Christopher Kiekintveld

Affiliations:
  • University of Texas at El Paso, USA


According to our database1, Christopher Kiekintveld authored at least 116 papers between 2004 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Solving zero-sum one-sided partially observable stochastic games.
Artif. Intell., March, 2023

Survey and Taxonomy of Adversarial Reconnaissance Techniques.
ACM Comput. Surv., 2023

Generation of Games for Opponent Model Differentiation.
CoRR, 2023

Honeypot Allocation for Cyber Deception in Dynamic Tactical Networks: A Game Theoretic Approach.
CoRR, 2023

Adversarial Reconnaissance Mitigation and Modeling.
CoRR, 2023

Bayesian Models for Node-Based Inference Techniques.
Proceedings of the IEEE International Systems Conference, 2023

Optimizing Crop Recommendations for Sustainable Agriculture: Leveraging Bayesian Networks in a Smart Crop Recommendation System.
Proceedings of the 20th Annual IEEE International Conference on Sensing, 2023

Enhancing IoT Device Security: Predicting and Analyzing Reconnaissance Attacks Using Flags and Time-Based Attributes.
Proceedings of the 10th International Conference on Internet of Things: Systems, 2023

A Systematic Approach for Temporal Traffic Selection Across Various Applications.
Proceedings of the 32nd International Conference on Computer Communications and Networks, 2023

Performance Comparison and Implementation of Bayesian Variants for Network Intrusion Detection.
Proceedings of the IEEE International Conference on Artificial Intelligence, 2023

2022
Honeypot Allocation for Cyber Deception Under Uncertainty.
IEEE Trans. Netw. Serv. Manag., 2022

Cyber Deception Against Zero-Day Attacks: A Game Theoretic Approach.
Proceedings of the Decision and Game Theory for Security - 13th International Conference, 2022

2021
Network discovery and scanning strategies and the Dark Triad.
Comput. Hum. Behav., 2021

2020
Optimizing Vulnerability-Driven Honey Traffic Using Game Theory.
CoRR, 2020

Cybersecurity Deception Experimentation System.
Proceedings of the IEEE Secure Development, SecDev 2020, Atlanta, GA, USA, 2020

Game-Theoretic Perspectives and Algorithms for Cybersecurity.
Proceedings of the IH&MMSec '20: ACM Workshop on Information Hiding and Multimedia Security, 2020

Concealing Cyber-Decoys using Two-Sided Feature Deception Games.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

A Realistic Approach for Network Traffic Obfuscation Using Adversarial Machine Learning.
Proceedings of the Decision and Game Theory for Security - 11th International Conference, 2020

A Game Theoretic Framework for Software Diversity for Network Security.
Proceedings of the Decision and Game Theory for Security - 11th International Conference, 2020

Local Context Normalization: Revisiting Local Normalization.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020

Online Learning Methods for Controlling Dynamic Cyber Deception Strategies.
Proceedings of the Adaptive Autonomous Secure Cyber Systems., 2020

2019
Optimizing honeypot strategies against dynamic lateral movement using partially observable stochastic games.
Comput. Secur., 2019

Hardening networks against strategic attackers using attack graph games.
Comput. Secur., 2019

Compact Representation of Value Function in Partially Observable Stochastic Games.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

Cyber Camouflage Games for Strategic Deception.
Proceedings of the Decision and Game Theory for Security - 10th International Conference, 2019

Identifying Stealthy Attackers in a Game Theoretic Framework Using Deception.
Proceedings of the Decision and Game Theory for Security - 10th International Conference, 2019

Evaluating Models of Human Behavior in an Adversarial Multi-Armed Bandit Problem.
Proceedings of the 41th Annual Meeting of the Cognitive Science Society, 2019

General-Sum Cyber Deception Games under Partial Attacker Valuation Information.
Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, 2019

2018
Incremental Strategy Generation for Stackelberg Equilibria in Extensive-Form Games.
Proceedings of the 2018 ACM Conference on Economics and Computation, 2018

On the Defense Against Adversarial Examples Beyond the Visible Spectrum.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Stackelberg Security Games: Looking Beyond a Decade of Success.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Bidding in Periodic Double Auctions Using Heuristics and Dynamic Monte Carlo Tree Search.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Algorithms for Subgame Abstraction with Applications to Cyber Defense.
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018

An Initial Study of Targeted Personality Models in the FlipIt Game.
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018

Integrated Learning and Feature Selection for Deep Neural Networks in Multispectral Images.
Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2018

Bidding Strategy for Periodic Double Auctions Using Monte Carlo Tree Search.
Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, 2018

2017
Don't Bury your Head in Warnings: A Game-Theoretic Approach for Intelligent Allocation of Cyber-security Alerts.
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017

Comparing Strategic Secrecy and Stackelberg Commitment in Security Games.
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017

Optimal Strategies for Detecting Data Exfiltration by Internal and External Attackers.
Proceedings of the Decision and Game Theory for Security - 8th International Conference, 2017

Adapting Honeypot Configurations to Detect Evolving Exploits.
Proceedings of the Workshops of the The Thirty-First AAAI Conference on Artificial Intelligence, 2017

Strategic Information Revelation and Commitment in Security Games.
Proceedings of the Workshops of the The Thirty-First AAAI Conference on Artificial Intelligence, 2017

2016
Case Studies of Network Defense with Attack Graph Games.
IEEE Intell. Syst., 2016

Protecting the NECTAR of the Ganga River Through Game-Theoretic Factory Inspections.
Proceedings of the Advances in Practical Applications of Scalable Multi-agent Systems. The PAAMS Collection, 2016

Combining Graph Contraction and Strategy Generation for Green Security Games.
Proceedings of the Decision and Game Theory for Security - 7th International Conference, 2016

Abstraction Methods for Solving Graph-Based Security Games.
Proceedings of the Autonomous Agents and Multiagent Systems - AAMAS 2016 Workshops, - Visionary Papers, 2016

Investigation of Learning Strategies for the SPOT Broker in Power TAC.
Proceedings of the Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets, 2016

Optimizing Personalized Email Filtering Thresholds to Mitigate Sequential Spear Phishing Attacks.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

Teaching Automated Strategic Reasoning Using Capstone Tournaments.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

Preventing Illegal Logging: Simultaneous Optimization of Resource Teams and Tactics for Security.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

Bandits for Cybersecurity: Adaptive Intrusion Detection Using Honeypots.
Proceedings of the Artificial Intelligence for Cyber Security, 2016

Using Correlated Strategies for Computing Stackelberg Equilibria in Extensive-Form Games.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

2015
Game-Theoretic Foundations for the Strategic Use of Honeypots in Network Security.
Proceedings of the Cyber Warfare - Building the Scientific Foundation, 2015

Reports on the 2015 AAAI Spring Symposium Series.
AI Mag., 2015

Optimal Network Security Hardening Using Attack Graph Games.
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015

Combining Online Learning and Equilibrium Computation in Security Games.
Proceedings of the Decision and Game Theory for Security - 6th International Conference, 2015

Approximate Solutions for Attack Graph Games with Imperfect Information.
Proceedings of the Decision and Game Theory for Security - 6th International Conference, 2015

Selecting Robust Strategies Based on Abstracted Game Models.
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015

Game-Theoretic Algorithms for Optimal Network Security Hardening Using Attack Graphs.
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015

Combining Compact Representation and Incremental Generation in Large Games with Sequential Strategies.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

2014
An Exact Double-Oracle Algorithm for Zero-Sum Extensive-Form Games with Imperfect Information.
J. Artif. Intell. Res., 2014

An extended study on multi-objective security games.
Auton. Agents Multi Agent Syst., 2014

Online Learning Methods for Border Patrol Resource Allocation.
Proceedings of the Decision and Game Theory for Security - 5th International Conference, 2014

2013
Improving resource allocation strategies against human adversaries in security games: An extended study.
Artif. Intell., 2013

Bayesian Security Games for Controlling Contagion.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Security games with contagion: handling asymmetric information.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2013

Security games with interval uncertainty.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2013

Double-oracle algorithm for computing an exact nash equilibrium in zero-sum extensive-form games.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2013

Initial Exploration of Machine Learning to Predict Customer Demand in an Energy Market Simulation.
Proceedings of the Trading Agent Design and Analysis, 2013

2012
TRUSTS: Scheduling Randomized Patrols for Fare Inspection in Transit Systems Using Game Theory.
AI Mag., 2012

Reports of the AAAI 2011 Conference Workshops.
AI Mag., 2012

TRUSTS: Scheduling Randomized Patrols for Fare Inspection in Transit Systems.
Proceedings of the Twenty-Fourth Conference on Innovative Applications of Artificial Intelligence, 2012

Game Theoretic Model of Strategic Honeypot Selection in Computer Networks.
Proceedings of the Decision and Game Theory for Security - Third International Conference, 2012

Iterative Algorithm for Solving Two-player Zero-sum Extensive-form Games with Imperfect Information.
Proceedings of the ECAI 2012, 2012

Multi-objective optimization for security games.
Proceedings of the International Conference on Autonomous Agents and Multiagent Systems, 2012

Efficient Approximation for Security Games with Interval Uncertainty.
Proceedings of the Game Theory for Security, 2012

Towards Optimal Patrol Strategies for Fare Inspection in Transit Systems.
Proceedings of the Game Theory for Security, 2012

Security Games with Limited Surveillance: An Initial Report.
Proceedings of the Game Theory for Security, 2012

Security Games with Limited Surveillance.
Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence, 2012

2011
GUARDS and PROTECT: next generation applications of security games.
SIGecom Exch., 2011

Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness.
J. Artif. Intell. Res., 2011

Improving Resource Allocation Strategy against Human Adversaries in Security Games.
Proceedings of the IJCAI 2011, 2011

GUARDS - Innovative Application of Game Theory for National Airport Security.
Proceedings of the IJCAI 2011, 2011

Improved computational models of human behavior in security games.
Proceedings of the 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2011), 2011

GUARDS: game theoretic security allocation on a national scale.
Proceedings of the 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2011), 2011

Approximation methods for infinite Bayesian Stackelberg games: modeling distributional payoff uncertainty.
Proceedings of the 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2011), 2011

Quality-bounded solutions for finite Bayesian Stackelberg games: scaling up.
Proceedings of the 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2011), 2011

Mixed-Initiative Optimization in Security Games: A Preliminary Report.
Proceedings of the Help Me Help You: Bridging the Gaps in Human-Agent Collaboration, 2011

Linear-Time Resource Allocation in Security Games with Identical Fully Protective Resources.
Proceedings of the Applied Adversarial Reasoning and Risk Modeling, 2011

Refinement of Strong Stackelberg Equilibria in Security Games.
Proceedings of the Twenty-Fifth AAAI Conference on Artificial Intelligence, 2011

Towards the Integration of Multi-Attribute Optimization and Game Theory for Border Security Patrolling Strategies.
Proceedings of the Applied Adversarial Reasoning and Risk Modeling, 2011

2010
Software Assistants for Randomized Patrol Planning for the LAX Airport Police and the Federal Air Marshal Service.
Interfaces, 2010

A Framework for Evaluating Deployed Security Systems: Is There a Chink in your ARMOR?
Informatica (Slovenia), 2010

Editor's Introduction to the Special Issue on Quantitative Risk Analysis Techniques for Security Applications.
Informatica (Slovenia), 2010

Methods and Algorithms for Infinite Bayesian Stackelberg Security Games - (Extended Abstract).
Proceedings of the Decision and Game Theory for Security, 2010

Stackelberg vs. Nash in security games: interchangeability, equivalence, and uniqueness.
Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2010), 2010

How to protect a city: strategic security placement in graph-based domains.
Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2010), 2010

Asynchronous algorithms for approximate distributed constraint optimization with quality bounds.
Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2010), 2010

Robust Bayesian methods for Stackelberg security games.
Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2010), 2010

Urban Security: Game-Theoretic Resource Allocation in Networked Domains.
Proceedings of the Twenty-Fourth AAAI Conference on Artificial Intelligence, 2010

Security Games with Arbitrary Schedules: A Branch and Price Approach.
Proceedings of the Twenty-Fourth AAAI Conference on Artificial Intelligence, 2010

2009
Security applications: lessons of real-world deployment.
SIGecom Exch., 2009

Forecasting market prices in a supply chain game.
Electron. Commer. Res. Appl., 2009

Computing optimal randomized resource allocations for massive security games.
Proceedings of the 8th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), 2009

2008
Empirical Game-Theoretic Methods for Strategy Design and Analysis in Complex Games.
PhD thesis, 2008

Selecting strategies using empirical game models: an experimental analysis of meta-strategies.
Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2008), 2008

2007
Forecasting market prices in a supply chain game.
Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2007), 2007

Empirical game-theoretic analysis of the TAC Supply Chain game.
Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2007), 2007

Empirical Game-Theoretic Methods for Strategy Design and Analysis in Complex Games.
Proceedings of the Twenty-Second AAAI Conference on Artificial Intelligence, 2007

2006
Empirical mechanism design: methods, with application to a supply-chain scenario.
Proceedings of the Proceedings 7th ACM Conference on Electronic Commerce (EC-2006), 2006

Controlling a supply chain agent using value-based decomposition.
Proceedings of the Proceedings 7th ACM Conference on Electronic Commerce (EC-2006), 2006

Market Efficiency, Sales Competition, and the Bullwhip Effect in the TAC SCM Tournaments.
Proceedings of the Agent-Mediated Electronic Commerce. Automated Negotiation and Strategy Design for Electronic Markets, 2006

2005
Strategic Interactions in a Supply Chain Game.
Comput. Intell., 2005

An Analysis of the 2004 Supply Chain Management Trading Agent Competition.
Proceedings of the Agent-Mediated Electronic Commerce. Designing Trading Agents and Mechanisms, 2005

2004
Value-driven procurement in the TAC supply chain game.
SIGecom Exch., 2004

Strategic Interactions in the TAC 2003 Supply Chain Tournament.
Proceedings of the Computers and Games, 4th International Conference, 2004

Distributed Feedback Control for Decision Making on Supply Chains.
Proceedings of the Fourteenth International Conference on Automated Planning and Scheduling (ICAPS 2004), 2004


  Loading...