This work is licensed under the Creative Commons Attribution 4.0 International License.
Liu Xia, Han Ziqiang, Jin Shigen. “New Features and Development Trends of International Terrorism,” China Soft Science: Strategy and Decision, No.11, pp. 5, Nov. 2015.XiaLiuZiqiangHanShigenJin“New Features and Development Trends of International Terrorism,”China Soft Science: Strategy and Decision115Nov.2015Search in Google Scholar
Wang Zhen, Yuan Yong, An Bo, Li Mingchu, Wang Feiyue, “A Review of Security Game Theory Research,” Journal of command and control, vol.1, No.2, pp. 122–129, Jun 2015.ZhenWangYongYuanBoAnMingchuLiFeiyueWang“A Review of Security Game Theory Research,”Journal of command and control12122129Jun2015Search in Google Scholar
Chen Zihan, Cheng Guang, “A moving target defense technique based on Stackelberg-Markov nonreciprocal tripartite game model,” Chinese Journal of Computers, vol.42, No.61, pp. 3, May 2019.ZihanChenGuangCheng“A moving target defense technique based on Stackelberg-Markov nonreciprocal tripartite game model,”Chinese Journal of Computers42613May2019Search in Google Scholar
Dong Rui, “Dynamic complexity of Stackelberg model under different rational expectations,” System Engineering-Theory & Practice, vol.37, No.7, pp.1761, Jul. 2017.RuiDong“Dynamic complexity of Stackelberg model under different rational expectations,”System Engineering-Theory & Practice3771761Jul.2017Search in Google Scholar
Wang Yuedi, Su Xing, Jia Yibin, Guo Limin, Ding Zhiming, “Journal of University of Science and Technology of China,” Computer Science, vol.48, No.6, pp.465, June 2018.YuediWangXingSuYibinJiaLiminGuoZhimingDing“Journal of University of Science and Technology of China,”Computer Science486465June2018Search in Google Scholar
Wang Shuai, Jiang Huawei, “Research on Application of Genetic-Ant Colony Algorithm in Path Planning of Emergency Materials,” Computer Applications and Software, vol.35, No.9, September 2018.ShuaiWangHuaweiJiang“Research on Application of Genetic-Ant Colony Algorithm in Path Planning of Emergency Materials,”Computer Applications and Software359September2018Search in Google Scholar
Yue Feng, He Jianmin, Sun Yan, Liu Xiangdong, “Research on ant colony algorithm for emergency resource scheduling with stochastic path time,” Decision participation, vol.15, No.32, August 2011.FengYueJianminHeYanSunXiangdongLiu“Research on ant colony algorithm for emergency resource scheduling with stochastic path time,”Decision participation1532August2011Search in Google Scholar
Yang Jijun, Yu Lian, “Game Model and Optimization of Emergency Resource Scheduling for Multi-disaster Point Demand,” Chinese Journal of Management Science, vol.24, No.8, pp.478–481, August 2016.JijunYangLianYu“Game Model and Optimization of Emergency Resource Scheduling for Multi-disaster Point Demand,”Chinese Journal of Management Science248478481August2016Search in Google Scholar
Wu Deng, Junjie Xu, Huimin Zhao. “An Improved Ant Colony Optimization Algorithm Based on Hybrid Strategies for Scheduling Problem,” IEEE Access, vol.7, February 2019DengWuXuJunjieZhaoHuimin“An Improved Ant Colony Optimization Algorithm Based on Hybrid Strategies for Scheduling Problem,”IEEE Access7February201910.1109/ACCESS.2019.2897580Search in Google Scholar
Wang Zhen, Yuan Yong, An Bo, et al. Review of Security Game Theory Research [J]. Journal of Command and Control, 2015, 1(2): 121–149.ZhenWangYongYuanBoAnReview of Security Game Theory Research [J]Journal of Command and Control201512121149Search in Google Scholar
Branislav Bosansky, Ji Cermak: Sequence-Form Algorithm for Computing Stackelberg Equilibriain Extensive-Form Games.BosanskyBranislavCermakJiSequence-Form Algorithm for Computing Stackelberg Equilibriain Extensive-Form GamesSearch in Google Scholar
Paruchuri P, Pearce J P. Playing games for security: an efficient exact algorithm for solving bayesian stackelberg games[C]//Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS’08). Estoril Portugal, 2008: 895–902.ParuchuriPPearceJ PPlaying games for security: an efficient exact algorithm for solving bayesian stackelberg games[C]Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS’08)Estoril Portugal2008895902Search in Google Scholar
Jain M, Korzhyk D. A double oracle algorithm for zero-sum security games on graphs[C]//Proceedings of the 10th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS’11). Taipei, Taiwan, 2011:327–334.JainMKorzhykD.A double oracle algorithm for zero-sum security games on graphs[C]Proceedings of the 10th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS’11)Taipei, Taiwan2011327334Search in Google Scholar
Jain M, Conitzer V. Security scheduling for real-world net-works[C]//Proceedings of the 2013 International Conference on Autonomous Agents and Multi-Agent Systems (AA-MAS’13). Bologna, Italy, 2013: 215–222.JainMConitzerVSecurity scheduling for real-world net-works[C]Proceedings of the 2013 International Conference on Autonomous Agents and Multi-Agent Systems (AA-MAS’13)Bologna, Italy2013215222Search in Google Scholar
Tambe M. Security and game theory: algorithms, deployed systems, lessons learned[M]. Cambridge University Press, 2012.TambeM.Security and game theory: algorithms, deployed systems, lessons learned[M]Cambridge University Press201210.1109/Allerton.2012.6483443Search in Google Scholar
Tsai J, Rathi S, Kiekintveld C, et al. IRIS - A tool for strategic security allocation in transportation networks[J]. Journal of Guangzhou Panyu Polytechnic, 2015.TsaiJRathiSKiekintveldCIRIS - A tool for strategic security allocation in transportation networks[J]Journal of Guangzhou Panyu Polytechnic201510.1017/CBO9780511973031.005Search in Google Scholar
Shieh E, An B, Yang R, et al. PROTECT: a deployed game theoretic system to protect the ports of the United States[C]. International Conference on Autonomous Agents and Multiagent Systems (AAMAS). 2012: 13–20.ShiehEAnBYangRPROTECT: a deployed game theoretic system to protect the ports of the United States[C]International Conference on Autonomous Agents and Multiagent Systems (AAMAS)20121320Search in Google Scholar