ABSTRACT

The rising tide of threats, from financial cybercrime to asymmetric military conflicts, demands greater sophistication in tools and techniques of law enforcement, commercial and domestic security professionals, and terrorism prevention. Concentrating on computational solutions to determine or anticipate an adversary's intent, Adversarial Reasoning:

chapter 1|26 pages

2 Human Factors in Opponent Intent

chapter 1|24 pages

4 Plan Recognition

chapter |24 pages

Chatper 2.1 Detecting Deception

chapter 2|20 pages

2 Deception as a Semantic Attack

chapter 2|22 pages

3 Application and Value of Deception

chapter 2|42 pages

4 Robustness against Deception

chapter 3|22 pages

1 The Role of Imperfect Information

chapter 3|36 pages

3 Strategies in Large-Scale Problems*

chapter 3|28 pages

4 Learning to Strategize

chapter 3|20 pages

5 Learning from and about the Opponent