},
  timestamp    = {Tue, 19 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-11243.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DurkotaLBKP19,
  author       = {Karel Durkota and
                  Viliam Lis{\'{y}} and
                  Branislav Bosansk{\'{y}} and
                  Christopher Kiekintveld and
                  Michal Pechoucek},
  title        = {Hardening networks against strategic attackers using attack graph
                  games},
  journal      = {Comput. Secur.},
  volume       = {87},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.cose.2019.101578},
  doi          = {10.1016/J.COSE.2019.101578},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DurkotaLBKP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HorakBTKK19,
  author       = {Karel Hor{\'{a}}k and
                  Branislav Bosansk{\'{y}} and
                  Petr Tom{\'{a}}sek and
                  Christopher Kiekintveld and
                  Charles A. Kamhoua},
  title        = {Optimizing honeypot strategies against dynamic lateral movement using
                  partially observable stochastic games},
  journal      = {Comput. Secur.},
  volume       = {87},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.cose.2019.101579},
  doi          = {10.1016/J.COSE.2019.101579},
  timestamp    = {Tue, 19 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/HorakBTKK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atal/ThakoorTVXK19,
  author       = {Omkar Thakoor and
                  Milind Tambe and
                  Phebe Vayanos and
                  Haifeng Xu and
                  Christopher Kiekintveld},
  editor       = {Edith Elkind and
                  Manuela Veloso and
                  Noa Agmon and
                  Matthew E. Taylor},
  title        = {General-Sum Cyber Deception Games under Partial Attacker Valuation
                  Information},
  booktitle    = {Proceedings of the 18th International Conference on Autonomous Agents
                  and MultiAgent Systems, {AAMAS} '19, Montreal, QC, Canada, May 13-17,
                  2019},
  pages        = {2215--2217},
  publisher    = {International Foundation for Autonomous Agents and Multiagent Systems},
  year         = {2019},
  url          = {http://dl.acm.org/citation.cfm?id=3332062},
  timestamp    = {Wed, 29 May 2019 16:36:58 +0200},
  biburl       = {https://dblp.org/rec/conf/atal/ThakoorTVXK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cogsci/GutierrezCBABKG19,
  author       = {Marcus Gutierrez and
                  Jakub Cern{\'{y}} and
                  Noam Ben{-}Asher and
                  Efrat Aharonov{-}Majar and
                  Branislav Bosansk{\'{y}} and
                  Christopher Kiekintveld and
                  Cleotilde Gonzalez},
  editor       = {Ashok K. Goel and
                  Colleen M. Seifert and
                  Christian Freksa},
  title        = {Evaluating Models of Human Behavior in an Adversarial Multi-Armed
                  Bandit Problem},
  booktitle    = {Proceedings of the 41th Annual Meeting of the Cognitive Science Society,
                  CogSci 2019: Creativity + Cognition + Computation, Montreal, Canada,
                  July 24-27, 2019},
  pages        = {394--400},
  publisher    = {cognitivesciencesociety.org},
  year         = {2019},
  url          = {https://mindmodeling.org/cogsci2019/papers/0088/index.html},
  timestamp    = {Wed, 17 Apr 2024 12:43:09 +0200},
  biburl       = {https://dblp.org/rec/conf/cogsci/GutierrezCBABKG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/BasakKVGAK19,
  author       = {Anjon Basak and
                  Charles A. Kamhoua and
                  Sridhar Venkatesan and
                  Marcus Gutierrez and
                  Ahmed H. Anwar and
                  Christopher Kiekintveld},
  editor       = {Tansu Alpcan and
                  Yevgeniy Vorobeychik and
                  John S. Baras and
                  Gy{\"{o}}rgy D{\'{a}}n},
  title        = {Identifying Stealthy Attackers in a Game Theoretic Framework Using
                  Deception},
  booktitle    = {Decision and Game Theory for Security - 10th International Conference,
                  GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11836},
  pages        = {21--32},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32430-8\_2},
  doi          = {10.1007/978-3-030-32430-8\_2},
  timestamp    = {Wed, 23 Oct 2019 12:50:25 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/BasakKVGAK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/ThakoorTVXKF19,
  author       = {Omkar Thakoor and
                  Milind Tambe and
                  Phebe Vayanos and
                  Haifeng Xu and
                  Christopher Kiekintveld and
                  Fei Fang},
  editor       = {Tansu Alpcan and
                  Yevgeniy Vorobeychik and
                  John S. Baras and
                  Gy{\"{o}}rgy D{\'{a}}n},
  title        = {Cyber Camouflage Games for Strategic Deception},
  booktitle    = {Decision and Game Theory for Security - 10th International Conference,
                  GameSec 2019, Stockholm, Sweden, October 30 - November 1, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11836},
  pages        = {525--541},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32430-8\_31},
  doi          = {10.1007/978-3-030-32430-8\_31},
  timestamp    = {Wed, 07 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/ThakoorTVXKF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/HorakBKK19,
  author       = {Karel Hor{\'{a}}k and
                  Branislav Bosansk{\'{y}} and
                  Christopher Kiekintveld and
                  Charles A. Kamhoua},
  editor       = {Sarit Kraus},
  title        = {Compact Representation of Value Function in Partially Observable Stochastic
                  Games},
  booktitle    = {Proceedings of the Twenty-Eighth International Joint Conference on
                  Artificial Intelligence, {IJCAI} 2019, Macao, China, August 10-16,
                  2019},
  pages        = {350--356},
  publisher    = {ijcai.org},
  year         = {2019},
  url          = {https://doi.org/10.24963/ijcai.2019/50},
  doi          = {10.24963/IJCAI.2019/50},
  timestamp    = {Tue, 19 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ijcai/HorakBKK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1903-05511,
  author       = {Karel Hor{\'{a}}k and
                  Branislav Bosansk{\'{y}} and
                  Christopher Kiekintveld and
                  Charles A. Kamhoua},
  title        = {Compact Representation of Value Function in Partially Observable Stochastic
                  Games},
  journal      = {CoRR},
  volume       = {abs/1903.05511},
  year         = {2019},
  url          = {http://arxiv.org/abs/1903.05511},
  eprinttype    = {arXiv},
  eprint       = {1903.05511},
  timestamp    = {Tue, 19 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1903-05511.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1912-05845,
  author       = {Anthony Ortiz and
                  Caleb Robinson and
                  Dan Morris and
                  Olac Fuentes and
                  Christopher Kiekintveld and
                  Mahmudulla Hassan and
                  Nebojsa Jojic},
  title        = {Local Context Normalization: Revisiting Local Normalization},
  journal      = {CoRR},
  volume       = {abs/1912.05845},
  year         = {2019},
  url          = {http://arxiv.org/abs/1912.05845},
  eprinttype    = {arXiv},
  eprint       = {1912.05845},
  timestamp    = {Wed, 01 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1912-05845.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atal/ChowdhuryKS018,
  author       = {Moinul Morshed Porag Chowdhury and
                  Christopher Kiekintveld and
                  Tran Cao Son and
                  William Yeoh},
  editor       = {Elisabeth Andr{\'{e}} and
                  Sven Koenig and
                  Mehdi Dastani and
                  Gita Sukthankar},
  title        = {Bidding Strategy for Periodic Double Auctions Using Monte Carlo Tree
                  Search},
  booktitle    = {Proceedings of the 17th International Conference on Autonomous Agents
                  and MultiAgent Systems, {AAMAS} 2018, Stockholm, Sweden, July 10-15,
                  2018},
  pages        = {1897--1899},
  publisher    = {International Foundation for Autonomous Agents and Multiagent Systems
                  Richland, SC, {USA} / {ACM}},
  year         = {2018},
  url          = {http://dl.acm.org/citation.cfm?id=3238016},
  timestamp    = {Sat, 30 Sep 2023 09:34:53 +0200},
  biburl       = {https://dblp.org/rec/conf/atal/ChowdhuryKS018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cvpr/OrtizGFKRB18,
  author       = {Anthony Ortiz and
                  Alonso Granados and
                  Olac Fuentes and
                  Christopher Kiekintveld and
                  Dalton S. Rosario and
                  Zachary Bell},
  title        = {Integrated Learning and Feature Selection for Deep Neural Networks
                  in Multispectral Images},
  booktitle    = {2018 {IEEE} Conference on Computer Vision and Pattern Recognition
                  Workshops, {CVPR} Workshops 2018, Salt Lake City, UT, USA, June 18-22,
                  2018},
  pages        = {1196--1205},
  publisher    = {Computer Vision Foundation / {IEEE} Computer Society},
  year         = {2018},
  url          = {http://openaccess.thecvf.com/content\_cvpr\_2018\_workshops/w21/html/Ortiz\_Integrated\_Learning\_and\_CVPR\_2018\_paper.html},
  doi          = {10.1109/CVPRW.2018.00165},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cvpr/OrtizGFKRB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/BasakGK18,
  author       = {Anjon Basak and
                  Marcus Gutierrez and
                  Christopher Kiekintveld},
  editor       = {Linda Bushnell and
                  Radha Poovendran and
                  Tamer Basar},
  title        = {Algorithms for Subgame Abstraction with Applications to Cyber Defense},
  booktitle    = {Decision and Game Theory for Security - 9th International Conference,
                  GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11199},
  pages        = {556--568},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01554-1\_32},
  doi          = {10.1007/978-3-030-01554-1\_32},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/BasakGK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/BasakCGCKJBK18,
  author       = {Anjon Basak and
                  Jakub Cern{\'{y}} and
                  Marcus Gutierrez and
                  Shelby R. Curtis and
                  Charles A. Kamhoua and
                  Daniel Jones and
                  Branislav Bosansk{\'{y}} and
                  Christopher Kiekintveld},
  editor       = {Linda Bushnell and
                  Radha Poovendran and
                  Tamer Basar},
  title        = {An Initial Study of Targeted Personality Models in the FlipIt Game},
  booktitle    = {Decision and Game Theory for Security - 9th International Conference,
                  GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11199},
  pages        = {623--636},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01554-1\_36},
  doi          = {10.1007/978-3-030-01554-1\_36},
  timestamp    = {Fri, 05 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/BasakCGCKJBK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/ChowdhuryKT018,
  author       = {Moinul Morshed Porag Chowdhury and
                  Christopher Kiekintveld and
                  Son Tran and
                  William Yeoh},
  editor       = {J{\'{e}}r{\^{o}}me Lang},
  title        = {Bidding in Periodic Double Auctions Using Heuristics and Dynamic Monte
                  Carlo Tree Search},
  booktitle    = {Proceedings of the Twenty-Seventh International Joint Conference on
                  Artificial Intelligence, {IJCAI} 2018, July 13-19, 2018, Stockholm,
                  Sweden},
  pages        = {166--172},
  publisher    = {ijcai.org},
  year         = {2018},
  url          = {https://doi.org/10.24963/ijcai.2018/23},
  doi          = {10.24963/IJCAI.2018/23},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ijcai/ChowdhuryKT018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/SinhaFAKT18,
  author       = {Arunesh Sinha and
                  Fei Fang and
                  Bo An and
                  Christopher Kiekintveld and
                  Milind Tambe},
  editor       = {J{\'{e}}r{\^{o}}me Lang},
  title        = {Stackelberg Security Games: Looking Beyond a Decade of Success},
  booktitle    = {Proceedings of the Twenty-Seventh International Joint Conference on
                  Artificial Intelligence, {IJCAI} 2018, July 13-19, 2018, Stockholm,
                  Sweden},
  pages        = {5494--5501},
  publisher    = {ijcai.org},
  year         = {2018},
  url          = {https://doi.org/10.24963/ijcai.2018/775},
  doi          = {10.24963/IJCAI.2018/775},
  timestamp    = {Wed, 07 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ijcai/SinhaFAKT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/OrtizFRK18,
  author       = {Anthony Ortiz and
                  Olac Fuentes and
                  Dalton S. Rosario and
                  Christopher Kiekintveld},
  title        = {On the Defense Against Adversarial Examples Beyond the Visible Spectrum},
  booktitle    = {2018 {IEEE} Military Communications Conference, {MILCOM} 2018, Los
                  Angeles, CA, USA, October 29-31, 2018},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/MILCOM.2018.8599763},
  doi          = {10.1109/MILCOM.2018.8599763},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/milcom/OrtizFRK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigecom/CernyBK18,
  author       = {Jakub Cern{\'{y}} and
                  Branislav Bosansk{\'{y}} and
                  Christopher Kiekintveld},
  editor       = {{\'{E}}va Tardos and
                  Edith Elkind and
                  Rakesh Vohra},
  title        = {Incremental Strategy Generation for Stackelberg Equilibria in Extensive-Form
                  Games},
  booktitle    = {Proceedings of the 2018 {ACM} Conference on Economics and Computation,
                  Ithaca, NY, USA, June 18-22, 2018},
  pages        = {151--168},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3219166.3219219},
  doi          = {10.1145/3219166.3219219},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigecom/CernyBK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/GuoABK17,
  author       = {Qingyu Guo and
                  Bo An and
                  Branislav Bosansk{\'{y}} and
                  Christopher Kiekintveld},
  title        = {Strategic Information Revelation and Commitment in Security Games},
  booktitle    = {The Workshops of the The Thirty-First {AAAI} Conference on Artificial
                  Intelligence, Saturday, February 4-9, 2017, San Francisco, California,
                  {USA}},
  series       = {{AAAI} Technical Report},
  volume       = {{WS-17}},
  publisher    = {{AAAI} Press},
  year         = {2017},
  url          = {http://aaai.org/ocs/index.php/WS/AAAIW17/paper/view/15104},
  timestamp    = {Mon, 04 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/GuoABK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/GutierrezK17,
  author       = {Marcus Paul Gutierrez and
                  Christopher Kiekintveld},
  title        = {Adapting Honeypot Configurations to Detect Evolving Exploits},
  booktitle    = {The Workshops of the The Thirty-First {AAAI} Conference on Artificial
                  Intelligence, Saturday, February 4-9, 2017, San Francisco, California,
                  {USA}},
  series       = {{AAAI} Technical Report},
  volume       = {{WS-17}},
  publisher    = {{AAAI} Press},
  year         = {2017},
  url          = {http://aaai.org/ocs/index.php/WS/AAAIW17/paper/view/15230},
  timestamp    = {Mon, 04 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/GutierrezK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atal/GutierrezK17,
  author       = {Marcus Gutierrez and
                  Christopher Kiekintveld},
  editor       = {Kate Larson and
                  Michael Winikoff and
                  Sanmay Das and
                  Edmund H. Durfee},
  title        = {Adapting with Honeypot Configurations to Detect Evolving Exploits},
  booktitle    = {Proceedings of the 16th Conference on Autonomous Agents and MultiAgent
                  Systems, {AAMAS} 2017, S{\~{a}}o Paulo, Brazil, May 8-12, 2017},
  pages        = {1565--1567},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {http://dl.acm.org/citation.cfm?id=3091363},
  timestamp    = {Wed, 27 Sep 2017 07:24:00 +0200},
  biburl       = {https://dblp.org/rec/conf/atal/GutierrezK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/DurkotaLKHBP17,
  author       = {Karel Durkota and
                  Viliam Lis{\'{y}} and
                  Christopher Kiekintveld and
                  Karel Hor{\'{a}}k and
                  Branislav Bosansk{\'{y}} and
                  Tom{\'{a}}s Pevn{\'{y}}},
  editor       = {Stefan Rass and
                  Bo An and
                  Christopher Kiekintveld and
                  Fei Fang and
                  Stefan Schauer},
  title        = {Optimal Strategies for Detecting Data Exfiltration by Internal and
                  External Attackers},
  booktitle    = {Decision and Game Theory for Security - 8th International Conference,
                  GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10575},
  pages        = {171--192},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68711-7\_10},
  doi          = {10.1007/978-3-319-68711-7\_10},
  timestamp    = {Tue, 19 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/DurkotaLKHBP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/SchlenkerXGKSTS17,
  author       = {Aaron Schlenker and
                  Haifeng Xu and
                  Mina Guirguis and
                  Christopher Kiekintveld and
                  Arunesh Sinha and
                  Milind Tambe and
                  Solomon Y. Sonya and
                  Darryl Balderas and
                  Noah Dunstatter},
  editor       = {Carles Sierra},
  title        = {Don't Bury your Head in Warnings: {A} Game-Theoretic Approach for
                  Intelligent Allocation of Cyber-security Alerts},
  booktitle    = {Proceedings of the Twenty-Sixth International Joint Conference on
                  Artificial Intelligence, {IJCAI} 2017, Melbourne, Australia, August
                  19-25, 2017},
  pages        = {381--387},
  publisher    = {ijcai.org},
  year         = {2017},
  url          = {https://doi.org/10.24963/ijcai.2017/54},
  doi          = {10.24963/IJCAI.2017/54},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ijcai/SchlenkerXGKSTS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/GuoABK17,
  author       = {Qingyu Guo and
                  Bo An and
                  Branislav Bosansk{\'{y}} and
                  Christopher Kiekintveld},
  editor       = {Carles Sierra},
  title        = {Comparing Strategic Secrecy and Stackelberg Commitment in Security
                  Games},
  booktitle    = {Proceedings of the Twenty-Sixth International Joint Conference on
                  Artificial Intelligence, {IJCAI} 2017, Melbourne, Australia, August
                  19-25, 2017},
  pages        = {3691--3699},
  publisher    = {ijcai.org},
  year         = {2017},
  url          = {https://doi.org/10.24963/ijcai.2017/516},
  doi          = {10.24963/IJCAI.2017/516},
  timestamp    = {Wed, 06 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcai/GuoABK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/gamesec/2017,
  editor       = {Stefan Rass and
                  Bo An and
                  Christopher Kiekintveld and
                  Fei Fang and
                  Stefan Schauer},
  title        = {Decision and Game Theory for Security - 8th International Conference,
                  GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10575},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68711-7},
  doi          = {10.1007/978-3-319-68711-7},
  isbn         = {978-3-319-68710-0},
  timestamp    = {Wed, 07 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/expert/DurkotaLKBP16,
  author       = {Karel Durkota and
                  Viliam Lis{\'{y}} and
                  Christopher Kiekintveld and
                  Branislav Bosansk{\'{y}} and
                  Michal Pechoucek},
  title        = {Case Studies of Network Defense with Attack Graph Games},
  journal      = {{IEEE} Intell. Syst.},
  volume       = {31},
  number       = {5},
  pages        = {24--30},
  year         = {2016},
  url          = {https://doi.org/10.1109/MIS.2016.74},
  doi          = {10.1109/MIS.2016.74},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/expert/DurkotaLKBP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/CermakBDLK16,
  author       = {Jiri Cermak and
                  Branislav Bosansk{\'{y}} and
                  Karel Durkota and
                  Viliam Lis{\'{y}} and
                  Christopher Kiekintveld},
  editor       = {Dale Schuurmans and
                  Michael P. Wellman},
  title        = {Using Correlated Strategies for Computing Stackelberg Equilibria in
                  Extensive-Form Games},
  booktitle    = {Proceedings of the Thirtieth {AAAI} Conference on Artificial Intelligence,
                  February 12-17, 2016, Phoenix, Arizona, {USA}},
  pages        = {439--445},
  publisher    = {{AAAI} Press},
  year         = {2016},
  url          = {https://doi.org/10.1609/aaai.v30i1.10045},
  doi          = {10.1609/AAAI.V30I1.10045},
  timestamp    = {Mon, 04 Sep 2023 15:08:28 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/CermakBDLK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/GutierrezK16,
  author       = {Marcus Paul Gutierrez and
                  Christopher Kiekintveld},
  editor       = {David R. Martinez and
                  William W. Streilein and
                  Kevin M. Carter and
                  Arunesh Sinha},
  title        = {Bandits for Cybersecurity: Adaptive Intrusion Detection Using Honeypots},
  booktitle    = {Artificial Intelligence for Cyber Security, Papers from the 2016 {AAAI}
                  Workshop, Phoenix, Arizona, USA, February 12, 2016},
  series       = {{AAAI} Technical Report},
  volume       = {{WS-16-03}},
  publisher    = {{AAAI} Press},
  year         = {2016},
  url          = {http://www.aaai.org/ocs/index.php/WS/AAAIW16/paper/view/12655},
  timestamp    = {Tue, 05 Sep 2023 08:59:27 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/GutierrezK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/ZhaoAK16,
  author       = {Mengchen Zhao and
                  Bo An and
                  Christopher Kiekintveld},
  editor       = {Dale Schuurmans and
                  Michael P. Wellman},
  title        = {Optimizing Personalized Email Filtering Thresholds to Mitigate Sequential
                  Spear Phishing Attacks},
  booktitle    = {Proceedings of the Thirtieth {AAAI} Conference on Artificial Intelligence,
                  February 12-17, 2016, Phoenix, Arizona, {USA}},
  pages        = {658--665},
  publisher    = {{AAAI} Press},
  year         = {2016},
  url          = {https://doi.org/10.1609/aaai.v30i1.10030},
  doi          = {10.1609/AAAI.V30I1.10030},
  timestamp    = {Mon, 04 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/ZhaoAK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/McCarthyTKGK16,
  author       = {Sara Marie McCarthy and
                  Milind Tambe and
                  Christopher Kiekintveld and
                  Meredith L. Gore and
                  Alex Killion},
  editor       = {Dale Schuurmans and
                  Michael P. Wellman},
  title        = {Preventing Illegal Logging: Simultaneous Optimization of Resource
                  Teams and Tactics for Security},
  booktitle    = {Proceedings of the Thirtieth {AAAI} Conference on Artificial Intelligence,
                  February 12-17, 2016, Phoenix, Arizona, {USA}},
  pages        = {3880--3886},
  publisher    = {{AAAI} Press},
  year         = {2016},
  url          = {https://doi.org/10.1609/aaai.v30i1.9904},
  doi          = {10.1609/AAAI.V30I1.9904},
  timestamp    = {Mon, 04 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/McCarthyTKGK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/VelizGK16,
  author       = {Oscar Veliz and
                  Marcus Gutierrez and
                  Christopher Kiekintveld},
  editor       = {Dale Schuurmans and
                  Michael P. Wellman},
  title        = {Teaching Automated Strategic Reasoning Using Capstone Tournaments},
  booktitle    = {Proceedings of the Thirtieth {AAAI} Conference on Artificial Intelligence,
                  February 12-17, 2016, Phoenix, Arizona, {USA}},
  pages        = {4134--4135},
  publisher    = {{AAAI} Press},
  year         = {2016},
  url          = {https://doi.org/10.1609/aaai.v30i1.9865},
  doi          = {10.1609/AAAI.V30I1.9865},
  timestamp    = {Mon, 04 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/VelizGK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amec/ChowdhuryFFK016,
  author       = {Moinul Morshed Porag Chowdhury and
                  Russell Y. Folk and
                  Ferdinando Fioretto and
                  Christopher Kiekintveld and
                  William Yeoh},
  editor       = {Sofia Ceppi and
                  Esther David and
                  Chen Hajaj and
                  Valentin Robu and
                  Ioannis A. Vetsikas},
  title        = {Investigation of Learning Strategies for the {SPOT} Broker in Power
                  {TAC}},
  booktitle    = {Agent-Mediated Electronic Commerce. Designing Trading Strategies and
                  Mechanisms for Electronic Markets - {AMEC/TADA} 2015, Istanbul, Turkey,
                  May 4, 2015, and {AMEC/TADA} 2016, New York, NY, USA, July 10, 2016,
                  Revised Selected Papers},
  series       = {Lecture Notes in Business Information Processing},
  volume       = {271},
  pages        = {96--111},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-54229-4\_7},
  doi          = {10.1007/978-3-319-54229-4\_7},
  timestamp    = {Mon, 05 Feb 2024 20:33:00 +0100},
  biburl       = {https://dblp.org/rec/conf/amec/ChowdhuryFFK016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atal/BasakFNK16,
  author       = {Anjon Basak and
                  Fei Fang and
                  Thanh Hong Nguyen and
                  Christopher Kiekintveld},
  editor       = {Nardine Osman and
                  Carles Sierra},
  title        = {Abstraction Methods for Solving Graph-Based Security Games},
  booktitle    = {Autonomous Agents and Multiagent Systems - {AAMAS} 2016 Workshops,
                  - Visionary Papers - , Singapore, Singapore, May 9-10, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10003},
  pages        = {13--33},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-46840-2\_2},
  doi          = {10.1007/978-3-319-46840-2\_2},
  timestamp    = {Wed, 07 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/atal/BasakFNK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/BasakFNK16,
  author       = {Anjon Basak and
                  Fei Fang and
                  Thanh Hong Nguyen and
                  Christopher Kiekintveld},
  editor       = {Quanyan Zhu and
                  Tansu Alpcan and
                  Emmanouil A. Panaousis and
                  Milind Tambe and
                  William Casey},
  title        = {Combining Graph Contraction and Strategy Generation for Green Security
                  Games},
  booktitle    = {Decision and Game Theory for Security - 7th International Conference,
                  GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9996},
  pages        = {251--271},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47413-7\_15},
  doi          = {10.1007/978-3-319-47413-7\_15},
  timestamp    = {Wed, 07 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/BasakFNK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/paams/FordBYSSSKT16,
  author       = {Benjamin J. Ford and
                  Matthew Brown and
                  Amulya Yadav and
                  Amandeep Singh and
                  Arunesh Sinha and
                  Biplav Srivastava and
                  Christopher Kiekintveld and
                  Milind Tambe},
  editor       = {Yves Demazeau and
                  Takayuki Ito and
                  Javier Bajo and
                  Mar{\'{\i}}a Jos{\'{e}} Escalona Cuaresma},
  title        = {Protecting the {NECTAR} of the Ganga River Through Game-Theoretic
                  Factory Inspections},
  booktitle    = {Advances in Practical Applications of Scalable Multi-agent Systems.
                  The {PAAMS} Collection - 14th International Conference, {PAAMS} 2016,
                  Sevilla, Spain, June 1-3, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9662},
  pages        = {97--108},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39324-7\_9},
  doi          = {10.1007/978-3-319-39324-7\_9},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/paams/FordBYSSSKT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aim/AgarwalABFFKKKL15,
  author       = {Nitin Agarwal and
                  Sean Andrist and
                  Dan Bohus and
                  Fei Fang and
                  Laurie Fenstermacher and
                  Lalana Kagal and
                  Takashi Kido and
                  Christopher Kiekintveld and
                  William F. Lawless and
                  Huan Liu and
                  Andrew McCallum and
                  Hemant Purohit and
                  Oshani Seneviratne and
                  Keiki Takadama and
                  Gavin Taylor},
  title        = {Reports on the 2015 {AAAI} Spring Symposium Series},
  journal      = {{AI} Mag.},
  volume       = {36},
  number       = {3},
  pages        = {113--119},
  year         = {2015},
  url          = {https://doi.org/10.1609/aimag.v36i3.2608},
  doi          = {10.1609/AIMAG.V36I3.2608},
  timestamp    = {Wed, 07 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/aim/AgarwalABFFKKKL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/BosanskyJTK15,
  author       = {Branislav Bosansk{\'{y}} and
                  Albert Xin Jiang and
                  Milind Tambe and
                  Christopher Kiekintveld},
  editor       = {Blai Bonet and
                  Sven Koenig},
  title        = {Combining Compact Representation and Incremental Generation in Large
                  Games with Sequential Strategies},
  booktitle    = {Proceedings of the Twenty-Ninth {AAAI} Conference on Artificial Intelligence,
                  January 25-30, 2015, Austin, Texas, {USA}},
  pages        = {812--818},
  publisher    = {{AAAI} Press},
  year         = {2015},
  url          = {https://doi.org/10.1609/aaai.v29i1.9319},
  doi          = {10.1609/AAAI.V29I1.9319},
  timestamp    = {Mon, 18 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/BosanskyJTK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atal/DurkotaLKB15,
  author       = {Karel Durkota and
                  Viliam Lis{\'{y}} and
                  Christopher Kiekintveld and
                  Branislav Bosansk{\'{y}}},
  editor       = {Gerhard Weiss and
                  Pinar Yolum and
                  Rafael H. Bordini and
                  Edith Elkind},
  title        = {Game-Theoretic Algorithms for Optimal Network Security Hardening Using
                  Attack Graphs},
  booktitle    = {Proceedings of the 2015 International Conference on Autonomous Agents
                  and Multiagent Systems, {AAMAS} 2015, Istanbul, Turkey, May 4-8, 2015},
  pages        = {1773--1774},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {http://dl.acm.org/citation.cfm?id=2773429},
  timestamp    = {Tue, 08 Mar 2022 10:12:47 +0100},
  biburl       = {https://dblp.org/rec/conf/atal/DurkotaLKB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atal/VelizK15,
  author       = {Oscar Veliz and
                  Christopher Kiekintveld},
  editor       = {Gerhard Weiss and
                  Pinar Yolum and
                  Rafael H. Bordini and
                  Edith Elkind},
  title        = {Selecting Robust Strategies Based on Abstracted Game Models},
  booktitle    = {Proceedings of the 2015 International Conference on Autonomous Agents
                  and Multiagent Systems, {AAMAS} 2015, Istanbul, Turkey, May 4-8, 2015},
  pages        = {1877--1878},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {http://dl.acm.org/citation.cfm?id=2773482},
  timestamp    = {Fri, 15 May 2015 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/atal/VelizK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/KlimaLK15,
  author       = {Richard Kl{\'{\i}}ma and
                  Viliam Lis{\'{y}} and
                  Christopher Kiekintveld},
  editor       = {M. H. R. Khouzani and
                  Emmanouil A. Panaousis and
                  George Theodorakopoulos},
  title        = {Combining Online Learning and Equilibrium Computation in Security
                  Games},
  booktitle    = {Decision and Game Theory for Security - 6th International Conference,
                  GameSec 2015, London, UK, November 4-5, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9406},
  pages        = {130--149},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25594-1\_8},
  doi          = {10.1007/978-3-319-25594-1\_8},
  timestamp    = {Thu, 17 Sep 2020 10:44:10 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/KlimaLK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/DurkotaLBK15,
  author       = {Karel Durkota and
                  Viliam Lis{\'{y}} and
                  Branislav Bosansk{\'{y}} and
                  Christopher Kiekintveld},
  editor       = {M. H. R. Khouzani and
                  Emmanouil A. Panaousis and
                  George Theodorakopoulos},
  title        = {Approximate Solutions for Attack Graph Games with Imperfect Information},
  booktitle    = {Decision and Game Theory for Security - 6th International Conference,
                  GameSec 2015, London, UK, November 4-5, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9406},
  pages        = {228--249},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25594-1\_13},
  doi          = {10.1007/978-3-319-25594-1\_13},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/DurkotaLBK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/DurkotaLBK15,
  author       = {Karel Durkota and
                  Viliam Lis{\'{y}} and
                  Branislav Bosansk{\'{y}} and
                  Christopher Kiekintveld},
  editor       = {Qiang Yang and
                  Michael J. Wooldridge},
  title        = {Optimal Network Security Hardening Using Attack Graph Games},
  booktitle    = {Proceedings of the Twenty-Fourth International Joint Conference on
                  Artificial Intelligence, {IJCAI} 2015, Buenos Aires, Argentina, July
                  25-31, 2015},
  pages        = {526--532},
  publisher    = {{AAAI} Press},
  year         = {2015},
  url          = {http://ijcai.org/Abstract/15/080},
  timestamp    = {Tue, 20 Aug 2019 16:16:43 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcai/DurkotaLBK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/KiekintveldLP15,
  author       = {Christopher Kiekintveld and
                  Viliam Lis{\'{y}} and
                  Radek P{\'{\i}}bil},
  editor       = {Sushil Jajodia and
                  Paulo Shakarian and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Game-Theoretic Foundations for the Strategic Use of Honeypots in Network
                  Security},
  booktitle    = {Cyber Warfare - Building the Scientific Foundation},
  series       = {Advances in Information Security},
  volume       = {56},
  pages        = {81--101},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-14039-1\_5},
  doi          = {10.1007/978-3-319-14039-1\_5},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/KiekintveldLP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aamas/BrownAKOT14,
  author       = {Matthew Brown and
                  Bo An and
                  Christopher Kiekintveld and
                  Fernando Ord{\'{o}}{\~{n}}ez and
                  Milind Tambe},
  title        = {An extended study on multi-objective security games},
  journal      = {Auton. Agents Multi Agent Syst.},
  volume       = {28},
  number       = {1},
  pages        = {31--71},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10458-012-9209-6},
  doi          = {10.1007/S10458-012-9209-6},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/aamas/BrownAKOT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jair/BosanskyKLP14,
  author       = {Branislav Bosansk{\'{y}} and
                  Christopher Kiekintveld and
                  Viliam Lis{\'{y}} and
                  Michal Pechoucek},
  title        = {An Exact Double-Oracle Algorithm for Zero-Sum Extensive-Form Games
                  with Imperfect Information},
  journal      = {J. Artif. Intell. Res.},
  volume       = {51},
  pages        = {829--866},
  year         = {2014},
  url          = {https://doi.org/10.1613/jair.4477},
  doi          = {10.1613/JAIR.4477},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jair/BosanskyKLP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/KlimaKL14,
  author       = {Richard Kl{\'{\i}}ma and
                  Christopher Kiekintveld and
                  Viliam Lis{\'{y}}},
  editor       = {Radha Poovendran and
                  Walid Saad},
  title        = {Online Learning Methods for Border Patrol Resource Allocation},
  booktitle    = {Decision and Game Theory for Security - 5th International Conference,
                  GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8840},
  pages        = {340--349},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12601-2\_20},
  doi          = {10.1007/978-3-319-12601-2\_20},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/KlimaKL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KorzhykYKCT14,
  author       = {Dmytro Korzhyk and
                  Zhengyu Yin and
                  Christopher Kiekintveld and
                  Vincent Conitzer and
                  Milind Tambe},
  title        = {Stackelberg vs. Nash in Security Games: An Extended Investigation
                  of Interchangeability, Equivalence, and Uniqueness},
  journal      = {CoRR},
  volume       = {abs/1401.3888},
  year         = {2014},
  url          = {http://arxiv.org/abs/1401.3888},
  eprinttype    = {arXiv},
  eprint       = {1401.3888},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KorzhykYKCT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ai/YangKOTJ13,
  author       = {Rong Yang and
                  Christopher Kiekintveld and
                  Fernando Ord{\'{o}}{\~{n}}ez and
                  Milind Tambe and
                  Richard John},
  title        = {Improving resource allocation strategies against human adversaries
                  in security games: An extended study},
  journal      = {Artif. Intell.},
  volume       = {195},
  pages        = {440--469},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.artint.2012.11.004},
  doi          = {10.1016/J.ARTINT.2012.11.004},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ai/YangKOTJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/ParraK13,
  author       = {Jaime Parra Jr. and
                  Christopher Kiekintveld},
  title        = {Initial Exploration of Machine Learning to Predict Customer Demand
                  in an Energy Market Simulation},
  booktitle    = {Trading Agent Design and Analysis, Papers from the 2013 {AAAI} Workshop,
                  Bellevue, Washington, USA, July 15, 2013},
  series       = {{AAAI} Technical Report},
  volume       = {{WS-13-15}},
  publisher    = {{AAAI}},
  year         = {2013},
  url          = {http://www.aaai.org/ocs/index.php/WS/AAAIW13/paper/view/7150},
  timestamp    = {Tue, 05 Sep 2023 08:59:27 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/ParraK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atal/KiekintveldIK13,
  author       = {Christopher Kiekintveld and
                  Towhidul Islam and
                  Vladik Kreinovich},
  editor       = {Maria L. Gini and
                  Onn Shehory and
                  Takayuki Ito and
                  Catholijn M. Jonker},
  title        = {Security games with interval uncertainty},
  booktitle    = {International conference on Autonomous Agents and Multi-Agent Systems,
                  {AAMAS} '13, Saint Paul, MN, USA, May 6-10, 2013},
  pages        = {231--238},
  publisher    = {{IFAAMAS}},
  year         = {2013},
  url          = {http://dl.acm.org/citation.cfm?id=2484959},
  timestamp    = {Thu, 09 Sep 2021 16:09:54 +0200},
  biburl       = {https://dblp.org/rec/conf/atal/KiekintveldIK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atal/BosanskyKLCP13,
  author       = {Branislav Bosansk{\'{y}} and
                  Christopher Kiekintveld and
                  Viliam Lis{\'{y}} and
                  Jiri Cermak and
                  Michal Pechoucek},
  editor       = {Maria L. Gini and
                  Onn Shehory and
                  Takayuki Ito and
                  Catholijn M. Jonker},
  title        = {Double-oracle algorithm for computing an exact nash equilibrium in
                  zero-sum extensive-form games},
  booktitle    = {International conference on Autonomous Agents and Multi-Agent Systems,
                  {AAMAS} '13, Saint Paul, MN, USA, May 6-10, 2013},
  pages        = {335--342},
  publisher    = {{IFAAMAS}},
  year         = {2013},
  url          = {http://dl.acm.org/citation.cfm?id=2484975},
  timestamp    = {Fri, 28 Jun 2013 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/atal/BosanskyKLCP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atal/TsaiQVKT13,
  author       = {Jason Tsai and
                  Yundi Qian and
                  Yevgeniy Vorobeychik and
                  Christopher Kiekintveld and
                  Milind Tambe},
  editor       = {Maria L. Gini and
                  Onn Shehory and
                  Takayuki Ito and
                  Catholijn M. Jonker},
  title        = {Security games with contagion: handling asymmetric information},
  booktitle    = {International conference on Autonomous Agents and Multi-Agent Systems,
                  {AAMAS} '13, Saint Paul, MN, USA, May 6-10, 2013},
  pages        = {1185--1186},
  publisher    = {{IFAAMAS}},
  year         = {2013},
  url          = {http://dl.acm.org/citation.cfm?id=2485134},
  timestamp    = {Fri, 28 Jun 2013 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/atal/TsaiQVKT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialcom/TsaiQVKT13,
  author       = {Jason Tsai and
                  Yundi Qian and
                  Yevgeniy Vorobeychik and
                  Christopher Kiekintveld and
                  Milind Tambe},
  title        = {Bayesian Security Games for Controlling Contagion},
  booktitle    = {International Conference on Social Computing, SocialCom 2013, SocialCom/PASSAT/BigData/EconCom/BioMedCom
                  2013, Washington, DC, USA, 8-14 September, 2013},
  pages        = {33--38},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SocialCom.2013.11},
  doi          = {10.1109/SOCIALCOM.2013.11},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/socialcom/TsaiQVKT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/amec/2012,
  editor       = {Esther David and
                  Christopher Kiekintveld and
                  Valentin Robu and
                  Onn Shehory and
                  Sebastian Stein},
  title        = {Agent-Mediated Electronic Commerce. Designing Trading Strategies and
                  Mechanisms for Electronic Markets - {AMEC} and {TADA} 2012, Valencia,
                  Spain, June 4th, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Business Information Processing},
  volume       = {136},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40864-9},
  doi          = {10.1007/978-3-642-40864-9},
  isbn         = {978-3-642-40863-2},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/amec/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aim/AgmonAAABDGGGJKKLLMMMOOOPPRRTSSSSSSUW12,
  author       = {Noa Agmon and
                  Vikas Agrawal and
                  David W. Aha and
                  Yiannis Aloimonos and
                  Donagh Buckley and
                  Prashant Doshi and
                  Christopher W. Geib and
                  Floriana Grasso and
                  Nancy L. Green and
                  Benjamin Johnston and
                  Burt Kaliski and
                  Christopher Kiekintveld and
                  Edith Law and
                  Henry Lieberman and
                  Ole J. Mengshoel and
                  Ted Metzler and
                  Joseph Modayil and
                  Douglas W. Oard and
                  Nilufer Onder and
                  Barry O'Sullivan and
                  Katerina Pastra and
                  Doina Precup and
                  Sowmya Ramachandran and
                  Chris Reed and
                  Sanem Sariel Talay and
                  Ted Selker and
                  Lokendra Shastri and
                  Stephen F. Smith and
                  Satinder Singh and
                  Siddharth Srivastava and
                  Gita Sukthankar and
                  David C. Uthus and
                  Mary{-}Anne Williams},
  title        = {Reports of the {AAAI} 2011 Conference Workshops},
  journal      = {{AI} Mag.},
  volume       = {33},
  number       = {1},
  pages        = {57--70},
  year         = {2012},
  url          = {https://doi.org/10.1609/aimag.v33i1.2390},
  doi          = {10.1609/AIMAG.V33I1.2390},
  timestamp    = {Thu, 10 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/aim/AgmonAAABDGGGJKKLLMMMOOOPPRRTSSSSSSUW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aim/YinJTKLSS12,
  author       = {Zhengyu Yin and
                  Albert Xin Jiang and
                  Milind Tambe and
                  Christopher Kiekintveld and
                  Kevin Leyton{-}Brown and
                  Tuomas Sandholm and
                  John P. Sullivan},
  title        = {{TRUSTS:} Scheduling Randomized Patrols for Fare Inspection in Transit
                  Systems Using Game Theory},
  journal      = {{AI} Mag.},
  volume       = {33},
  number       = {4},
  pages        = {59--72},
  year         = {2012},
  url          = {https://doi.org/10.1609/aimag.v33i4.2432},
  doi          = {10.1609/AIMAG.V33I4.2432},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/aim/YinJTKLSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/AnKKSSTV12,
  author       = {Bo An and
                  David Kempe and
                  Christopher Kiekintveld and
                  Eric Shieh and
                  Satinder Singh and
                  Milind Tambe and
                  Yevgeniy Vorobeychik},
  editor       = {J{\"{o}}rg Hoffmann and
                  Bart Selman},
  title        = {Security Games with Limited Surveillance},
  booktitle    = {Proceedings of the Twenty-Sixth {AAAI} Conference on Artificial Intelligence,
                  July 22-26, 2012, Toronto, Ontario, Canada},
  pages        = {1241--1248},
  publisher    = {{AAAI} Press},
  year         = {2012},
  url          = {https://doi.org/10.1609/aaai.v26i1.8236},
  doi          = {10.1609/AAAI.V26I1.8236},
  timestamp    = {Mon, 04 Sep 2023 15:56:47 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/AnKKSSTV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaaiss/AnKKSSTV12,
  author       = {Bo An and
                  David Kempe and
                  Christopher Kiekintveld and
                  Eric Anyung Shieh and
                  Satinder Singh and
                  Milind Tambe and
                  Yevgeniy Vorobeychik},
  title        = {Security Games with Limited Surveillance: An Initial Report},
  booktitle    = {Game Theory for Security, Sustainability, and Health, Papers from
                  the 2012 {AAAI} Spring Symposium, Palo Alto, California, USA, March
                  26-28, 2012},
  series       = {{AAAI} Technical Report},
  volume       = {{SS-12-03}},
  publisher    = {{AAAI}},
  year         = {2012},
  url          = {http://www.aaai.org/ocs/index.php/SSS/SSS12/paper/view/4262},
  timestamp    = {Tue, 19 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aaaiss/AnKKSSTV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaaiss/JiangYJTKLS12,
  author       = {Albert Xin Jiang and
                  Zhengyu Yin and
                  Matthew P. Johnson and
                  Milind Tambe and
                  Christopher Kiekintveld and
                  Kevin Leyton{-}Brown and
                  Tuomas Sandholm},
  title        = {Towards Optimal Patrol Strategies for Fare Inspection in Transit Systems},
  booktitle    = {Game Theory for Security, Sustainability, and Health, Papers from
                  the 2012 {AAAI} Spring Symposium, Palo Alto, California, USA, March
                  26-28, 2012},
  series       = {{AAAI} Technical Report},
  volume       = {{SS-12-03}},
  publisher    = {{AAAI}},
  year         = {2012},
  url          = {http://www.aaai.org/ocs/index.php/SSS/SSS12/paper/view/4263},
  timestamp    = {Wed, 03 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aaaiss/JiangYJTKLS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaaiss/KiekintveldK12,
  author       = {Christopher Kiekintveld and
                  Vladik Kreinovich},
  title        = {Efficient Approximation for Security Games with Interval Uncertainty},
  booktitle    = {Game Theory for Security, Sustainability, and Health, Papers from
                  the 2012 {AAAI} Spring Symposium, Palo Alto, California, USA, March
                  26-28, 2012},
  series       = {{AAAI} Technical Report},
  volume       = {{SS-12-03}},
  publisher    = {{AAAI}},
  year         = {2012},
  url          = {http://www.aaai.org/ocs/index.php/SSS/SSS12/paper/view/4346},
  timestamp    = {Wed, 25 Sep 2013 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aaaiss/KiekintveldK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aamas/BrownAKOT12,
  author       = {Matthew Brown and
                  Bo An and
                  Christopher Kiekintveld and
                  Fernando Ord{\'{o}}{\~{n}}ez and
                  Milind Tambe},
  editor       = {Wiebe van der Hoek and
                  Lin Padgham and
                  Vincent Conitzer and
                  Michael Winikoff},
  title        = {Multi-objective optimization for security games},
  booktitle    = {International Conference on Autonomous Agents and Multiagent Systems,
                  {AAMAS} 2012, Valencia, Spain, June 4-8, 2012 {(3} Volumes)},
  pages        = {863--870},
  publisher    = {{IFAAMAS}},
  year         = {2012},
  url          = {http://dl.acm.org/citation.cfm?id=2343820},
  timestamp    = {Wed, 06 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aamas/BrownAKOT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecai/BosanskyKLP12,
  author       = {Branislav Bosansk{\'{y}} and
                  Christopher Kiekintveld and
                  Viliam Lis{\'{y}} and
                  Michal Pechoucek},
  editor       = {Luc De Raedt and
                  Christian Bessiere and
                  Didier Dubois and
                  Patrick Doherty and
                  Paolo Frasconi and
                  Fredrik Heintz and
                  Peter J. F. Lucas},
  title        = {Iterative Algorithm for Solving Two-player Zero-sum Extensive-form
                  Games with Imperfect Information},
  booktitle    = {{ECAI} 2012 - 20th European Conference on Artificial Intelligence.
                  Including Prestigious Applications of Artificial Intelligence {(PAIS-2012)}
                  System Demonstrations Track, Montpellier, France, August 27-31 , 2012},
  series       = {Frontiers in Artificial Intelligence and Applications},
  volume       = {242},
  pages        = {193--198},
  publisher    = {{IOS} Press},
  year         = {2012},
  url          = {https://doi.org/10.3233/978-1-61499-098-7-193},
  doi          = {10.3233/978-1-61499-098-7-193},
  timestamp    = {Mon, 19 Jun 2023 16:36:09 +0200},
  biburl       = {https://dblp.org/rec/conf/ecai/BosanskyKLP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/PibilLKBP12,
  author       = {Radek P{\'{\i}}bil and
                  Viliam Lis{\'{y}} and
                  Christopher Kiekintveld and
                  Branislav Bosansk{\'{y}} and
                  Michal Pechoucek},
  editor       = {Jens Grossklags and
                  Jean C. Walrand},
  title        = {Game Theoretic Model of Strategic Honeypot Selection in Computer Networks},
  booktitle    = {Decision and Game Theory for Security - Third International Conference,
                  GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7638},
  pages        = {201--220},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34266-0\_12},
  doi          = {10.1007/978-3-642-34266-0\_12},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/PibilLKBP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iaai/YinJJKLSTS12,
  author       = {Zhengyu Yin and
                  Albert Xin Jiang and
                  Matthew Paul Johnson and
                  Christopher Kiekintveld and
                  Kevin Leyton{-}Brown and
                  Tuomas Sandholm and
                  Milind Tambe and
                  John P. Sullivan},
  editor       = {Markus P. J. Fromherz and
                  Hector Mu{\~{n}}oz{-}Avila},
  title        = {{TRUSTS:} Scheduling Randomized Patrols for Fare Inspection in Transit
                  Systems},
  booktitle    = {Proceedings of the Twenty-Fourth Conference on Innovative Applications
                  of Artificial Intelligence, July 22-26, 2012, Toronto, Ontario, Canada},
  pages        = {2348--2355},
  publisher    = {{AAAI}},
  year         = {2012},
  url          = {https://doi.org/10.1609/aaai.v26i2.18975},
  doi          = {10.1609/AAAI.V26I2.18975},
  timestamp    = {Tue, 05 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iaai/YinJJKLSTS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jair/KorzhykYKCT11,
  author       = {Dmytro Korzhyk and
                  Zhengyu Yin and
                  Christopher Kiekintveld and
                  Vincent Conitzer and
                  Milind Tambe},
  title        = {Stackelberg vs. Nash in Security Games: An Extended Investigation
                  of Interchangeability, Equivalence, and Uniqueness},
  journal      = {J. Artif. Intell. Res.},
  volume       = {41},
  pages        = {297--327},
  year         = {2011},
  url          = {https://doi.org/10.1613/jair.3269},
  doi          = {10.1613/JAIR.3269},
  timestamp    = {Mon, 21 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jair/KorzhykYKCT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigecom/AnPSTKM11,
  author       = {Bo An and
                  James Pita and
                  Eric Anyung Shieh and
                  Milind Tambe and
                  Christopher Kiekintveld and
                  Janusz Marecki},
  title        = {{GUARDS} and {PROTECT:} next generation applications of security games},
  journal      = {SIGecom Exch.},
  volume       = {10},
  number       = {1},
  pages        = {31--34},
  year         = {2011},
  url          = {https://doi.org/10.1145/1978721.1978729},
  doi          = {10.1145/1978721.1978729},
  timestamp    = {Thu, 04 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigecom/AnPSTKM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/AguirreLGTEK11,
  author       = {Oswaldo Aguirre and
                  Nicolas Lopez and
                  Eric Gutierrez and
                  Heidi A. Taboada and
                  Jose Epiritu and
                  Christopher Kiekintveld},
  title        = {Towards the Integration of Multi-Attribute Optimization and Game Theory
                  for Border Security Patrolling Strategies},
  booktitle    = {Applied Adversarial Reasoning and Risk Modeling, Papers from the 2011
                  {AAAI} Workshop, San Francisco, California, USA, August 7, 2011},
  series       = {{AAAI} Technical Report},
  volume       = {{WS-11-06}},
  publisher    = {{AAAI}},
  year         = {2011},
  url          = {http://www.aaai.org/ocs/index.php/WS/AAAIW11/paper/view/3853},
  timestamp    = {Tue, 05 Sep 2023 08:59:27 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/AguirreLGTEK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/AnTOSK11,
  author       = {Bo An and
                  Milind Tambe and
                  Fernando Ord{\'{o}}{\~{n}}ez and
                  Eric Anyung Shieh and
                  Christopher Kiekintveld},
  editor       = {Wolfram Burgard and
                  Dan Roth},
  title        = {Refinement of Strong Stackelberg Equilibria in Security Games},
  booktitle    = {Proceedings of the Twenty-Fifth {AAAI} Conference on Artificial Intelligence,
                  {AAAI} 2011, San Francisco, California, USA, August 7-11, 2011},
  pages        = {587--593},
  publisher    = {{AAAI} Press},
  year         = {2011},
  url          = {https://doi.org/10.1609/aaai.v25i1.7864},
  doi          = {10.1609/AAAI.V25I1.7864},
  timestamp    = {Mon, 04 Sep 2023 16:05:54 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/AnTOSK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/LermaKK11,
  author       = {Octavio Lerma and
                  Vladik Kreinovich and
                  Christopher Kiekintveld},
  title        = {Linear-Time Resource Allocation in Security Games with Identical Fully
                  Protective Resources},
  booktitle    = {Applied Adversarial Reasoning and Risk Modeling, Papers from the 2011
                  {AAAI} Workshop, San Francisco, California, USA, August 7, 2011},
  series       = {{AAAI} Technical Report},
  volume       = {{WS-11-06}},
  publisher    = {{AAAI}},
  year         = {2011},
  url          = {http://www.aaai.org/ocs/index.php/WS/AAAIW11/paper/view/3978},
  timestamp    = {Tue, 05 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/LermaKK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaaiss/AnJTK11,
  author       = {Bo An and
                  Manish Jain and
                  Milind Tambe and
                  Christopher Kiekintveld},
  title        = {Mixed-Initiative Optimization in Security Games: {A} Preliminary Report},
  booktitle    = {Help Me Help You: Bridging the Gaps in Human-Agent Collaboration,
                  Papers from the 2011 {AAAI} Spring Symposium, Technical Report SS-11-05,
                  Stanford, California, USA, March 21-23, 2011},
  publisher    = {{AAAI}},
  year         = {2011},
  url          = {http://www.aaai.org/ocs/index.php/SSS/SSS11/paper/view/2375},
  timestamp    = {Wed, 06 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aaaiss/AnJTK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atal/PitaTKCS11,
  author       = {James Pita and
                  Milind Tambe and
                  Christopher Kiekintveld and
                  Shane Cullen and
                  Erin Steigerwald},
  editor       = {Liz Sonenberg and
                  Peter Stone and
                  Kagan Tumer and
                  Pinar Yolum},
  title        = {{GUARDS:} game theoretic security allocation on a national scale},
  booktitle    = {10th International Conference on Autonomous Agents and Multiagent
                  Systems {(AAMAS} 2011), Taipei, Taiwan, May 2-6, 2011, Volume 1-3},
  pages        = {37--44},
  publisher    = {{IFAAMAS}},
  year         = {2011},
  url          = {http://portal.acm.org/citation.cfm?id=2030476\&\#38;CFID=69153967\&\#38;CFTOKEN=38069692},
  timestamp    = {Fri, 18 Nov 2011 09:09:28 +0100},
  biburl       = {https://dblp.org/rec/conf/atal/PitaTKCS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atal/JainKT11,
  author       = {Manish Jain and
                  Christopher Kiekintveld and
                  Milind Tambe},
  editor       = {Liz Sonenberg and
                  Peter Stone and
                  Kagan Tumer and
                  Pinar Yolum},
  title        = {Quality-bounded solutions for finite Bayesian Stackelberg games: scaling
                  up},
  booktitle    = {10th International Conference on Autonomous Agents and Multiagent
                  Systems {(AAMAS} 2011), Taipei, Taiwan, May 2-6, 2011, Volume 1-3},
  pages        = {997--1004},
  publisher    = {{IFAAMAS}},
  year         = {2011},
  url          = {http://portal.acm.org/citation.cfm?id=2034411\&\#38;CFID=69154334\&\#38;CFTOKEN=45298625},
  timestamp    = {Fri, 18 Nov 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/atal/JainKT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atal/KiekintveldMT11,
  author       = {Christopher Kiekintveld and
                  Janusz Marecki and
                  Milind Tambe},
  editor       = {Liz Sonenberg and
                  Peter Stone and
                  Kagan Tumer and
                  Pinar Yolum},
  title        = {Approximation methods for infinite Bayesian Stackelberg games: modeling
                  distributional payoff uncertainty},
  booktitle    = {10th International Conference on Autonomous Agents and Multiagent
                  Systems {(AAMAS} 2011), Taipei, Taiwan, May 2-6, 2011, Volume 1-3},
  pages        = {1005--1012},
  publisher    = {{IFAAMAS}},
  year         = {2011},
  url          = {http://portal.acm.org/citation.cfm?id=2034412\&\#38;CFID=69154334\&\#38;CFTOKEN=45298625},
  timestamp    = {Fri, 18 Nov 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/atal/KiekintveldMT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atal/YangKOTJ11,
  author       = {Rong Yang and
                  Christopher Kiekintveld and
                  Fernando Ord{\'{o}}{\~{n}}ez and
                  Milind Tambe and
                  Richard John},
  editor       = {Liz Sonenberg and
                  Peter Stone and
                  Kagan Tumer and
                  Pinar Yolum},
  title        = {Improved computational models of human behavior in security games},
  booktitle    = {10th International Conference on Autonomous Agents and Multiagent
                  Systems {(AAMAS} 2011), Taipei, Taiwan, May 2-6, 2011, Volume 1-3},
  pages        = {1155--1156},
  publisher    = {{IFAAMAS}},
  year         = {2011},
  url          = {http://portal.acm.org/citation.cfm?id=2034464\&\#38;CFID=69154334\&\#38;CFTOKEN=45298625},
  timestamp    = {Fri, 18 Nov 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/atal/YangKOTJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/YangKOTJ11,
  author       = {Rong Yang and
                  Christopher Kiekintveld and
                  Fernando Ord{\'{o}}{\~{n}}ez and
                  Milind Tambe and
                  Richard John},
  editor       = {Toby Walsh},
  title        = {Improving Resource Allocation Strategy against Human Adversaries in
                  Security Games},
  booktitle    = {{IJCAI} 2011, Proceedings of the 22nd International Joint Conference
                  on Artificial Intelligence, Barcelona, Catalonia, Spain, July 16-22,
                  2011},
  pages        = {458--464},
  publisher    = {{IJCAI/AAAI}},
  year         = {2011},
  url          = {https://doi.org/10.5591/978-1-57735-516-8/IJCAI11-084},
  doi          = {10.5591/978-1-57735-516-8/IJCAI11-084},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ijcai/YangKOTJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/PitaTKCS11,
  author       = {James Pita and
                  Milind Tambe and
                  Christopher Kiekintveld and
                  Shane Cullen and
                  Erin Steigerwald},
  editor       = {Toby Walsh},
  title        = {{GUARDS} - Innovative Application of Game Theory for National Airport
                  Security},
  booktitle    = {{IJCAI} 2011, Proceedings of the 22nd International Joint Conference
                  on Artificial Intelligence, Barcelona, Catalonia, Spain, July 16-22,
                  2011},
  pages        = {2710--2715},
  publisher    = {{IJCAI/AAAI}},
  year         = {2011},
  url          = {https://doi.org/10.5591/978-1-57735-516-8/IJCAI11-451},
  doi          = {10.5591/978-1-57735-516-8/IJCAI11-451},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcai/PitaTKCS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/informaticaSI/KiekintveldMPS10,
  author       = {Christopher Kiekintveld and
                  Janusz Marecki and
                  Praveen Paruchuri and
                  Katia P. Sycara},
  title        = {Editor's Introduction to the Special Issue on Quantitative Risk Analysis
                  Techniques for Security Applications},
  journal      = {Informatica (Slovenia)},
  volume       = {34},
  number       = {2},
  pages        = {127--128},
  year         = {2010},
  url          = {http://www.informatica.si/index.php/informatica/article/view/283},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/informaticaSI/KiekintveldMPS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/informaticaSI/TaylorKWT10,
  author       = {Matthew E. Taylor and
                  Christopher Kiekintveld and
                  Craig Western and
                  Milind Tambe},
  title        = {A Framework for Evaluating Deployed Security Systems: Is There a Chink
                  in your ARMOR?},
  journal      = {Informatica (Slovenia)},
  volume       = {34},
  number       = {2},
  pages        = {129--140},
  year         = {2010},
  url          = {http://www.informatica.si/index.php/informatica/article/view/284},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/informaticaSI/TaylorKWT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/interfaces/JainTPKRTO10,
  author       = {Manish Jain and
                  Jason Tsai and
                  James Pita and
                  Christopher Kiekintveld and
                  Shyamsunder Rathi and
                  Milind Tambe and
                  Fernando Ord{\'{o}}{\~{n}}ez},
  title        = {Software Assistants for Randomized Patrol Planning for the {LAX} Airport
                  Police and the Federal Air Marshal Service},
  journal      = {Interfaces},
  volume       = {40},
  number       = {4},
  pages        = {267--290},
  year         = {2010},
  url          = {https://doi.org/10.1287/inte.1100.0505},
  doi          = {10.1287/INTE.1100.0505},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/interfaces/JainTPKRTO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/JainKKOT10,
  author       = {Manish Jain and
                  Erim Kardes and
                  Christopher Kiekintveld and
                  Fernando Ord{\'{o}}{\~{n}}ez and
                  Milind Tambe},
  editor       = {Maria Fox and
                  David Poole},
  title        = {Security Games with Arbitrary Schedules: {A} Branch and Price Approach},
  booktitle    = {Proceedings of the Twenty-Fourth {AAAI} Conference on Artificial Intelligence,
                  {AAAI} 2010, Atlanta, Georgia, USA, July 11-15, 2010},
  pages        = {792--797},
  publisher    = {{AAAI} Press},
  year         = {2010},
  url          = {https://doi.org/10.1609/aaai.v24i1.7611},
  doi          = {10.1609/AAAI.V24I1.7611},
  timestamp    = {Mon, 04 Sep 2023 16:23:45 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/JainKKOT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/TsaiYKKKT10,
  author       = {Jason Tsai and
                  Zhengyu Yin and
                  Jun{-}young Kwak and
                  David Kempe and
                  Christopher Kiekintveld and
                  Milind Tambe},
  editor       = {Maria Fox and
                  David Poole},
  title        = {Urban Security: Game-Theoretic Resource Allocation in Networked Domains},
  booktitle    = {Proceedings of the Twenty-Fourth {AAAI} Conference on Artificial Intelligence,
                  {AAAI} 2010, Atlanta, Georgia, USA, July 11-15, 2010},
  pages        = {881--886},
  publisher    = {{AAAI} Press},
  year         = {2010},
  url          = {https://doi.org/10.1609/aaai.v24i1.7612},
  doi          = {10.1609/AAAI.V24I1.7612},
  timestamp    = {Mon, 04 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/TsaiYKKKT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atal/KiekintveldYKT10,
  author       = {Christopher Kiekintveld and
                  Zhengyu Yin and
                  Atul Kumar and
                  Milind Tambe},
  editor       = {Wiebe van der Hoek and
                  Gal A. Kaminka and
                  Yves Lesp{\'{e}}rance and
                  Michael Luck and
                  Sandip Sen},
  title        = {Asynchronous algorithms for approximate distributed constraint optimization
                  with quality bounds},
  booktitle    = {9th International Conference on Autonomous Agents and Multiagent Systems
                  {(AAMAS} 2010), Toronto, Canada, May 10-14, 2010, Volume 1-3},
  pages        = {133--140},
  publisher    = {{IFAAMAS}},
  year         = {2010},
  url          = {https://dl.acm.org/citation.cfm?id=1838225},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/atal/KiekintveldYKT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atal/YinKKCT10,
  author       = {Zhengyu Yin and
                  Dmytro Korzhyk and
                  Christopher Kiekintveld and
                  Vincent Conitzer and
                  Milind Tambe},
  editor       = {Wiebe van der Hoek and
                  Gal A. Kaminka and
                  Yves Lesp{\'{e}}rance and
                  Michael Luck and
                  Sandip Sen},
  title        = {Stackelberg vs. Nash in security games: interchangeability, equivalence,
                  and uniqueness},
  booktitle    = {9th International Conference on Autonomous Agents and Multiagent Systems
                  {(AAMAS} 2010), Toronto, Canada, May 10-14, 2010, Volume 1-3},
  pages        = {1139--1146},
  publisher    = {{IFAAMAS}},
  year         = {2010},
  url          = {https://dl.acm.org/citation.cfm?id=1838360},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/atal/YinKKCT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atal/TsaiYKKKT10,
  author       = {Jason Tsai and
                  Zhengyu Yin and
                  Jun{-}young Kwak and
                  David Kempe and
                  Christopher Kiekintveld and
                  Milind Tambe},
  editor       = {Wiebe van der Hoek and
                  Gal A. Kaminka and
                  Yves Lesp{\'{e}}rance and
                  Michael Luck and
                  Sandip Sen},
  title        = {How to protect a city: strategic security placement in graph-based
                  domains},
  booktitle    = {9th International Conference on Autonomous Agents and Multiagent Systems
                  {(AAMAS} 2010), Toronto, Canada, May 10-14, 2010, Volume 1-3},
  pages        = {1453--1454},
  publisher    = {{IFAAMAS}},
  year         = {2010},
  url          = {https://dl.acm.org/citation.cfm?id=1838428},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/atal/TsaiYKKKT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atal/KiekintveldTM10,
  author       = {Christopher Kiekintveld and
                  Milind Tambe and
                  Janusz Marecki},
  editor       = {Wiebe van der Hoek and
                  Gal A. Kaminka and
                  Yves Lesp{\'{e}}rance and
                  Michael Luck and
                  Sandip Sen},
  title        = {Robust Bayesian methods for Stackelberg security games},
  booktitle    = {9th International Conference on Autonomous Agents and Multiagent Systems
                  {(AAMAS} 2010), Toronto, Canada, May 10-14, 2010, Volume 1-3},
  pages        = {1467--1468},
  publisher    = {{IFAAMAS}},
  year         = {2010},
  url          = {https://dl.acm.org/citation.cfm?id=1838435},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/atal/KiekintveldTM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/KiekintveldMT10,
  author       = {Christopher Kiekintveld and
                  Janusz Marecki and
                  Milind Tambe},
  editor       = {Tansu Alpcan and
                  Levente Butty{\'{a}}n and
                  John S. Baras},
  title        = {Methods and Algorithms for Infinite Bayesian Stackelberg Security
                  Games - (Extended Abstract)},
  booktitle    = {Decision and Game Theory for Security - First International Conference,
                  GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6442},
  pages        = {257--265},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17197-0\_18},
  doi          = {10.1007/978-3-642-17197-0\_18},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/KiekintveldMT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ecra/KiekintveldMJCW09,
  author       = {Christopher Kiekintveld and
                  Jason Miller and
                  Patrick R. Jordan and
                  Lee F. Callender and
                  Michael P. Wellman},
  title        = {Forecasting market prices in a supply chain game},
  journal      = {Electron. Commer. Res. Appl.},
  volume       = {8},
  number       = {2},
  pages        = {63--77},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.elerap.2008.11.005},
  doi          = {10.1016/J.ELERAP.2008.11.005},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ecra/KiekintveldMJCW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigecom/PitaBJKTOT09,
  author       = {James Pita and
                  Harish Bellamane and
                  Manish Jain and
                  Christopher Kiekintveld and
                  Jason Tsai and
                  Fernando Ord{\'{o}}{\~{n}}ez and
                  Milind Tambe},
  title        = {Security applications: lessons of real-world deployment},
  journal      = {SIGecom Exch.},
  volume       = {8},
  number       = {2},
  pages        = {5},
  year         = {2009},
  url          = {https://doi.org/10.1145/1980522.1980527},
  doi          = {10.1145/1980522.1980527},
  timestamp    = {Thu, 04 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigecom/PitaBJKTOT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atal/KiekintveldJTPOT09,
  author       = {Christopher Kiekintveld and
                  Manish Jain and
                  Jason Tsai and
                  James Pita and
                  Fernando Ord{\'{o}}{\~{n}}ez and
                  Milind Tambe},
  editor       = {Carles Sierra and
                  Cristiano Castelfranchi and
                  Keith S. Decker and
                  Jaime Sim{\~{a}}o Sichman},
  title        = {Computing optimal randomized resource allocations for massive security
                  games},
  booktitle    = {8th International Joint Conference on Autonomous Agents and Multiagent
                  Systems {(AAMAS} 2009), Budapest, Hungary, May 10-15, 2009, Volume
                  1},
  pages        = {689--696},
  publisher    = {{IFAAMAS}},
  year         = {2009},
  url          = {https://dl.acm.org/citation.cfm?id=1558108},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/atal/KiekintveldJTPOT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/us/Kiekintveld08,
  author       = {Christopher Kiekintveld},
  title        = {Empirical Game-Theoretic Methods for Strategy Design and Analysis
                  in Complex Games},
  school       = {University of Michigan, {USA}},
  year         = {2008},
  url          = {https://hdl.handle.net/2027.42/61590},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/us/Kiekintveld08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atal/KiekintveldW08,
  author       = {Christopher Kiekintveld and
                  Michael P. Wellman},
  editor       = {Lin Padgham and
                  David C. Parkes and
                  J{\"{o}}rg P. M{\"{u}}ller and
                  Simon Parsons},
  title        = {Selecting strategies using empirical game models: an experimental
                  analysis of meta-strategies},
  booktitle    = {7th International Joint Conference on Autonomous Agents and Multiagent
                  Systems {(AAMAS} 2008), Estoril, Portugal, May 12-16, 2008, Volume
                  2},
  pages        = {1095--1101},
  publisher    = {{IFAAMAS}},
  year         = {2008},
  url          = {https://dl.acm.org/citation.cfm?id=1402373},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/atal/KiekintveldW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/Kiekintveld07,
  author       = {Christopher Kiekintveld},
  title        = {Empirical Game-Theoretic Methods for Strategy Design and Analysis
                  in Complex Games},
  booktitle    = {Proceedings of the Twenty-Second {AAAI} Conference on Artificial Intelligence,
                  July 22-26, 2007, Vancouver, British Columbia, Canada},
  pages        = {1935--1936},
  publisher    = {{AAAI} Press},
  year         = {2007},
  url          = {http://www.aaai.org/Library/AAAI/2007/aaai07-342.php},
  timestamp    = {Tue, 05 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/Kiekintveld07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atal/JordanKW07,
  author       = {Patrick R. Jordan and
                  Christopher Kiekintveld and
                  Michael P. Wellman},
  editor       = {Edmund H. Durfee and
                  Makoto Yokoo and
                  Michael N. Huhns and
                  Onn Shehory},
  title        = {Empirical game-theoretic analysis of the {TAC} Supply Chain game},
  booktitle    = {6th International Joint Conference on Autonomous Agents and Multiagent
                  Systems {(AAMAS} 2007), Honolulu, Hawaii, USA, May 14-18, 2007},
  pages        = {193},
  publisher    = {{IFAAMAS}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1329125.1329359},
  doi          = {10.1145/1329125.1329359},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/atal/JordanKW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atal/KiekintveldMJW07,
  author       = {Christopher Kiekintveld and
                  Jason Miller and
                  Patrick R. Jordan and
                  Michael P. Wellman},
  editor       = {Edmund H. Durfee and
                  Makoto Yokoo and
                  Michael N. Huhns and
                  Onn Shehory},
  title        = {Forecasting market prices in a supply chain game},
  booktitle    = {6th International Joint Conference on Autonomous Agents and Multiagent
                  Systems {(AAMAS} 2007), Honolulu, Hawaii, USA, May 14-18, 2007},
  pages        = {234},
  publisher    = {{IFAAMAS}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1329125.1329408},
  doi          = {10.1145/1329125.1329408},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/atal/KiekintveldMJW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atal/JordanKMW06,
  author       = {Patrick R. Jordan and
                  Christopher Kiekintveld and
                  Jason Miller and
                  Michael P. Wellman},
  editor       = {Maria Fasli and
                  Onn Shehory},
  title        = {Market Efficiency, Sales Competition, and the Bullwhip Effect in the
                  {TAC} {SCM} Tournaments},
  booktitle    = {Agent-Mediated Electronic Commerce. Automated Negotiation and Strategy
                  Design for Electronic Markets, {AAMAS} 2006 Workshop, {TADA/AMEC}
                  2006, Hakodate, Japan, May 9, 2006, Selected and Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4452},
  pages        = {62--74},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-72502-2\_5},
  doi          = {10.1007/978-3-540-72502-2\_5},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/atal/JordanKMW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigecom/KiekintveldMJW06,
  author       = {Christopher Kiekintveld and
                  Jason Miller and
                  Patrick R. Jordan and
                  Michael P. Wellman},
  editor       = {Joan Feigenbaum and
                  John C.{-}I. Chuang and
                  David M. Pennock},
  title        = {Controlling a supply chain agent using value-based decomposition},
  booktitle    = {Proceedings 7th {ACM} Conference on Electronic Commerce (EC-2006),
                  Ann Arbor, Michigan, USA, June 11-15, 2006},
  pages        = {208--217},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1134707.1134730},
  doi          = {10.1145/1134707.1134730},
  timestamp    = {Tue, 27 Nov 2018 11:56:48 +0100},
  biburl       = {https://dblp.org/rec/conf/sigecom/KiekintveldMJW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigecom/VorobeychikKW06,
  author       = {Yevgeniy Vorobeychik and
                  Christopher Kiekintveld and
                  Michael P. Wellman},
  editor       = {Joan Feigenbaum and
                  John C.{-}I. Chuang and
                  David M. Pennock},
  title        = {Empirical mechanism design: methods, with application to a supply-chain
                  scenario},
  booktitle    = {Proceedings 7th {ACM} Conference on Electronic Commerce (EC-2006),
                  Ann Arbor, Michigan, USA, June 11-15, 2006},
  pages        = {306--315},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1134707.1134741},
  doi          = {10.1145/1134707.1134741},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigecom/VorobeychikKW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ci/WellmanESVKS05,
  author       = {Michael P. Wellman and
                  Joshua Estelle and
                  Satinder Singh and
                  Yevgeniy Vorobeychik and
                  Christopher Kiekintveld and
                  Vishal Soni},
  title        = {Strategic Interactions in a Supply Chain Game},
  journal      = {Comput. Intell.},
  volume       = {21},
  number       = {1},
  pages        = {1--26},
  year         = {2005},
  url          = {https://doi.org/10.1111/j.0824-7935.2005.00263.x},
  doi          = {10.1111/J.0824-7935.2005.00263.X},
  timestamp    = {Tue, 19 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ci/WellmanESVKS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/KiekintveldVW05,
  author       = {Christopher Kiekintveld and
                  Yevgeniy Vorobeychik and
                  Michael P. Wellman},
  editor       = {Han La Poutr{\'{e}} and
                  Norman M. Sadeh and
                  Sverker Janson},
  title        = {An Analysis of the 2004 Supply Chain Management Trading Agent Competition},
  booktitle    = {Agent-Mediated Electronic Commerce. Designing Trading Agents and Mechanisms
                  - {AAMAS} 2005 Workshop, {AMEC} 2005, Utrecht, Netherlands, July 25,
                  2005, and {IJCAI} 2005 Workshop, {TADA} 2005, Edinburgh, UK, August
                  1, 2005, Selected and Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3937},
  pages        = {99--112},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11888727\_8},
  doi          = {10.1007/11888727\_8},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcai/KiekintveldVW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigecom/KiekintveldWSS04,
  author       = {Christopher Kiekintveld and
                  Michael P. Wellman and
                  Satinder Singh and
                  Vishal Soni},
  title        = {Value-driven procurement in the {TAC} supply chain game},
  journal      = {SIGecom Exch.},
  volume       = {4},
  number       = {3},
  pages        = {9--18},
  year         = {2004},
  url          = {https://doi.org/10.1145/1120701.1120704},
  doi          = {10.1145/1120701.1120704},
  timestamp    = {Tue, 19 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigecom/KiekintveldWSS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aips/KiekintveldWSEVSR04,
  author       = {Christopher Kiekintveld and
                  Michael P. Wellman and
                  Satinder Singh and
                  Joshua Estelle and
                  Yevgeniy Vorobeychik and
                  Vishal Soni and
                  Matthew R. Rudary},
  editor       = {Shlomo Zilberstein and
                  Jana Koehler and
                  Sven Koenig},
  title        = {Distributed Feedback Control for Decision Making on Supply Chains},
  booktitle    = {Proceedings of the Fourteenth International Conference on Automated
                  Planning and Scheduling {(ICAPS} 2004), June 3-7 2004, Whistler, British
                  Columbia, Canada},
  pages        = {384--392},
  publisher    = {{AAAI}},
  year         = {2004},
  url          = {http://www.aaai.org/Library/ICAPS/2004/icaps04-045.php},
  timestamp    = {Tue, 19 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aips/KiekintveldWSEVSR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cg/EstelleVWSKS04,
  author       = {Joshua Estelle and
                  Yevgeniy Vorobeychik and
                  Michael P. Wellman and
                  Satinder Singh and
                  Christopher Kiekintveld and
                  Vishal Soni},
  editor       = {H. Jaap van den Herik and
                  Yngvi Bj{\"{o}}rnsson and
                  Nathan S. Netanyahu},
  title        = {Strategic Interactions in the {TAC} 2003 Supply Chain Tournament},
  booktitle    = {Computers and Games, 4th International Conference, {CG} 2004, Ramat-Gan,
                  Israel, July 5-7, 2004, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3846},
  pages        = {316--331},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11674399\_22},
  doi          = {10.1007/11674399\_22},
  timestamp    = {Tue, 19 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cg/EstelleVWSKS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics