default search action
Christopher Kiekintveld
Person information
- affiliation: University of Texas at El Paso, USA
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c92]Tosin Ige, Christopher Kiekintveld, Aritran Piplai:
An Investigation into the Performances of the State-of-the-art Machine Learning Approaches for Various Cyber-attack Detection: A Survey. EIT 2024: 135-144 - [i13]Tosin Ige, Christopher Kiekintveld, Aritran Piplai:
An Investigation into the Performances of the State-of-the-art Machine Learning Approaches for Various Cyber-attack Detection: A Survey. CoRR abs/2402.17045 (2024) - [i12]Tosin Ige, Christopher Kiekintveld, Aritran Piplai:
Deep Learning-Based Speech and Vision Synthesis to Improve Phishing Attack Detection through a Multi-layer Adaptive Framework. CoRR abs/2402.17249 (2024) - 2023
- [j22]Karel Horák, Branislav Bosanský, Vojtech Kovarík, Christopher Kiekintveld:
Solving zero-sum one-sided partially observable stochastic games. Artif. Intell. 316: 103838 (2023) - [j21]Shanto Roy, Nazia Sharmin, Jaime C. Acosta, Christopher Kiekintveld, Aron Laszka:
Survey and Taxonomy of Adversarial Reconnaissance Techniques. ACM Comput. Surv. 55(6): 112:1-112:38 (2023) - [c91]Tosin Ige, Christopher Kiekintveld:
Performance Comparison and Implementation of Bayesian Variants for Network Intrusion Detection. AIBThings 2023: 1-5 - [c90]Md. Abu Sayed, Ahmed H. Anwar, Christopher Kiekintveld, Charles A. Kamhoua:
Honeypot Allocation for Cyber Deception in Dynamic Tactical Networks: A Game Theoretic Approach. GameSec 2023: 195-214 - [c89]Nazia Sharmin, Jaime C. Acosta, Christopher Kiekintveld:
A Systematic Approach for Temporal Traffic Selection Across Various Applications. ICCCN 2023: 1-7 - [c88]Nazia Sharmin, Christopher Kiekintveld:
Enhancing IoT Device Security: Predicting and Analyzing Reconnaissance Attacks Using Flags and Time-Based Attributes. IOTSMS 2023: 23-30 - [c87]Nazia Sharmin, Christopher Kiekintveld:
Optimizing Crop Recommendations for Sustainable Agriculture: Leveraging Bayesian Networks in a Smart Crop Recommendation System. SECON 2023: 20-26 - [c86]Nazia Sharmin, Shanto Roy, Aron Laszka, Jaime C. Acosta, Christopher Kiekintveld:
Bayesian Models for Node-Based Inference Techniques. SysCon 2023: 1-8 - [i11]Shanto Roy, Nazia Sharmin, Mohammad Sujan Miah, Jaime C. Acosta, Christopher Kiekintveld, Aron Laszka:
Adversarial Reconnaissance Mitigation and Modeling. CoRR abs/2306.06769 (2023) - [i10]Md. Abu Sayed, Ahmed H. Anwar, Christopher Kiekintveld, Branislav Bosanský, Charles A. Kamhoua:
Cyber Deception against Zero-day Attacks: A Game Theoretic Approach. CoRR abs/2307.13107 (2023) - [i9]Md. Abu Sayed, Ahmed H. Anwar, Christopher Kiekintveld, Charles A. Kamhoua:
Honeypot Allocation for Cyber Deception in Dynamic Tactical Networks: A Game Theoretic Approach. CoRR abs/2308.11817 (2023) - [i8]Tosin Ige, Christopher Kiekintveld:
Performance Comparison and Implementation of Bayesian Variants for Network Intrusion Detection. CoRR abs/2308.11834 (2023) - [i7]David Milec, Viliam Lisý, Christopher Kiekintveld:
Generation of Games for Opponent Model Differentiation. CoRR abs/2311.16781 (2023) - 2022
- [j20]Ahmed H. Anwar, Charles A. Kamhoua, Nandi O. Leslie, Christopher Kiekintveld:
Honeypot Allocation for Cyber Deception Under Uncertainty. IEEE Trans. Netw. Serv. Manag. 19(3): 3438-3452 (2022) - [c85]Md. Abu Sayed, Ahmed H. Anwar, Christopher Kiekintveld, Branislav Bosanský, Charles A. Kamhoua:
Cyber Deception Against Zero-Day Attacks: A Game Theoretic Approach. GameSec 2022: 44-63 - 2021
- [j19]Daniel Jones, Edgar Padilla, Shelby R. Curtis, Christopher Kiekintveld:
Network discovery and scanning strategies and the Dark Triad. Comput. Hum. Behav. 122: 106799 (2021) - [c84]Jaime C. Acosta, Anjon Basak, Christopher Kiekintveld, Charles A. Kamhoua:
Lightweight On-Demand Honeypot Deployment for Cyber Deception. ICDF2C 2021: 294-312 - [i6]Shanto Roy, Nazia Sharmin, Jaime C. Acosta, Christopher Kiekintveld, Aron Laszka:
Survey and Taxonomy of Adversarial Reconnaissance Techniques. CoRR abs/2105.04749 (2021) - 2020
- [c83]Anthony Ortiz, Caleb Robinson, Dan Morris, Olac Fuentes, Christopher Kiekintveld, Md Mahmudulla Hassan, Nebojsa Jojic:
Local Context Normalization: Revisiting Local Normalization. CVPR 2020: 11273-11282 - [c82]Alonso Granados, Mohammad Sujan Miah, Anthony Ortiz, Christopher Kiekintveld:
A Realistic Approach for Network Traffic Obfuscation Using Adversarial Machine Learning. GameSec 2020: 45-57 - [c81]Ahmed H. Anwar, Nandi O. Leslie, Charles A. Kamhoua, Christopher Kiekintveld:
A Game Theoretic Framework for Software Diversity for Network Security. GameSec 2020: 297-311 - [c80]Mohammad Sujan Miah, Marcus Gutierrez, Oscar Veliz, Omkar Thakoor, Christopher Kiekintveld:
Concealing Cyber-Decoys using Two-Sided Feature Deception Games. HICSS 2020: 1-10 - [c79]Edgar Padilla, Jaime C. Acosta, Christopher D. Kiekintveld:
Cybersecurity Methodology for Specialized Behavior Analysis. ICDF2C 2020: 237-243 - [c78]Christopher Kiekintveld:
Game-Theoretic Perspectives and Algorithms for Cybersecurity. IH&MMSec 2020: 3 - [c77]Jaime C. Acosta, Anjon Basak, Christopher Kiekintveld, Nandi Leslie, Charles A. Kamhoua:
Cybersecurity Deception Experimentation System. SecDev 2020: 34-40 - [p2]Marcus Gutierrez, Christopher Kiekintveld:
Online Learning Methods for Controlling Dynamic Cyber Deception Strategies. Adaptive Autonomous Secure Cyber Systems 2020: 231-251 - [i5]Iffat Anjum, Mohammad Sujan Miah, Mu Zhu, Nazia Sharmin, Christopher Kiekintveld, William Enck, Munindar P. Singh:
Optimizing Vulnerability-Driven Honey Traffic Using Game Theory. CoRR abs/2002.09069 (2020) - [i4]Karel Horák, Branislav Bosanský, Vojtech Kovarík, Christopher Kiekintveld:
Solving Zero-Sum One-Sided Partially Observable Stochastic Games. CoRR abs/2010.11243 (2020)
2010 – 2019
- 2019
- [j18]Karel Durkota, Viliam Lisý, Branislav Bosanský, Christopher Kiekintveld, Michal Pechoucek:
Hardening networks against strategic attackers using attack graph games. Comput. Secur. 87 (2019) - [j17]Karel Horák, Branislav Bosanský, Petr Tomásek, Christopher Kiekintveld, Charles A. Kamhoua:
Optimizing honeypot strategies against dynamic lateral movement using partially observable stochastic games. Comput. Secur. 87 (2019) - [c76]Omkar Thakoor, Milind Tambe, Phebe Vayanos, Haifeng Xu, Christopher Kiekintveld:
General-Sum Cyber Deception Games under Partial Attacker Valuation Information. AAMAS 2019: 2215-2217 - [c75]Marcus Gutierrez, Jakub Cerný, Noam Ben-Asher, Efrat Aharonov-Majar, Branislav Bosanský, Christopher Kiekintveld, Cleotilde Gonzalez:
Evaluating Models of Human Behavior in an Adversarial Multi-Armed Bandit Problem. CogSci 2019: 394-400 - [c74]Anjon Basak, Charles A. Kamhoua, Sridhar Venkatesan, Marcus Gutierrez, Ahmed H. Anwar, Christopher Kiekintveld:
Identifying Stealthy Attackers in a Game Theoretic Framework Using Deception. GameSec 2019: 21-32 - [c73]Omkar Thakoor, Milind Tambe, Phebe Vayanos, Haifeng Xu, Christopher Kiekintveld, Fei Fang:
Cyber Camouflage Games for Strategic Deception. GameSec 2019: 525-541 - [c72]Karel Horák, Branislav Bosanský, Christopher Kiekintveld, Charles A. Kamhoua:
Compact Representation of Value Function in Partially Observable Stochastic Games. IJCAI 2019: 350-356 - [i3]Karel Horák, Branislav Bosanský, Christopher Kiekintveld, Charles A. Kamhoua:
Compact Representation of Value Function in Partially Observable Stochastic Games. CoRR abs/1903.05511 (2019) - [i2]Anthony Ortiz, Caleb Robinson, Dan Morris, Olac Fuentes, Christopher Kiekintveld, Mahmudulla Hassan, Nebojsa Jojic:
Local Context Normalization: Revisiting Local Normalization. CoRR abs/1912.05845 (2019) - 2018
- [c71]Moinul Morshed Porag Chowdhury, Christopher Kiekintveld, Tran Cao Son, William Yeoh:
Bidding Strategy for Periodic Double Auctions Using Monte Carlo Tree Search. AAMAS 2018: 1897-1899 - [c70]Anthony Ortiz, Alonso Granados, Olac Fuentes, Christopher Kiekintveld, Dalton S. Rosario, Zachary Bell:
Integrated Learning and Feature Selection for Deep Neural Networks in Multispectral Images. CVPR Workshops 2018: 1196-1205 - [c69]Anjon Basak, Marcus Gutierrez, Christopher Kiekintveld:
Algorithms for Subgame Abstraction with Applications to Cyber Defense. GameSec 2018: 556-568 - [c68]Anjon Basak, Jakub Cerný, Marcus Gutierrez, Shelby R. Curtis, Charles A. Kamhoua, Daniel Jones, Branislav Bosanský, Christopher Kiekintveld:
An Initial Study of Targeted Personality Models in the FlipIt Game. GameSec 2018: 623-636 - [c67]Moinul Morshed Porag Chowdhury, Christopher Kiekintveld, Son Tran, William Yeoh:
Bidding in Periodic Double Auctions Using Heuristics and Dynamic Monte Carlo Tree Search. IJCAI 2018: 166-172 - [c66]Arunesh Sinha, Fei Fang, Bo An, Christopher Kiekintveld, Milind Tambe:
Stackelberg Security Games: Looking Beyond a Decade of Success. IJCAI 2018: 5494-5501 - [c65]Anthony Ortiz, Olac Fuentes, Dalton S. Rosario, Christopher Kiekintveld:
On the Defense Against Adversarial Examples Beyond the Visible Spectrum. MILCOM 2018: 1-5 - [c64]Jakub Cerný, Branislav Bosanský, Christopher Kiekintveld:
Incremental Strategy Generation for Stackelberg Equilibria in Extensive-Form Games. EC 2018: 151-168 - 2017
- [c63]Qingyu Guo, Bo An, Branislav Bosanský, Christopher Kiekintveld:
Strategic Information Revelation and Commitment in Security Games. AAAI Workshops 2017 - [c62]Marcus Paul Gutierrez, Christopher Kiekintveld:
Adapting Honeypot Configurations to Detect Evolving Exploits. AAAI Workshops 2017 - [c61]Marcus Gutierrez, Christopher Kiekintveld:
Adapting with Honeypot Configurations to Detect Evolving Exploits. AAMAS 2017: 1565-1567 - [c60]Karel Durkota, Viliam Lisý, Christopher Kiekintveld, Karel Horák, Branislav Bosanský, Tomás Pevný:
Optimal Strategies for Detecting Data Exfiltration by Internal and External Attackers. GameSec 2017: 171-192 - [c59]Aaron Schlenker, Haifeng Xu, Mina Guirguis, Christopher Kiekintveld, Arunesh Sinha, Milind Tambe, Solomon Y. Sonya, Darryl Balderas, Noah Dunstatter:
Don't Bury your Head in Warnings: A Game-Theoretic Approach for Intelligent Allocation of Cyber-security Alerts. IJCAI 2017: 381-387 - [c58]Qingyu Guo, Bo An, Branislav Bosanský, Christopher Kiekintveld:
Comparing Strategic Secrecy and Stackelberg Commitment in Security Games. IJCAI 2017: 3691-3699 - [e2]Stefan Rass, Bo An, Christopher Kiekintveld, Fei Fang, Stefan Schauer:
Decision and Game Theory for Security - 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings. Lecture Notes in Computer Science 10575, Springer 2017, ISBN 978-3-319-68710-0 [contents] - 2016
- [j16]Karel Durkota, Viliam Lisý, Christopher Kiekintveld, Branislav Bosanský, Michal Pechoucek:
Case Studies of Network Defense with Attack Graph Games. IEEE Intell. Syst. 31(5): 24-30 (2016) - [c57]Jiri Cermak, Branislav Bosanský, Karel Durkota, Viliam Lisý, Christopher Kiekintveld:
Using Correlated Strategies for Computing Stackelberg Equilibria in Extensive-Form Games. AAAI 2016: 439-445 - [c56]Marcus Paul Gutierrez, Christopher Kiekintveld:
Bandits for Cybersecurity: Adaptive Intrusion Detection Using Honeypots. AAAI Workshop: Artificial Intelligence for Cyber Security 2016 - [c55]Mengchen Zhao, Bo An, Christopher Kiekintveld:
Optimizing Personalized Email Filtering Thresholds to Mitigate Sequential Spear Phishing Attacks. AAAI 2016: 658-665 - [c54]Sara Marie McCarthy, Milind Tambe, Christopher Kiekintveld, Meredith L. Gore, Alex Killion:
Preventing Illegal Logging: Simultaneous Optimization of Resource Teams and Tactics for Security. AAAI 2016: 3880-3886 - [c53]Oscar Veliz, Marcus Gutierrez, Christopher Kiekintveld:
Teaching Automated Strategic Reasoning Using Capstone Tournaments. AAAI 2016: 4134-4135 - [c52]Moinul Morshed Porag Chowdhury, Russell Y. Folk, Ferdinando Fioretto, Christopher Kiekintveld, William Yeoh:
Investigation of Learning Strategies for the SPOT Broker in Power TAC. AMEC/TADA 2016: 96-111 - [c51]Anjon Basak, Fei Fang, Thanh Hong Nguyen, Christopher Kiekintveld:
Abstraction Methods for Solving Graph-Based Security Games. AAMAS Workshops (Visionary Papers) 2016: 13-33 - [c50]Anjon Basak, Fei Fang, Thanh Hong Nguyen, Christopher Kiekintveld:
Combining Graph Contraction and Strategy Generation for Green Security Games. GameSec 2016: 251-271 - [c49]Benjamin J. Ford, Matthew Brown, Amulya Yadav, Amandeep Singh, Arunesh Sinha, Biplav Srivastava, Christopher Kiekintveld, Milind Tambe:
Protecting the NECTAR of the Ganga River Through Game-Theoretic Factory Inspections. PAAMS 2016: 97-108 - 2015
- [j15]Nitin Agarwal, Sean Andrist, Dan Bohus, Fei Fang, Laurie Fenstermacher, Lalana Kagal, Takashi Kido, Christopher Kiekintveld, William F. Lawless, Huan Liu, Andrew McCallum, Hemant Purohit, Oshani Seneviratne, Keiki Takadama, Gavin Taylor:
Reports on the 2015 AAAI Spring Symposium Series. AI Mag. 36(3): 113-119 (2015) - [c48]Branislav Bosanský, Albert Xin Jiang, Milind Tambe, Christopher Kiekintveld:
Combining Compact Representation and Incremental Generation in Large Games with Sequential Strategies. AAAI 2015: 812-818 - [c47]Karel Durkota, Viliam Lisý, Christopher Kiekintveld, Branislav Bosanský:
Game-Theoretic Algorithms for Optimal Network Security Hardening Using Attack Graphs. AAMAS 2015: 1773-1774 - [c46]Oscar Veliz, Christopher Kiekintveld:
Selecting Robust Strategies Based on Abstracted Game Models. AAMAS 2015: 1877-1878 - [c45]Richard Klíma, Viliam Lisý, Christopher Kiekintveld:
Combining Online Learning and Equilibrium Computation in Security Games. GameSec 2015: 130-149 - [c44]Karel Durkota, Viliam Lisý, Branislav Bosanský, Christopher Kiekintveld:
Approximate Solutions for Attack Graph Games with Imperfect Information. GameSec 2015: 228-249 - [c43]Karel Durkota, Viliam Lisý, Branislav Bosanský, Christopher Kiekintveld:
Optimal Network Security Hardening Using Attack Graph Games. IJCAI 2015: 526-532 - [p1]Christopher Kiekintveld, Viliam Lisý, Radek Píbil:
Game-Theoretic Foundations for the Strategic Use of Honeypots in Network Security. Cyber Warfare 2015: 81-101 - 2014
- [j14]Matthew Brown, Bo An, Christopher Kiekintveld, Fernando Ordóñez, Milind Tambe:
An extended study on multi-objective security games. Auton. Agents Multi Agent Syst. 28(1): 31-71 (2014) - [j13]Branislav Bosanský, Christopher Kiekintveld, Viliam Lisý, Michal Pechoucek:
An Exact Double-Oracle Algorithm for Zero-Sum Extensive-Form Games with Imperfect Information. J. Artif. Intell. Res. 51: 829-866 (2014) - [c42]Richard Klíma, Christopher Kiekintveld, Viliam Lisý:
Online Learning Methods for Border Patrol Resource Allocation. GameSec 2014: 340-349 - [i1]Dmytro Korzhyk, Zhengyu Yin, Christopher Kiekintveld, Vincent Conitzer, Milind Tambe:
Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness. CoRR abs/1401.3888 (2014) - 2013
- [j12]Rong Yang, Christopher Kiekintveld, Fernando Ordóñez, Milind Tambe, Richard John:
Improving resource allocation strategies against human adversaries in security games: An extended study. Artif. Intell. 195: 440-469 (2013) - [c41]Jaime Parra Jr., Christopher Kiekintveld:
Initial Exploration of Machine Learning to Predict Customer Demand in an Energy Market Simulation. AAAI Workshop: Trading Agent Design and Analysis 2013 - [c40]Christopher Kiekintveld, Towhidul Islam, Vladik Kreinovich:
Security games with interval uncertainty. AAMAS 2013: 231-238 - [c39]Branislav Bosanský, Christopher Kiekintveld, Viliam Lisý, Jiri Cermak, Michal Pechoucek:
Double-oracle algorithm for computing an exact nash equilibrium in zero-sum extensive-form games. AAMAS 2013: 335-342 - [c38]Jason Tsai, Yundi Qian, Yevgeniy Vorobeychik, Christopher Kiekintveld, Milind Tambe:
Security games with contagion: handling asymmetric information. AAMAS 2013: 1185-1186 - [c37]Jason Tsai, Yundi Qian, Yevgeniy Vorobeychik, Christopher Kiekintveld, Milind Tambe:
Bayesian Security Games for Controlling Contagion. SocialCom 2013: 33-38 - [e1]Esther David, Christopher Kiekintveld, Valentin Robu, Onn Shehory, Sebastian Stein:
Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets - AMEC and TADA 2012, Valencia, Spain, June 4th, 2012, Revised Selected Papers. Lecture Notes in Business Information Processing 136, Springer 2013, ISBN 978-3-642-40863-2 [contents] - 2012
- [j11]Noa Agmon, Vikas Agrawal, David W. Aha, Yiannis Aloimonos, Donagh Buckley, Prashant Doshi, Christopher W. Geib, Floriana Grasso, Nancy L. Green, Benjamin Johnston, Burt Kaliski, Christopher Kiekintveld, Edith Law, Henry Lieberman, Ole J. Mengshoel, Ted Metzler, Joseph Modayil, Douglas W. Oard, Nilufer Onder, Barry O'Sullivan, Katerina Pastra, Doina Precup, Sowmya Ramachandran, Chris Reed, Sanem Sariel Talay, Ted Selker, Lokendra Shastri, Stephen F. Smith, Satinder Singh, Siddharth Srivastava, Gita Sukthankar, David C. Uthus, Mary-Anne Williams:
Reports of the AAAI 2011 Conference Workshops. AI Mag. 33(1): 57-70 (2012) - [j10]Zhengyu Yin, Albert Xin Jiang, Milind Tambe, Christopher Kiekintveld, Kevin Leyton-Brown, Tuomas Sandholm, John P. Sullivan:
TRUSTS: Scheduling Randomized Patrols for Fare Inspection in Transit Systems Using Game Theory. AI Mag. 33(4): 59-72 (2012) - [c36]Bo An, David Kempe, Christopher Kiekintveld, Eric Shieh, Satinder Singh, Milind Tambe, Yevgeniy Vorobeychik:
Security Games with Limited Surveillance. AAAI 2012: 1241-1248 - [c35]Bo An, David Kempe, Christopher Kiekintveld, Eric Anyung Shieh, Satinder Singh, Milind Tambe, Yevgeniy Vorobeychik:
Security Games with Limited Surveillance: An Initial Report. AAAI Spring Symposium: Game Theory for Security, Sustainability, and Health 2012 - [c34]Albert Xin Jiang, Zhengyu Yin, Matthew P. Johnson, Milind Tambe, Christopher Kiekintveld, Kevin Leyton-Brown, Tuomas Sandholm:
Towards Optimal Patrol Strategies for Fare Inspection in Transit Systems. AAAI Spring Symposium: Game Theory for Security, Sustainability, and Health 2012 - [c33]Christopher Kiekintveld, Vladik Kreinovich:
Efficient Approximation for Security Games with Interval Uncertainty. AAAI Spring Symposium: Game Theory for Security, Sustainability, and Health 2012 - [c32]Matthew Brown, Bo An, Christopher Kiekintveld, Fernando Ordóñez, Milind Tambe:
Multi-objective optimization for security games. AAMAS 2012: 863-870 - [c31]Branislav Bosanský, Christopher Kiekintveld, Viliam Lisý, Michal Pechoucek:
Iterative Algorithm for Solving Two-player Zero-sum Extensive-form Games with Imperfect Information. ECAI 2012: 193-198 - [c30]Radek Píbil, Viliam Lisý, Christopher Kiekintveld, Branislav Bosanský, Michal Pechoucek:
Game Theoretic Model of Strategic Honeypot Selection in Computer Networks. GameSec 2012: 201-220 - [c29]Zhengyu Yin, Albert Xin Jiang, Matthew Paul Johnson, Christopher Kiekintveld, Kevin Leyton-Brown, Tuomas Sandholm, Milind Tambe, John P. Sullivan:
TRUSTS: Scheduling Randomized Patrols for Fare Inspection in Transit Systems. IAAI 2012: 2348-2355 - 2011
- [j9]Dmytro Korzhyk, Zhengyu Yin, Christopher Kiekintveld, Vincent Conitzer, Milind Tambe:
Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness. J. Artif. Intell. Res. 41: 297-327 (2011) - [j8]Bo An, James Pita, Eric Anyung Shieh, Milind Tambe, Christopher Kiekintveld, Janusz Marecki:
GUARDS and PROTECT: next generation applications of security games. SIGecom Exch. 10(1): 31-34 (2011) - [c28]Oswaldo Aguirre, Nicolas Lopez, Eric Gutierrez, Heidi A. Taboada, Jose Epiritu, Christopher Kiekintveld:
Towards the Integration of Multi-Attribute Optimization and Game Theory for Border Security Patrolling Strategies. Applied Adversarial Reasoning and Risk Modeling 2011 - [c27]Bo An, Milind Tambe, Fernando Ordóñez, Eric Anyung Shieh, Christopher Kiekintveld:
Refinement of Strong Stackelberg Equilibria in Security Games. AAAI 2011: 587-593 - [c26]Octavio Lerma, Vladik Kreinovich, Christopher Kiekintveld:
Linear-Time Resource Allocation in Security Games with Identical Fully Protective Resources. Applied Adversarial Reasoning and Risk Modeling 2011 - [c25]Bo An, Manish Jain, Milind Tambe, Christopher Kiekintveld:
Mixed-Initiative Optimization in Security Games: A Preliminary Report. AAAI Spring Symposium: Help Me Help You: Bridging the Gaps in Human-Agent Collaboration 2011 - [c24]James Pita, Milind Tambe, Christopher Kiekintveld, Shane Cullen, Erin Steigerwald:
GUARDS: game theoretic security allocation on a national scale. AAMAS 2011: 37-44 - [c23]Manish Jain, Christopher Kiekintveld, Milind Tambe:
Quality-bounded solutions for finite Bayesian Stackelberg games: scaling up. AAMAS 2011: 997-1004 - [c22]Christopher Kiekintveld, Janusz Marecki, Milind Tambe:
Approximation methods for infinite Bayesian Stackelberg games: modeling distributional payoff uncertainty. AAMAS 2011: 1005-1012 - [c21]Rong Yang, Christopher Kiekintveld, Fernando Ordóñez, Milind Tambe, Richard John:
Improved computational models of human behavior in security games. AAMAS 2011: 1155-1156 - [c20]Rong Yang, Christopher Kiekintveld, Fernando Ordóñez, Milind Tambe, Richard John:
Improving Resource Allocation Strategy against Human Adversaries in Security Games. IJCAI 2011: 458-464 - [c19]James Pita, Milind Tambe, Christopher Kiekintveld, Shane Cullen, Erin Steigerwald:
GUARDS - Innovative Application of Game Theory for National Airport Security. IJCAI 2011: 2710-2715 - 2010
- [j7]Christopher Kiekintveld, Janusz Marecki, Praveen Paruchuri, Katia P. Sycara:
Editor's Introduction to the Special Issue on Quantitative Risk Analysis Techniques for Security Applications. Informatica (Slovenia) 34(2): 127-128 (2010) - [j6]Matthew E. Taylor, Christopher Kiekintveld, Craig Western, Milind Tambe:
A Framework for Evaluating Deployed Security Systems: Is There a Chink in your ARMOR? Informatica (Slovenia) 34(2): 129-140 (2010) - [j5]Manish Jain, Jason Tsai, James Pita, Christopher Kiekintveld, Shyamsunder Rathi, Milind Tambe, Fernando Ordóñez:
Software Assistants for Randomized Patrol Planning for the LAX Airport Police and the Federal Air Marshal Service. Interfaces 40(4): 267-290 (2010) - [c18]Manish Jain, Erim Kardes, Christopher Kiekintveld, Fernando Ordóñez, Milind Tambe:
Security Games with Arbitrary Schedules: A Branch and Price Approach. AAAI 2010: 792-797 - [c17]Jason Tsai, Zhengyu Yin, Jun-young Kwak, David Kempe, Christopher Kiekintveld, Milind Tambe:
Urban Security: Game-Theoretic Resource Allocation in Networked Domains. AAAI 2010: 881-886 - [c16]Christopher Kiekintveld, Zhengyu Yin, Atul Kumar, Milind Tambe:
Asynchronous algorithms for approximate distributed constraint optimization with quality bounds. AAMAS 2010: 133-140 - [c15]Zhengyu Yin, Dmytro Korzhyk, Christopher Kiekintveld, Vincent Conitzer, Milind Tambe:
Stackelberg vs. Nash in security games: interchangeability, equivalence, and uniqueness. AAMAS 2010: 1139-1146 - [c14]Jason Tsai, Zhengyu Yin, Jun-young Kwak, David Kempe, Christopher Kiekintveld, Milind Tambe:
How to protect a city: strategic security placement in graph-based domains. AAMAS 2010: 1453-1454 - [c13]Christopher Kiekintveld, Milind Tambe, Janusz Marecki:
Robust Bayesian methods for Stackelberg security games. AAMAS 2010: 1467-1468 - [c12]Christopher Kiekintveld, Janusz Marecki, Milind Tambe:
Methods and Algorithms for Infinite Bayesian Stackelberg Security Games - (Extended Abstract). GameSec 2010: 257-265
2000 – 2009
- 2009
- [j4]Christopher Kiekintveld, Jason Miller, Patrick R. Jordan, Lee F. Callender, Michael P. Wellman:
Forecasting market prices in a supply chain game. Electron. Commer. Res. Appl. 8(2): 63-77 (2009) - [j3]James Pita, Harish Bellamane, Manish Jain, Christopher Kiekintveld, Jason Tsai, Fernando Ordóñez, Milind Tambe:
Security applications: lessons of real-world deployment. SIGecom Exch. 8(2): 5 (2009) - [c11]Christopher Kiekintveld, Manish Jain, Jason Tsai, James Pita, Fernando Ordóñez, Milind Tambe:
Computing optimal randomized resource allocations for massive security games. AAMAS (1) 2009: 689-696 - 2008
- [b1]Christopher Kiekintveld:
Empirical Game-Theoretic Methods for Strategy Design and Analysis in Complex Games. University of Michigan, USA, 2008 - [c10]Christopher Kiekintveld, Michael P. Wellman:
Selecting strategies using empirical game models: an experimental analysis of meta-strategies. AAMAS (2) 2008: 1095-1101 - 2007
- [c9]Christopher Kiekintveld:
Empirical Game-Theoretic Methods for Strategy Design and Analysis in Complex Games. AAAI 2007: 1935-1936 - [c8]Patrick R. Jordan, Christopher Kiekintveld, Michael P. Wellman:
Empirical game-theoretic analysis of the TAC Supply Chain game. AAMAS 2007: 193 - [c7]Christopher Kiekintveld, Jason Miller, Patrick R. Jordan, Michael P. Wellman:
Forecasting market prices in a supply chain game. AAMAS 2007: 234 - 2006
- [c6]Patrick R. Jordan, Christopher Kiekintveld, Jason Miller, Michael P. Wellman:
Market Efficiency, Sales Competition, and the Bullwhip Effect in the TAC SCM Tournaments. TADA/AMEC 2006: 62-74 - [c5]Christopher Kiekintveld, Jason Miller, Patrick R. Jordan, Michael P. Wellman:
Controlling a supply chain agent using value-based decomposition. EC 2006: 208-217 - [c4]Yevgeniy Vorobeychik, Christopher Kiekintveld, Michael P. Wellman:
Empirical mechanism design: methods, with application to a supply-chain scenario. EC 2006: 306-315 - 2005
- [j2]Michael P. Wellman, Joshua Estelle, Satinder Singh, Yevgeniy Vorobeychik, Christopher Kiekintveld, Vishal Soni:
Strategic Interactions in a Supply Chain Game. Comput. Intell. 21(1): 1-26 (2005) - [c3]Christopher Kiekintveld, Yevgeniy Vorobeychik, Michael P. Wellman:
An Analysis of the 2004 Supply Chain Management Trading Agent Competition. AMEC@AAMAS/TADA@IJCAI 2005: 99-112 - 2004
- [j1]Christopher Kiekintveld, Michael P. Wellman, Satinder Singh, Vishal Soni:
Value-driven procurement in the TAC supply chain game. SIGecom Exch. 4(3): 9-18 (2004) - [c2]Christopher Kiekintveld, Michael P. Wellman, Satinder Singh, Joshua Estelle, Yevgeniy Vorobeychik, Vishal Soni, Matthew R. Rudary:
Distributed Feedback Control for Decision Making on Supply Chains. ICAPS 2004: 384-392 - [c1]Joshua Estelle, Yevgeniy Vorobeychik, Michael P. Wellman, Satinder Singh, Christopher Kiekintveld, Vishal Soni:
Strategic Interactions in the TAC 2003 Supply Chain Tournament. Computers and Games 2004: 316-331
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint