Order:
  1.  12
    Toward Personalized Deceptive Signaling for Cyber Defense Using Cognitive Models.Edward A. Cranford, Cleotilde Gonzalez, Palvi Aggarwal, Sarah Cooney, Milind Tambe & Christian Lebiere - 2020 - Topics in Cognitive Science 12 (3):992-1011.
    The purpose of cognitive models is to make predictive simulations of human behaviour, but this is often done at the aggregate level. Cranford, Gonzalez, Aggarwal, Cooney, Tambe, and Lebiere show that they can automatically customize a model to a particular individual on‐the‐fly, and use it to make specific predictions about their next actions, in the context of a particular cybersecurity game.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  2.  9
    Adopt: asynchronous distributed constraint optimization with quality guarantees.Pragnesh Jay Modi, Wei-Min Shen, Milind Tambe & Makoto Yokoo - 2005 - Artificial Intelligence 161 (1-2):149-180.
  3.  7
    Robust solutions to Stackelberg games: Addressing bounded rationality and limited observations in human cognition.James Pita, Manish Jain, Milind Tambe, Fernando Ordóñez & Sarit Kraus - 2010 - Artificial Intelligence 174 (15):1142-1171.
  4.  7
    Improving resource allocation strategies against human adversaries in security games: An extended study.Rong Yang, Christopher Kiekintveld, Fernando Ordóñez, Milind Tambe & Richard John - 2013 - Artificial Intelligence 195 (C):440-469.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  5.  13
    Towards a Cognitive Theory of Cyber Deception.Edward A. Cranford, Cleotilde Gonzalez, Palvi Aggarwal, Milind Tambe, Sarah Cooney & Christian Lebiere - 2021 - Cognitive Science 45 (7):e13013.
    This work is an initial step toward developing a cognitive theory of cyber deception. While widely studied, the psychology of deception has largely focused on physical cues of deception. Given that present‐day communication among humans is largely electronic, we focus on the cyber domain where physical cues are unavailable and for which there is less psychological research. To improve cyber defense, researchers have used signaling theory to extended algorithms developed for the optimal allocation of limited defense resources by using deceptive (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  6.  8
    Comparing human behavior models in repeated Stackelberg security games: An extended study.Debarun Kar, Fei Fang, Francesco M. Delle Fave, Nicole Sintov, Milind Tambe & Arnaud Lyet - 2016 - Artificial Intelligence 240 (C):65-103.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  7.  7
    Building agent teams using an explicit teamwork model and learning.Milind Tambe, Jafar Adibi, Yaser Al-Onaizan, Ali Erdem, Gal A. Kaminka, Stacy C. Marsella & Ion Muslea - 1999 - Artificial Intelligence 110 (2):215-239.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  8.  5
    Investigating production system representations for non-combinatorial match.Milind Tambe & Paul S. Rosenbloom - 1994 - Artificial Intelligence 68 (1):155-199.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation