Security Games with Multiple Attacker Resources

Cite

Text

Korzhyk et al. "Security Games with Multiple Attacker Resources." International Joint Conference on Artificial Intelligence, 2011. doi:10.5591/978-1-57735-516-8/IJCAI11-056

Markdown

[Korzhyk et al. "Security Games with Multiple Attacker Resources." International Joint Conference on Artificial Intelligence, 2011.](https://mlanthology.org/ijcai/2011/korzhyk2011ijcai-security/) doi:10.5591/978-1-57735-516-8/IJCAI11-056

BibTeX

@inproceedings{korzhyk2011ijcai-security,
  title     = {{Security Games with Multiple Attacker Resources}},
  author    = {Korzhyk, Dmytro and Conitzer, Vincent and Parr, Ronald},
  booktitle = {International Joint Conference on Artificial Intelligence},
  year      = {2011},
  pages     = {273-279},
  doi       = {10.5591/978-1-57735-516-8/IJCAI11-056},
  url       = {https://mlanthology.org/ijcai/2011/korzhyk2011ijcai-security/}
}