Deceiving cyber adversaries: A game theoretic approach A Schlenker, O Thakoor, H Xu, F Fang, M Tambe, L Tran-Thanh, ... AAMAS'18: Proceedings of the 17th International Conference on Autonomous …, 2018 | 123 | 2018 |
One size does not fit all: A game-theoretic approach for dynamically and effectively screening for threats M Brown, A Sinha, A Schlenker, M Tambe Proceedings of the AAAI Conference on Artificial Intelligence 30 (1), 2016 | 67 | 2016 |
Don’t bury your head in warnings: A game-theoretic approach for intelligent allocation of cyber-security alerts A Schlenker, H Xu, M Guirguis, C Kiekintveld, A Sinha, M Tambe, S Sonya, ... | 42 | 2017 |
Get me to my gate on time: Efficiently solving general-sum bayesian threat screening games A Schlenker, M Brown, A Sinha, M Tambe, R Mehta Proceedings of the Twenty-second European Conference on Artificial …, 2016 | 15 | 2016 |
Game theoretic cyber deception to foil adversarial network reconnaissance A Schlenker, O Thakoor, H Xu, F Fang, M Tambe, P Vayanos Adaptive Autonomous Secure Cyber Systems, 183-204, 2020 | 8 | 2020 |
Draining the water hole: Mitigating social engineering attacks with cybertweak ZR Shi, A Schlenker, B Hay, D Bittleston, S Gao, E Peterson, J Trezza, ... Proceedings of the AAAI Conference on Artificial Intelligence 34 (08), 13363 …, 2020 | 6* | 2020 |
Game theoretic deception and threat screening for cyber security A Schlenker University of Southern California, 2018 | 4 | 2018 |
Towards a game-theoretic framework for intelligent cyber-security alert allocation A Schlenker, H Xu, M Guirguis, M Tambe, A Sinha, C Kiekintveld, S Sonya, ... Proceedings of the 3rd IJCAI workshop on Algorithmic Game Theory, Melbourne …, 2017 | 4 | 2017 |
Scaling-up Stackelberg security games applications using approximations A Sinha, A Schlenker, D Dmello, M Tambe Decision and Game Theory for Security: 9th International Conference, GameSec …, 2018 | 2 | 2018 |
Game-theoretic threat screening and deceptive techniques for cyber defense A Schlenker Proceedings of the AAAI Conference on Artificial Intelligence 32 (1), 2018 | | 2018 |
Practical Scalability for Stackelberg Security Games A Sinha, A Schlenker, D Dmello, M Tambe arXiv preprint arXiv:1711.04208, 2017 | | 2017 |
Generalized Mandelbrot Sets A Schlenker | | 2014 |
Multi-Agent Patrolling on a Budget: Finding the Best Team for the Job SM Mc Carthy, A Schlenker, M Tambe, C Kiekintveld | | |
Draining the Water Hole: Mitigating Social Engineering Attacks ZR Shi, A Schlenker, B Hay, F Fang | | |