Search Results - "Kiekintveld, Christopher"

Refine Results
  1. 1

    Improving resource allocation strategies against human adversaries in security games: An extended study by Yang, Rong, Kiekintveld, Christopher, Ordóñez, Fernando, Tambe, Milind, John, Richard

    Published in Artificial intelligence (01-02-2013)
    “…Stackelberg games have garnered significant attention in recent years given their deployment for real world security. Most of these systems, such as ARMOR,…”
    Get full text
    Journal Article
  2. 2
  3. 3

    Software Assistants for Randomized Patrol Planning for the LAX Airport Police and the Federal Air Marshal Service by Jain, Manish, Tsai, Jason, Pita, James, Kiekintveld, Christopher, Rathi, Shyamsunder, Tambe, Milind, Ordóñez, Fernando

    Published in Interfaces (Providence) (01-07-2010)
    “…The increasing threat of terrorism makes security at major locations of economic or political importance a major concern. Limited security resources prevent…”
    Get full text
    Journal Article
  4. 4

    STRATEGIC INTERACTIONS IN A SUPPLY CHAIN GAME by Wellman, Michael P., Estelle, Joshua, Singh, Satinder, Vorobeychik, Yevgeniy, Kiekintveld, Christopher, Soni, Vishal

    Published in Computational intelligence (01-02-2005)
    “…The TAC 2003 supply‐chain game presented automated trading agents with a challenging strategic problem. Embedded within a high‐dimensional stochastic…”
    Get full text
    Journal Article
  5. 5

    Solving zero-sum one-sided partially observable stochastic games by Horák, Karel, Bošanský, Branislav, Kovařík, Vojtěch, Kiekintveld, Christopher

    Published in Artificial intelligence (01-03-2023)
    “…Many real-world situations are dynamic, with long-term interactions between multiple agents with uncertainty and limited observations. The agents must reason…”
    Get full text
    Journal Article
  6. 6

    A Systematic Approach for Temporal Traffic Selection Across Various Applications by Sharmin, Nazia, Acosta, Jaime, Kiekintveld, Christopher

    “…The paper presents a framework that analyzes temporal traffic in applications, with a focus on statistical analysis and traffic classification. The framework…”
    Get full text
    Conference Proceeding
  7. 7

    Network discovery and scanning strategies and the Dark Triad by Jones, Daniel N., Padilla, Edgar, Curtis, Shelby R., Kiekintveld, Christopher

    Published in Computers in human behavior (01-09-2021)
    “…Research examining cybercrime and personality is a critical, but understudied topic. From an applied perspective, such research will inform better practice in…”
    Get full text
    Journal Article
  8. 8

    Optimizing honeypot strategies against dynamic lateral movement using partially observable stochastic games by Horák, Karel, Bošanský, Branislav, Tomášek, Petr, Kiekintveld, Christopher, Kamhoua, Charles

    Published in Computers & security (01-11-2019)
    “…Partially observable stochastic games (POSGs) are a general game-theoretic model for capturing dynamic interactions where players have partial information. The…”
    Get full text
    Journal Article
  9. 9

    Case Studies of Network Defense with Attack Graph Games by Durkota, Karel, Lisy, Viliam, Kiekintveld, Christopher, Bosansky, Branislav, Pechoucek, Michal

    Published in IEEE intelligent systems (01-09-2016)
    “…The increasing complexity of securing modern computer networks makes decision support systems an important tool for administrators. A challenge many existing…”
    Get full text
    Journal Article
  10. 10

    Hardening networks against strategic attackers using attack graph games by Durkota, Karel, Lisý, Viliam, Bošanský, Branislav, Kiekintveld, Christopher, Pěchouček, Michal

    Published in Computers & security (01-11-2019)
    “…We consider the problem faced by a network administrator (defender) when deploying limited security resources to protect a network against a strategic…”
    Get full text
    Journal Article
  11. 11

    An Exact Double-Oracle Algorithm for Zero-Sum Extensive-Form Games with Imperfect Information by Bosansky, B., Kiekintveld, C., Lisy, V., Pechoucek, M.

    “…Developing scalable solution algorithms is one of the central problems in computational game theory. We present an iterative algorithm for computing an exact…”
    Get full text
    Journal Article
  12. 12

    Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness by Korzhyk, D., Yin, Z., Kiekintveld, C., Conitzer, V., Tambe, M.

    “…There has been significant recent interest in game-theoretic approaches to security, with much of the recent research focused on utilizing the leader-follower…”
    Get full text
    Journal Article
  13. 13

    Honeypot Allocation for Cyber Deception Under Uncertainty by Anwar, Ahmed H., Kamhoua, Charles A., Leslie, Nandi O., Kiekintveld, Christopher

    “…Cyber deception aims to misrepresent the state of the network to mislead the attackers, falsify their reconnaissance conclusions, and deflect them away from…”
    Get full text
    Journal Article
  14. 14

    Local Context Normalization: Revisiting Local Normalization by Ortiz, Anthony, Robinson, Caleb, Morris, Dan, Fuentes, Olac, Kiekintveld, Christopher, Hassan, Md Mahmudulla, Jojic, Nebojsa

    “…Normalization layers have been shown to improve convergence in deep neural networks, and even add useful inductive biases. In many vision applications the…”
    Get full text
    Conference Proceeding
  15. 15

    The Dark Triad and strategic resource control in a competitive computer game by Curtis, Shelby R., Basak, Anjon, Carre, Jessica R., Bošanský, Branislav, Černý, Jakub, Ben-Asher, Noam, Gutierrez, Marcus, Jones, Daniel N., Kiekintveld, Christopher

    Published in Personality and individual differences (01-01-2021)
    “…Strategic resource control poses a trade-off to attackers and defenders. Actions that reclaim control of a resource pose costs, but control of a resource by an…”
    Get full text
    Journal Article
  16. 16

    On the Defense Against Adversarial Examples Beyond the Visible Spectrum by Ortiz, Anthony, Fuentes, Olac, Rosario, Dalton, Kiekintveld, Christopher

    “…Machine learning (ML) models based on RGB images are vulnerable to adversarial attacks, representing a potential cyber threat to the user. Adversarial examples…”
    Get full text
    Conference Proceeding
  17. 17

    Leveraging Bayesian Multinomial Models for Effective Targeted Cyber-Deception Strategies by Sharmin, Nazia, Kiekintveld, Christopher

    “…Cyber deception strategies play a vital role in fortifying computer networks and systems against malicious intrusions by misleading attackers. This study…”
    Get full text
    Conference Proceeding
  18. 18

    Enhancing IoT Device Security: Predicting and Analyzing Reconnaissance Attacks Using Flags and Time-Based Attributes by Sharmin, Nazia, Kiekintveld, Christopher

    “…This study delves into the comprehensive analysis of reconnaissance attacks targeting IoT devices, leveraging time-based characteristics and flag attributes…”
    Get full text
    Conference Proceeding
  19. 19

    Performance Comparison and Implementation of Bayesian Variants for Network Intrusion Detection by Ige, Tosin, Kiekintveld, Christopher

    “…Bayesian classifiers perform well when each of the features is completely independent of the other which is not always valid in real world application. The aim…”
    Get full text
    Conference Proceeding
  20. 20

    Optimizing Crop Recommendations for Sustainable Agriculture: Leveraging Bayesian Networks in a Smart Crop Recommendation System by Sharmin, Nazia, Kiekintveld, Christopher

    “…Agriculture faces challenges in terms of productivity and sustainability, particularly in developing countries. This paper presents a smart crop recommendation…”
    Get full text
    Conference Proceeding