[HTML][HTML] A review of attacker-defender games: Current state and paths forward

K Hunt, J Zhuang - European Journal of Operational Research, 2024 - Elsevier
In this article, we review the literature which proposes attacker-defender games to protect
against strategic adversarial threats. More specifically, we follow the systematic literature …

Cooperative multiagent patrolling for detecting multiple illegal actions under uncertainty

A Beynier - 2016 IEEE 28th International Conference on Tools …, 2016 - ieeexplore.ieee.org
Multiagent patrolling in adversarial domains has been widely studied in recent years.
However, little attention has been paid to cooperation issues between patrolling agents …

A multiagent planning approach for cooperative patrolling with non-stationary adversaries

A Beynier - International Journal on Artificial Intelligence Tools, 2017 - World Scientific
Multiagent patrolling is the problem faced by a set of agents that have to visit a set of sites to
prevent or detect some threats or illegal actions. Although it is commonly assumed that …

Technology Adoption and Information Disclosure in Attacker-Defender Settings: Models and Experiments

KJ Hunt - 2023 - search.proquest.com
Security and defense agencies throughout the world continue to invest in new technologies
to detect and counteract threats. Such technologies range from new screening systems at …

[PDF][PDF] Contributions to Multiagent Decision Making Under Uncertainty and Partial Observability

A Beynier - 2018 - hal.science
The purpose of Artificial Intelligence (AI) is to set up autonomous systems endowed with
smart cognitive functions enabling them to perform complex tasks while interacting with their …

[PDF][PDF] Algorithmic analysis of patrolling games

T Lamser - Bachelor's thesis, Fac ulty of Informatics, Masaryk …, 2016 - is.muni.cz
Patrolling games are games of two players (defender and attacker) on a graph. Our goal is
to compute the strategy of the defender. We introduce regular strategies that are better and …

Real-time biomedical instance selection

C Zhang, R DAmbrosio, P Soda - 2014 IEEE 27th International …, 2014 - ieeexplore.ieee.org
Computer-based medical systems play a very important role in medical applications
because they can strongly support the physicians in the decision making process. The large …

Network Modeling and Analysis of Data and Relationships: Developing Cyber and Complexity Science

C Arney, N Vanatta, M Sobiesk - Military Applications of Data …, 2018 - taylorfrancis.com
This chapter focuses on network modeling and data analytics as they relate to two basic-
science issues with associated applications within the military—cyber science and …

Algoritmická analýza bezpečnostních her

T Lamser - 2016 - is.muni.cz
Anotace Patrolovací hry jsou hry dvou hráčů (obránce a útočníka) na grafu. Naším cílem je
vypočítat strategii obránce. Představujeme regulární strategie, které jsou lepší, avšak …