[HTML][HTML] Don't click: towards an effective anti-phishing training. A comparative literature review

D Jampen, G Gür, T Sutter, B Tellenbach - Human-centric Computing and …, 2020 - Springer
Email is of critical importance as a communication channel for both business and personal
matters. Unfortunately, it is also often exploited for phishing attacks. To defend against such …

Stackelberg security games: Looking beyond a decade of success

A Sinha, F Fang, B An, C Kiekintveld, M Tambe - 2018 - ink.library.smu.edu.sg
Abstract The Stackelberg Security Game (SSG) model has been immensely influential in
security research since it was introduced roughly a decade ago. Furthermore, deployed SSG …

From physical security to cybersecurity

A Sinha, TH Nguyen, D Kar, M Brown… - Journal of …, 2015 - academic.oup.com
Security is a critical concern around the world. In many domains from cybersecurity to
sustainability, limited security resources prevent complete security coverage at all times …

[PDF][PDF] When Security Games Go Green: Designing Defender Strategies to Prevent Poaching and Illegal Fishing.

F Fang, P Stone, M Tambe - IJCAI, 2015 - teamcore.seas.harvard.edu
Building on the successful applications of Stackelberg Security Games (SSGs) to protect
infrastructure, researchers have begun focusing on applying game theory to green security …

[PDF][PDF] Adaptive resource allocation for wildlife protection against illegal poachers.

R Yang, BJ Ford, M Tambe, A Lemieux - Aamas, 2014 - teamcore.seas.harvard.edu
Illegal poaching is an international problem that leads to the extinction of species and the
destruction of ecosystems. As evidenced by dangerously dwindling populations of …

Behavioral analysis of insider threat: A survey and bootstrapped prediction in imbalanced data

A Azaria, A Richardson, S Kraus… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
The problem of insider threat is receiving increasing attention both within the computer
science community as well as government and industry. This paper starts by presenting a …

Deploying paws: Field optimization of the protection assistant for wildlife security

F Fang, T Nguyen, R Pickles, W Lam… - Proceedings of the …, 2016 - ojs.aaai.org
Poaching is a serious threat to the conservation of key species and whole ecosystems.
While conducting foot patrols is the most commonly used approach in many countries to …

Artificial intelligence for social good: A survey

ZR Shi, C Wang, F Fang - arXiv preprint arXiv:2001.01818, 2020 - arxiv.org
Artificial intelligence for social good (AI4SG) is a research theme that aims to use and
advance artificial intelligence to address societal issues and improve the well-being of the …

A survey of opponent modeling in adversarial domains

S Nashed, S Zilberstein - Journal of Artificial Intelligence Research, 2022 - jair.org
Opponent modeling is the ability to use prior knowledge and observations in order to predict
the behavior of an opponent. This survey presents a comprehensive overview of existing …

Patrolling security games: Definition and algorithms for solving large instances with single patroller and single intruder

N Basilico, N Gatti, F Amigoni - Artificial intelligence, 2012 - Elsevier
Security games are gaining significant interest in artificial intelligence. They are
characterized by two players (a defender and an attacker) and by a set of targets the …