Follow
Branislav Bošanský
Branislav Bošanský
Associate Professor, Dept. of Computer Science, FEE, Czech Technical University in Prague
Verified email at agents.fel.cvut.cz - Homepage
Title
Cited by
Cited by
Year
Optimal network security hardening using attack graph games
K Durkota, V Lisy, B Bošansky, C Kiekintveld
Proceedings of IJCAI, 7-14, 2015
1552015
Manipulating adversary’s belief: A dynamic game approach to deception by design for proactive network security
K Horák, Q Zhu, B Bošanský
Decision and Game Theory for Security: 8th International Conference, GameSec …, 2017
1202017
An exact double-oracle algorithm for zero-sum extensive-form games with imperfect information
B Bosansky, C Kiekintveld, V Lisy, M Pechoucek
Journal of Artificial Intelligence Research 51, 829-866, 2014
1182014
Game theoretic model of strategic honeypot selection in computer networks
R Píbil, V Lisý, C Kiekintveld, B Bošanský, M Pěchouček
Decision and Game Theory for Security: Third International Conference …, 2012
1182012
Computing time-dependent policies for patrolling games with mobile targets
B Bošanský, V Lisý, M Jakob, M Pechoucek
AAMAS. IFAAMAS, 2011
972011
Heuristic search value iteration for one-sided partially observable stochastic games
K Horák, B Bošanský, M Pěchouček
Proceedings of the AAAI Conference on Artificial Intelligence 31 (1), 2017
722017
Game-theoretic resource allocation for malicious packet detection in computer networks.
O Vanek, Z Yin, M Jain, B Bosanský, M Tambe, M Pechoucek
AAMAS, 905-912, 2012
712012
Approximate solutions for attack graph games with imperfect information
K Durkota, V Lisý, B Bošanský, C Kiekintveld
Decision and Game Theory for Security: 6th International Conference, GameSec …, 2015
602015
Solving partially observable stochastic games with public observations
K Horák, B Bošanský
Proceedings of the AAAI conference on artificial intelligence 33 (01), 2029-2036, 2019
572019
Using correlated strategies for computing stackelberg equilibria in extensive-form games
J Cermak, B Bosansky, K Durkota, V Lisy, C Kiekintveld
Proceedings of the AAAI Conference on Artificial Intelligence 30 (1), 2016
572016
Optimizing honeypot strategies against dynamic lateral movement using partially observable stochastic games
K Horák, B Bošanský, P Tomášek, C Kiekintveld, C Kamhoua
Computers & Security 87, 101579, 2019
542019
Sequence-form algorithm for computing stackelberg equilibria in extensive-form games
B Bosansky, J Cermak
Proceedings of the AAAI Conference on Artificial Intelligence 29 (1), 2015
542015
Algorithms for computing strategies in two-player simultaneous move games
B Bošanský, V Lisý, M Lanctot, J Čermák, MHM Winands
Artificial Intelligence 237, 1-40, 2016
532016
Transiting areas patrolled by a mobile adversary
O Vaněk, B Bošanský, M Jakob, M Pěchouček
Proceedings of the 2010 IEEE Conference on Computational Intelligence and …, 2010
492010
Comparing Strategic Secrecy and Stackelberg Commitment in Security Games.
Q Guo, B An, B Bosanský, C Kiekintveld
IJCAI, 3691-3699, 2017
482017
Case Studies of Network Defense with Attack Graph Games
K Durkota, V Lisy, C Kiekintveld, B Bosansky, M Pechoucek
IEEE Intelligent Systems 31 (5), 24 - 30, 2016
472016
Combining compact representation and incremental generation in large games with sequential strategies
B Bosansky, AX Jiang, M Tambe, C Kiekintveld
Proceedings of the AAAI Conference on Artificial Intelligence 29 (1), 2015
462015
Hardening networks against strategic attackers using attack graph games
K Durkota, V Lisý, B Bošanský, C Kiekintveld, M Pěchouček
Computers & Security 87, 101578, 2019
362019
Game-theoretic approach to adversarial plan recognition
V Lisý, R Píbil, J Stiborek, B Bošanský, M Pěchouček
ECAI 2012, 546-551, 2012
36*2012
Game-theoretic algorithms for optimal network security hardening using attack graphs
K Durkota, V Lisý, C Kiekintveld, B Bošanský
Database 20, 4xPC, 2015
332015
The system can't perform the operation now. Try again later.
Articles 1–20