Aaron Schlenker
Cited by
Cited by
One size does not fit all: A game-theoretic approach for dynamically and effectively screening for threats
M Brown, A Sinha, A Schlenker, M Tambe
Thirtieth AAAI Conference on Artificial Intelligence, 2016
Deceiving cyber adversaries: A game theoretic approach
A Schlenker, O Thakoor, H Xu, M Tambe, P Vayanos, F Fang, ...
International Conference on Autonomous Agents and Multiagent Systems, 2018
Don’t bury your head in warnings: A game-theoretic approach for intelligent allocation of cyber-security alerts
A Schlenker, H Xu, M Guirguis, C Kiekintveld, A Sinha, M Tambe, S Sonya, ...
Get me to my gate on time: Efficiently solving general-sum bayesian threat screening games
A Schlenker, M Brown, A Sinha, M Tambe, R Mehta
Proceedings of the Twenty-second European Conference on Artificial …, 2016
Towards a game-theoretic framework for intelligent cyber-security alert allocation
A Schlenker, H Xu, M Guirguis, M Tambe, A Sinha, C Kiekintveld, S Sonya, ...
Proceedings of the 3rd IJCAI workshop on Algorithmic Game Theory, Melbourne …, 2017
Towards thwarting social engineering attacks
ZR Shi, A Schlenker, B Hay, F Fang
CoRR, abs/1901.00586, 2019
Scaling-up Stackelberg security games applications using approximations
A Sinha, A Schlenker, D Dmello, M Tambe
International Conference on Decision and Game Theory for Security, 432-452, 2018
Game theoretic deception and threat screening for cyber security
A Schlenker
University of Southern California, 2018
Game Theoretic Cyber Deception to Foil Adversarial Network Reconnaissance
A Schlenker, O Thakoor, H Xu, F Fang, M Tambe, P Vayanos
Adaptive Autonomous Secure Cyber Systems, 183-204, 2020
Game-Theoretic Threat Screening and Deceptive Techniques for Cyber Defense
A Schlenker
Thirty-Second AAAI Conference on Artificial Intelligence, 2018
Practical Scalability for Stackelberg Security Games
A Sinha, A Schlenker, D Dmello, M Tambe
arXiv preprint arXiv:1711.04208, 2017
Generalized Mandelbrot Sets
A Schlenker
Multi-Agent Patrolling on a Budget: Finding the Best Team for the Job
SM Mc Carthy, A Schlenker, M Tambe, C Kiekintveld
Draining the Water Hole: Mitigating Social Engineering Attacks
ZR Shi, A Schlenker, B Hay, F Fang
The system can't perform the operation now. Try again later.
Articles 1–14