Publications
Refereed Journal & Proceeding Articles Technical Reports

Refereed Journal & Proceeding Articles

  1. A.R. Benton** and M. Baykal-Gürsoy, (2020), "Optimal Idle Timeout Policies," under review.

  2. A. Yolmeh* and M. Baykal-Gürsoy, (2019), "Weighted Network Search Games with Multiple Hidden Objects and Multiple Search Teams," under review.

  3. A. Yolmeh* and M. Baykal-Gürsoy, (2019), "Patrolling Games on a General Graph with Time-Dependent Node Values," Military Operations Research, 24:2, pp. 17-29.

  4. A. Yolmeh* and M. Baykal-Gürsoy, (2019), "A Two-Stage Invest-Defend Protection Game: Balancing Strategic and Operational Decisions," INFORMS Decision Analysis, Vol.16:1, pp. 46-66.

  5. A. Yolmeh* and M. Baykal-Gürsoy, (2018), "Urban Rail Patrolling: A Game Theoretic Approach," Journal of Transportation Security, Volume 11, Issue 1-2, pp. 23-40, 2018.

  6. A. Yolmeh and M. Baykal-Gürsoy, (2017), "A Robust Approach to Infrastructure Security Games," Computers and Industrial Engineering, 110, pp. 515-526.

  7. A. Garnaev, M. Baykal-Gürsoy, and H. V. Poor, (2016), "Security Games with Unknown Adversarial Strategies," IEEE Transactions on Cybernetics, Vol. 46:10, pp. 2291-2299

  8. A. Garnaev, M. Baykal-Gürsoy, and H. V. Poor, (2016), "A Game Theoretic Analysis of Secret and Reliable Communication with Active and Passive Adversarial Modes," IEEE Trans. on Wireless Communication, Vol. 15:3, pp. 2155-2163.

  9. A. Garnaev, M. Baykal-Gürsoy, and H. V. Poor, (2015), "How to Deal with an Intellectual Adversary," Computers and Industrial Engineering, Vol. 90, pp. 352-360.

  10. A. Garnaev, M. Baykal-Gürsoy, and H. V. Poor, (2014), "Incorporating Attack-Type Uncertainty into Network Protection," IEEE Transactions on Information Forensics & Security. Vol. 9:8, pp. 1278-1287.

  11. M. Baykal-Gürsoy, Z. Duan*, H. V. Poor, and A. Garnaev(2014), "Infrastructure Security Games", European Journal of Operational Research. Vol. 239:2, pp. 469-478.

  12. M. Baykal-Gürsoy M. and Z. Duan, (2009), "Infrastructure Security via Game Theory", presented at the INFORMS Conference, Austin, Texas, November 2010.

  13. M. Z. Avsar and M. Baykal-Gürsoy, (2006), "A Note on Two-Person Zero-Sum Communicating Stochastic Games," OR Letters, Vol. 34, 412-420.

  14. M. Z. Avsar* and M. Baykal-Gürsoy, (1999), "A Decomposition Approach for Undiscounted Two-Person Zero-Sum Stochastic Games," Mathematical Methods in Operations Research-ZOR, Vol. 49, 483-500.

  15. M. Baykal-Gürsoy M. and M.Z. Avsar (1999), "Two-Person Zero-Sum Undiscounted Stochastic Games", Proceedings of IEEE Conference on Decision and Control, Phoenix, Arizona, Vol. 1, pp. 576-581.

  16. M. Baykal-Gürsoy (1991), "Two-Person Zero-Sum Stochastic Games", Annals of Operations Research, Volume 28, pp. 135-152.

▲Top

 

Technical Reports

  1. M.Z. Avsar and M. Baykal-Gürsoy, (2005) "A Note on Two-Person Zero-Sum Communicating Stochastic Games", ISE Working Paper 05-016.

▲Top