Deceiving cyber adversaries: A game theoretic approach A Schlenker, O Thakoor, H Xu, M Tambe, P Vayanos, F Fang, ... International Conference on Autonomous Agents and Multiagent Systems, 2018 | 57 | 2018 |
One size does not fit all: A game-theoretic approach for dynamically and effectively screening for threats M Brown, A Sinha, A Schlenker, M Tambe Proceedings of the AAAI Conference on Artificial Intelligence 30 (1), 2016 | 51 | 2016 |
Don’t bury your head in warnings: A game-theoretic approach for intelligent allocation of cyber-security alerts A Schlenker, H Xu, M Guirguis, C Kiekintveld, A Sinha, M Tambe, S Sonya, ... | 24 | 2017 |
Get me to my gate on time: Efficiently solving general-sum bayesian threat screening games A Schlenker, M Brown, A Sinha, M Tambe, R Mehta Proceedings of the Twenty-second European Conference on Artificial …, 2016 | 14 | 2016 |
Game theoretic deception and threat screening for cyber security A Schlenker University of Southern California, 2018 | 2 | 2018 |
Towards a game-theoretic framework for intelligent cyber-security alert allocation A Schlenker, H Xu, M Guirguis, M Tambe, A Sinha, C Kiekintveld, S Sonya, ... Proceedings of the 3rd IJCAI workshop on Algorithmic Game Theory, Melbourne …, 2017 | 2 | 2017 |
Towards thwarting social engineering attacks ZR Shi, A Schlenker, B Hay, F Fang CoRR, abs/1901.00586, 2019 | 1 | 2019 |
Scaling-up Stackelberg security games applications using approximations A Sinha, A Schlenker, D Dmello, M Tambe International Conference on Decision and Game Theory for Security, 432-452, 2018 | 1 | 2018 |
Game Theoretic Cyber Deception to Foil Adversarial Network Reconnaissance A Schlenker, O Thakoor, H Xu, F Fang, M Tambe, P Vayanos Adaptive Autonomous Secure Cyber Systems, 183-204, 2020 | | 2020 |
Game-Theoretic Threat Screening and Deceptive Techniques for Cyber Defense A Schlenker Proceedings of the AAAI Conference on Artificial Intelligence 32 (1), 2018 | | 2018 |
Practical Scalability for Stackelberg Security Games A Sinha, A Schlenker, D Dmello, M Tambe arXiv preprint arXiv:1711.04208, 2017 | | 2017 |
Generalized Mandelbrot Sets A Schlenker | | 2014 |
Multi-Agent Patrolling on a Budget: Finding the Best Team for the Job SM Mc Carthy, A Schlenker, M Tambe, C Kiekintveld | | |
Draining the Water Hole: Mitigating Social Engineering Attacks ZR Shi, A Schlenker, B Hay, F Fang | | |