|
[1]Abhyankar, A.R., S.A. Soman, and S.A. Khaparde (2006). “Optimization Approach to Real Power Tracing: an Application to Transmission Fixed Cost Allocation,” IEEE Transactions on Power Systems, Vol.21, Issue 3, pp.1350 – 1361. [2]Alpcan, T. and T. Basar (2003). “A Game Theoretic Approach to Decision and Analysis in Network Intrusion Detection,” IEEE Conference on Decision and Control, pp. 2595–2600. [3]Anthony, P. and N. R. Jennings (2003). “Developing a Bidding Agent for Multiple Heterogeneous Auctions,” ACM Transaction on Internet Technology. Vol.3, pp.185–217. [4]Avin, C. and C. Brito (2004). “Efficient and Robust Query Processing in Dynamic Environments Using Random Walk Techniques,” Proceedings Third International Information Processing in Sensor Networks, pp.277–286. [5]Basar, T. and G. J. Olsder (1999). Dynamic Noncooperative Game Theory, Philadelphia, Academic Press. [6]Berkovitz, L. D. and M. Dresher (1959). “A Game-Theory Analysis of Tactical Air War,” Operations Research, Vol.7, pp.599–620. [7]Bier, V. M., A. Louis, Jr. Cox, and M. Azaiez Naceur (2006). “Why Both Game Theory and Reliability Theory Are Important in Defending Infrastructure against Intelligent Attacks, ” Statistical Methods in Counterterrorism, Chapter 1, pp.23–40. [8]Bier, V. M., S. Oliveros, and L. Samuelson (2007). “Choosing What to Protect: Strategic Defensive Allocation Against an Unknown Attacker,” Journal of Public Economic Theory, Vol.9, pp.563–587. [9]Burke, D. A. (1999). “Towards a Game Theoretic Model of Information Warfare,” Master’s Thesis, Air Force Institute of Technology, Air University. [10]Cai, J. and U. Pooch (2004). “Allocate Fair Payoff for Cooperation in Wireless Ad Hoc Networks Using Shapley Value,” Proceedings of the 18th International Parallel and Distributed Processing Sym, pp.219–227. [11]Cavusoglu, H., B. Mishra, and S. Raghunathan (2005). “The Value of Intrusion Detection Systems in Information Technology Security Architecture,” Information Systems Research, Vol.16, pp.28–46. [12]Chen, Y-M, D. Wu, and C-K. Wu (2008). “A Game Theory Approach for an Emergency Management Security Advisory System,” IEEE International Conference on Intelligence and Security Informatics, pp.116–121. [13]Conejo, A. J., J. Contreras, D. A. Lima, and A. Padilha-Feltrin (2007). “Zbus Transmission Network Cost Allocation,” IEEE Transactions on Power Systems, Vol.22, Issue 1, pp.342 – 349. [14]Dighe, Nikhil S., J. Z. and V. M. Bier (2009). “Secrecy in Defensive Allocations as a Strategy for Achieving more Cost-effective Attacker Deterrence,” International Journal of Performability Engineering, Vol.5, No.1, pp.31–43. [15]Dixit, A. and S. Skeath (2001). Games of Strategy. W. W. Norton & Company. [16]Faratin, P., M. Klein, H. Sayama, and Y. Bar-Yam (2001). “Simple Negotiating Agents in Complex Games: Emergent Equilibria and Dominance of Strategies,” Proceedings Eighth Int’l Workshop Agent Theories, Architectures, and Languages, pp.42–53. [17]Ferber, Jacques (1998). Multi-Agent Systems-An Introduction to Distributed Artificial Intelligence. Addision–Wesley, p.9. [18]Fiedrich, F., F. Gehbauer, and U. Rickers (2000). “Optimized Resource Allocation for Emergency Response after Earthquake Disasters,” Safety Science, Vol.35, pp.41–57. [19]Fricker, Ronald D. (2006). Game Theory in an Age of Terrorism: How Can Statisticians Contribute? Statistical Methods in Counterterrorism: Game Theory, Modeling, Syndromic Surveillance, and Biometric Authentication, Chapter 1, Springer. [20]Friedman, J.W. (1986). Game Theory with Applications to Economics. Oxford University Press. [21]Genesereth, M. R., M. Ginsberg, and J. S. Rosenschein (1986). “Cooperation without Communication,” The Fifth National Conference of Artificial Intelligence, pp.52–57. [22]Gibbon, R. (1992). A Primer in Game Theory. Harvester Wheatsheaf. [23]Goemans, M. X. and M. Skutella (2004). “Cooperative facility location games, “Journal of Algorithms, Vol.50, pp.194–214. [24]Gupta, U. and N. Ranganathan (2006). “Social Fairness in Multi-Emergency Resource Management,” Proceedings IEEE Int’l Symp.Technology and Soc, pp.1–9. [25]Gupta U. and N. Ranganathan (2007). “Multievent Crisis Management Using Noncooperative Multistep Games,” IEEE Transactions on Computers, Vol.56, pp.577–589. [26]Hafez, M. Mohammed. (2006). “Rationality, Culture, and Structure in the Making of Suicide Bombers: A Preliminary Theoretical Synthesis and Illustrative Case Study,” Studies in Conflict and Terrorism, Vol.29, Issue 2, pp.165 – 185. [27]Hansen, T. (1974). “On the Approximation of Nash Equilibrium Points in an N-Person Non-Cooperative Game,” SIAM J. Applied Math, Vol.26, No.3, pp.622–637. [28]Jacobson, D. and H. E. Kaplan (2007). “Suicide Bombings and Targeted Killings in (Counter-) Terror Games,” The Journal of Conflict Resolution, Vol.51, Issue 5, pp.772–792. [29]Keromytis, A. D., M. Vishal, and D. Rubenstein (2004). “SOS: An Architecture for Mitigating DDoS Attacks,” IEEE Communications, Vol.22, pp.176–188. [30]Kirkpatrick, S. (1984). “Optimization by Simulated Annealing—Quantitative Studies,” Statistical Physics, Vol.34, pp.975–986. [31]Kodialam, M. T. and Lakshman, V. (2003). “Detecting Network Intrusions via Sampling: A Game Theoretic Approach,” IEEE INFOCOM Conferences, Vol.3, pp.1880–1889. [32]Kraus, S. (1997). “Negotiation and Cooperation in Multi-agent Environments,” Artificial Intelligence, Vol.94, pp.79–98. [33]Kraus, S. (2001). Strategic Negotiation in Multiagent Environments, MIT Press, Cambridge, Massachusetts. p.5. [34]Lemke, C. E. and J. T. Howson (1964). “Equilibrium Points of Bimatrix Games,” SIAM J. Applied Math., Vol.12, pp.413–423. [35]Lewis, H. W. (1997). Why Flip a Coin? : The Art and Science of Good Decisions. John Wiley and Sons. [36]Liu, P. and L. Li (2002). “A Game Theoretic Approach to Attack Prediction,” Technical Report, Penn State University [37]Liu, P. and W. Zang (2005). “Incentive-based Modeling and Inference of Attacker Intent, Objectives, and Strategies,” ACM Transactions on Information and System Security, Vol.8, pp.78–118. [38]Lo, V. M. (1988). “Heuristic Algorithms for Task Assignment in Distributed Systems,” IEEE Transactions on Computers, Vol.37, pp.1384–1397. [39]Lye, K. W. and J. Wing (2005). “Game Strategies in Network Security,” International Journal of Information Security, Vol.4, pp.71–86. [40]Mark, Harrison, (2006). “Bombers and Bystanders in Suicide Attacks in Israel 2000 to 2003,” Studies in Conflict and Terrorism, Vol.29, Issue 2, pp.187 – 206. [41]McKelvey, R. and A. McLennan (1996). “Computation of Equilibria in Finite Games,” Handbook of Computational Economics, pp.87–142. [42]McKelvey, R. D., M. Andrew, and T. L. Turocy (2007). Gambit: Software Tools for Game Theory, http://econweb.tamu.edu/gambit. [43]Mell, P., D. Marks, and M. McLarnon (2000). “A Denial-of-Service resistant intrusion detection architecture,” Computer Network, Vol.34, pp.641–658. [44]Melvin, D. (1981). The Mathematics of Game of Strategy Theory and Application. Dover Publication, Inc., New York. [45]Mishra, D. and B. Rangarajan (2005). “Cost Sharing in a Job Scheduling Problem Using the Shapley Value,” Proceedings of the 6th ACM conference on Electronic commerce, pp.232–239. [46]Nara, K. and Y. Hayashi (1999). “A Solution Algorithm Based on Multi-Stage Tabu Search for Nested Combinatorial Optimization Problem Dispersed Energy Storage and Generators,” Proceedings of IEEE Int’l Conference, Systems, Man, and Cybernetics, Vol.3, pp.551–556. [47]Nash, J. (1951). “Non-Cooperative Games,” Annals Math. second series, Vol.54, pp.286–295. [48]Nathan, S., M. Janusz, T. Milind, and S. Paul (2005). “The Future of Disaster Response: Humans Working with Multiagent Teams using DEFACTO,” Multi-Agent Programming. pp.197–215. [49]Osborne, M. J. and A. Rubinstein (1994). A Course in Game Theory. MIT Press. [50]Owen, G. (2001). Game Theory. 3rd Ed. New York, NY: Academic Press. [51]Papadimitriou, C. H. (1994). Computational Complexity. Addison-Wesley: Reading, MA. [52]Parsons, S. and M. Wooldridge (2002). “Game Theory and Decision Theory in Multi-Agent Systems,” Autonomous Agents and Multi-Agent Systems, Vol.5, pp.243–254. [53]Paruchuri, P., M. Tambe, F. Ord´o˜nez, and S. Kraus (2005). “Safety in Multiagent Systems by Policy Randomization,” The 2nd International Workshop on Safety and Security in Multiagent Systems (SASEMAS). pp.273–280. [54]Paruchuri, P., J. P. Pearce, M. Tambe, F. Ord´o˜nez, and S. Kraus (2007). “An Efficient Heuristic Approach for Security against Multiple Adversaries,” The 6th International Conference on Autonomous Agents and Multiagent Systems (AAMAS-2007). pp.181–190. [55]Paruchuri, P., J. P. Pearce, J. Marecki, M. Tambe, F. Ord´o˜nez, and S. Kraus (2008). “Playing Games for Security: An Efficient Exact Algorithm for Solving Bayesian Stackelberg Games,” The 7th International Conference on Autonomous Agents and Multiagent Systems (AAMAS-2008), pp.895–902. [56]Pelfrey, V. William. (2005). “The Cycle of Preparedness: Establishing a Framework to Prepare for Terrorist Threats,” Journal of Homeland Security and Emergency Management, Vol.2, Issue 1, article 5. [57]Perry, R.W. (2003). “Emergency Operations Centers in an Era of Terrorism: Policy and Management Functions,” Journal of Contingencies and Crisis Management, Vol.11, No.4, pp.151–159. [58]Ranganathan, N., U. Gupta, R. Shetty and A. Murugavel (2007). “An Automated Decision Support System Based on Game Theoretic Optimization for Emergency Management in Urban Environments,” Journal of Homeland Security and Emergency Management, Vol.4, Issue 2, article 1. [59]Rasmusen, E. (2007). Games and Information: an Introduction to Game Theory, Fourth Edition, Blackwell Publishing. [60]Rawling, G. (1991). Foundations of Genetic Algorithms. Morgan Kaufmann. [61]Raymond, T. (2008). Mumbai Terrorists Aided by Security Lapses, Technology” VOA News, Tuesday, 02 December 2008, http://www.voanews.com/english/ archive/2008-12/ 2008-12-02-voa33.cfm. [62]Reddick, C. G. (2007). “Homeland Security Preparedness and Planning in US City Governments: A Survey of City Managers,” Journal of Contingencies and Crisis Management, Vol.15, pp.157–167. [63]Risk Analysis and Management for Critical Asset Protection (RAMCAPSM) http://www.asme-iti.org/RAMCAP/RAMCAP_Plus_2.cfm [64]Rosenschein, J. S. and M. R. Genesereth (1985). “Deals among Rational Agents,” The Ninth International Joint Conference on Artificial Intelligence (IJCAI-85), Los Angeles, CA, pp.91–99. [65]Rosenschein, J. S. and G. Zlotkin (1994). Rules of Encounter: Designing Conventions for Automated Negotiation among Computers, The MIT Press: Cambridge, MA. [66]Schafer, W. A., J. M. Carroll, S. R. Haynes, and S. Abrams (2008). “Emergency Management Planning as Collaborative Community Work,“ Journal of Homeland Security and Emergency Management, Vol.5, Issue 1, Article 10. [67]Schechter, S. E. (2004). Computer Security Strength and Risk: a Quantitative Approach, PhD Thesis, Harvard University. [68]Schechter, S. E. (2005). “Toward Econometric Models of the Security Risk from Remote Attacks,” IEEE Security and Privacy, Vol.3, pp.40–44. [69]Schelling, T. C. (1980). The Strategy of Conflict, Harvard University Press. [70]Shaw, D. S., J. M. Post, and K. G. Ruby (1999). “Inside the Minds of the Insider,” Security Management, Vol.43, pp.34–44. [71]Sherif, M.R., I.W. Habib, M. Nagshineh, and P. Kermani (2000). “Adaptive Allocation of Resources and Call Admission Control for Wireless ATM Using Genetic Algorithms,” IEEE J. Selected Areas in Comm., Vol.18, pp.268–282. [72]Shi, Jin, Y. Lu, and L. Xie (2007). “Game Theory Based Optimization of Security Configuration,” 2007 International Conference on Computational Intelligence and Security, pp.799–803. [73]Stuckman, G. Evans and M. Mollaghasemi (1991). “Comparison of Global Search Methods for Design Optimization Using Simulation,” Proceedings of the 1991 Winter Simulation Conference, pp.937–944. [74]Subrahmanian V. S., P. Bonatti, J. Dix, T. Eiter, S. Kraus, F. Ozcan, and R. Ross (2000). Heterogeneous Agent Systems: Theory and Implementation. MIT Press, Cambridge, Massachusetts. [75]Sullivan, K. A. and S. H. Jacobson (2001). “A Convergence Analysis of Generalized Hill Climbing Algorithms,” IEEE Trans. Automatic Control, Vol.46, No.8, pp.1288–1293. [76]Sun, R. and I. Naveh (2004). “Simulating Organizational Decision-Making Using a Cognitively Realistic Agent Model,” Journal of Artificial Societies and Social Simulation, Vol.7, p.1–12. [77]Sun, W., X.W. Kong, Dequan H., and Xingang Y. (2008). “Information Security Problem Research Based on Game Theory,” International Symposium on Electronic Commerce and Security, pp.554–557. [78]Tessier, C., L. M. Chaudron, and J. Heinz (2001). Conflicting Agents–Conflict Management in Multi-Agent Systems, Kluwer Academic Publishers, USA. [79]Turoff, M., M. Chumer, V. B. Walle, and X. Yao (2004). “The Design of a Dynamic Emergency Response Management Information System (DERMIS),” Journal of Information Technology Theory and Application, Vol.5, pp.1–35. [80]Vetta, A. (2002). “Nash Equilibria in Competitive Societies, with Applications to Facility Location, Traffic Routing and Auctions,” Proceedings 43rd Annual IEEE Foundations of Computer Science, pp.416–425. [81]Vidal, J. M. (2007). Fundamentals of Multiagent Systems with NetLogo Examples, Textbook, accessed from http://jmvidal.cse.sc.edu/papers/mas-20070824.pdf. [82]Von, N. J. and O. Morgenstern (1944). Theory of Games and Economic Behaviour. Princeton University Press. [83]Weiss, G. (1999). Multiagent Systems – A Modern Approach to Distribution Artificial Intelligence, MIT Press. [84]Wenzlaff, K. (2004). Terrorism: Game Theory and Other Explanations, Working Paper, Philosophy and Economics at University of Bayreuth, accessed from http://www.karsten-wenzlaff.de/wp-content/uploads/2006/10/wenzlaff-game-theory-and-terrorism.pdf. [85]Wooldridge, M. (2002). An Introduction to MultiAgent Systems, John Wiley & Sons Ltd, pp.366. [86]Xia, Z-Y and S. Zhang (2003). “A Kind of Network Security Behavior Model Based on Game Theory,” 2003 International Conference on Parallel and Distributed Computing, Applications and Technologies, pp.950–954. [87]Zdansky, M. and J. Pozivil (2002). “Combination Genetic/Tabu Search Algorithm for Hybrid Flowshops Optimization,” Proceedings of Conference Scientific Computing Algorithms, pp.230–236. [88]Zhuang, J. and V. M. Bier (2007). “Balancing Terrorism and Natural Disasters—Defensive Strategy with Endogenous Attacker Effort,” Operations Research, Vol.55, No.5, pp.976–991. [89]Zhuang, J. and V. M. Bier (2009). Secrecy and Deception at Equilibrium with Applications to Anti-Terrorism Resource Allocation, Economics and Politics, Forthcoming. [90]Zolezzi, J. M. and H. Rudnick (2002). “Transmission Cost Allocation by Cooperative Games and Coalition Formation,” IEEE Transactions on power systems, Vol.41, pp.1008–1015. [91]Zou, C. C., W. Gong, and D. Towsley (2002). “Code Red Worm Propagation Modeling and Analysis,” Proceedings of the 9th ACM Symp, pp.138–147. [92]Symantec Corporation, http://www.symantec.com/index.jsp. [93]http://www.dhs.gov/index.shtm. [94]http://www.dtic.mil/doctrine/jel/doddict/data/d/01737.html. [95]http://www.dtic.mil/doctrine/jel/doddict/natoterm/d/00423.html. [96]http://create.usc.edu/research/risk_assessment.html.
|