1325 results in Communications, Information Theory and Security
PART II - DEPLOYED APPLICATIONS
-
- Book:
- Security and Game Theory
- Published online:
- 05 January 2012
- Print publication:
- 12 December 2011, pp 65-66
-
- Chapter
- Export citation
4 - Deployed ARMOR Protection: The Application of a Game-Theoretic Model for Security at the Los Angeles International Airport
- from PART II - DEPLOYED APPLICATIONS
-
-
- Book:
- Security and Game Theory
- Published online:
- 05 January 2012
- Print publication:
- 12 December 2011, pp 67-87
-
- Chapter
- Export citation
PART I - SECURITY EXPERTS' PERSPECTIVES
-
- Book:
- Security and Game Theory
- Published online:
- 05 January 2012
- Print publication:
- 12 December 2011, pp 25-26
-
- Chapter
- Export citation
Contents
-
- Book:
- Security and Game Theory
- Published online:
- 05 January 2012
- Print publication:
- 12 December 2011, pp vii-xii
-
- Chapter
- Export citation
7 - Coordinating Randomized Policies for Increasing the Security of Agent Systems
- from PART III - EFFICIENT ALGORITHMS FOR MASSIVE SECURITY GAMES
-
-
- Book:
- Security and Game Theory
- Published online:
- 05 January 2012
- Print publication:
- 12 December 2011, pp 131-155
-
- Chapter
- Export citation
2 - LAX – Terror Target: The History, the Reason, the Countermeasure
- from PART I - SECURITY EXPERTS' PERSPECTIVES
-
-
- Book:
- Security and Game Theory
- Published online:
- 05 January 2012
- Print publication:
- 12 December 2011, pp 27-50
-
- Chapter
- Export citation
Frontmatter
-
- Book:
- Security and Game Theory
- Published online:
- 05 January 2012
- Print publication:
- 12 December 2011, pp i-vi
-
- Chapter
- Export citation
6 - GUARDS: Game-Theoretic Security Allocation on a National Scale
- from PART II - DEPLOYED APPLICATIONS
-
-
- Book:
- Security and Game Theory
- Published online:
- 05 January 2012
- Print publication:
- 12 December 2011, pp 107-128
-
- Chapter
- Export citation
PART III - EFFICIENT ALGORITHMS FOR MASSIVE SECURITY GAMES
-
- Book:
- Security and Game Theory
- Published online:
- 05 January 2012
- Print publication:
- 12 December 2011, pp 129-130
-
- Chapter
- Export citation
References
-
- Book:
- Security and Game Theory
- Published online:
- 05 January 2012
- Print publication:
- 12 December 2011, pp 297-310
-
- Chapter
- Export citation
Security and Game Theory
- Algorithms, Deployed Systems, Lessons Learned
-
- Published online:
- 05 January 2012
- Print publication:
- 12 December 2011
8 - Computing Optimal Randomized Resource Allocations for Massive Security Games
- from PART III - EFFICIENT ALGORITHMS FOR MASSIVE SECURITY GAMES
-
-
- Book:
- Security and Game Theory
- Published online:
- 05 January 2012
- Print publication:
- 12 December 2011, pp 156-176
-
- Chapter
- Export citation
Index
-
- Book:
- Security and Game Theory
- Published online:
- 05 January 2012
- Print publication:
- 12 December 2011, pp 311-319
-
- Chapter
- Export citation
1 - Introduction and Overview of Security Games
-
-
- Book:
- Security and Game Theory
- Published online:
- 05 January 2012
- Print publication:
- 12 December 2011, pp 1-24
-
- Chapter
- Export citation
Acknowledgments
-
- Book:
- Security and Game Theory
- Published online:
- 05 January 2012
- Print publication:
- 12 December 2011, pp xiii-xiv
-
- Chapter
- Export citation
13 - Evaluating Deployed Decision-Support Systems for Security: Challenges, Analysis, and Approaches
- from PART IV - FUTURE RESEARCH
-
-
- Book:
- Security and Game Theory
- Published online:
- 05 January 2012
- Print publication:
- 12 December 2011, pp 254-284
-
- Chapter
- Export citation
12 - Stackelberg versus Nash in Security Games: Interchangeability, Equivalence, and Uniqueness
- from PART IV - FUTURE RESEARCH
-
-
- Book:
- Security and Game Theory
- Published online:
- 05 January 2012
- Print publication:
- 12 December 2011, pp 233-253
-
- Chapter
- Export citation
PART V - SHORT BIOS
-
- Book:
- Security and Game Theory
- Published online:
- 05 January 2012
- Print publication:
- 12 December 2011, pp 285-286
-
- Chapter
- Export citation
Author Bios
- from PART V - SHORT BIOS
-
- Book:
- Security and Game Theory
- Published online:
- 05 January 2012
- Print publication:
- 12 December 2011, pp 287-296
-
- Chapter
- Export citation
9 - Security Games with Arbitrary Schedules: A Branch-and-Price Approach
- from PART III - EFFICIENT ALGORITHMS FOR MASSIVE SECURITY GAMES
-
-
- Book:
- Security and Game Theory
- Published online:
- 05 January 2012
- Print publication:
- 12 December 2011, pp 177-190
-
- Chapter
- Export citation