N. Alon, N. Cesa-bianchi, C. Gentile, and Y. Mansour, From bandits to experts: A tale of domination and independence, the 27th Advances in Neural Information Processing Systems (NeurIPS), pp.1610-1618, 2013.

N. Alon, N. Cesa-bianchi, O. Dekel, and T. Koren, Online learning with feedback graphs: Beyond bandits, the 28th Conference on Learning Theory (COLT), vol.40, pp.23-35, 2015.

J. Audibert, S. Bubeck, and G. Lugosi, Regret in online combinatorial optimization, Mathematics of Operations Research, vol.39, issue.1, pp.31-45, 2014.

P. Auer, N. Cesa-bianchi, Y. Freund, and R. E. Schapire, The nonstochastic multiarmed bandit problem, SIAM journal on computing, vol.32, issue.1, pp.48-77, 2002.

S. Behnezhad, S. Dehghani, M. Derakhshan, M. T. Aghayi, and S. Seddighin, Faster and simpler algorithm for optimal strategies of blotto game, the 31st AAAI Conference on Artificial Intelligence (AAAI), pp.369-375, 2017.

S. Bhattacharya, T. Ba?ar, and M. Falcone, Surveillance for security as a pursuit-evasion game, the 5th International Conference on Decision and Game Theory for Security (GameSec), pp.370-379, 2014.

J. Blocki, N. Christin, A. Datta, A. D. Procaccia, and A. Sinha, Audit games, the 23rd International Joint Conference on Artificial Intelligence (IJCAI), pp.41-47, 2013.

E. Borel, La théorie du jeu et leséquations intégralesà noyau symétrique. Comptes rendus de l'Académie des Sciences, vol.173, p.58, 1921.

J. L. Bower and C. G. Gilbert, From resource allocation to strategy, 2005.

N. Cesa-bianchi and G. Lugosi, Combinatorial bandits, Journal of Computer and System Sciences, vol.78, issue.5, pp.1404-1422, 2012.

W. Chen, Y. Wang, and Y. Yuan, Combinatorial multiarmed bandit: General framework and applications, the 30th International Conference on Machine Learning (ICML), pp.151-159, 2013.

P. H. Chia, Colonel Blotto in web security, the 11th Workshop on Economics and Information Security, WEIS Rump Session, pp.141-150, 2012.

S. F. Chien, C. C. Zarakovitis, Q. Ni, and P. Xiao, Stochastic asymmetric blotto game approach for wireless resource allocation strategies, IEEE Transactions on Wireless Communications, 2019.

Y. Freund and R. E. Schapire, A decision-theoretic generalization of on-line learning and an application to boosting, Journal of computer and system sciences, vol.55, issue.1, pp.119-139, 1997.

O. Gross and R. Wagner, A continuous colonel blotto game, 1950.

A. György, T. Linder, G. Lugosi, and G. Ottucsák, The on-line shortest path problem under partial monitoring, Journal of Machine Learning Research, vol.8, pp.2369-2403, 2007.

J. P. Hespanha, M. Prandini, and S. Sastry, Probabilistic pursuit-evasion games: A one-step nash approach, the 39th IEEE Conference on Decision and Control (CDC), pp.2272-2277, 2000.

A. Kalai and S. Vempala, Efficient algorithms for online decision problems, Journal of Computer and System Sciences, vol.71, issue.3, pp.291-307, 2005.

T. Kocák, G. Neu, M. Valko, and R. Munos, Efficient learning by implicit exploration in bandit problems with side observations, the 28th Advances in Neural Information Processing Systems (NeurIPS), pp.613-621, 2014.

D. Korzhyk, V. Conitzer, and R. Parr, Complexity of computing optimal stackelberg strategies in security resource allocation games, the 24th AAAI Conference on Artificial Intelligence (AAAI), pp.805-810, 2010.

D. Kovenock and B. Roberson, Coalitional Colonel Blotto games with application to the economics of alliances, Journal of Public Economic Theory, vol.14, issue.4, pp.653-676, 2012.

S. Mannor and O. Shamir, From bandits to experts: On the value of side-observations, the 25th Advances in Neural Information Processing Systems (NeurIPS), pp.684-692, 2011.

A. M. Masucci and A. Silva, Strategic resource allocation for competitive influence in social networks, the 52nd Annual Allerton Conference on Communication, Control, and Computing, pp.951-958, 2014.
URL : https://hal.archives-ouvertes.fr/hal-00950653

A. M. Masucci and A. Silva, Defensive resource allocation in social networks, the 54th IEEE Conference on Decision and Control (CDC), pp.2927-2932, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01180954

V. Navda, A. Bohra, S. Ganguly, and D. Rubenstein, Using channel hopping to increase 802.11 resilience to jamming attacks, INFOCOM 2007. 26th IEEE International Conference on Computer Communications, pp.2526-2530, 2007.

B. Roberson, The Colonel Blotto game, Economic Theory, vol.29, issue.1, pp.2-24, 2006.

S. Sakaue, M. Ishihata, and S. Minato, Efficient bandit combinatorial optimization algorithm with zero-suppressed binary decision diagrams, International Conference on Artificial Intelligence and Statistics, pp.585-594, 2018.

G. Schwartz, P. Loiseau, and S. S. Sastry, The heterogeneous Colonel Blotto game, the 7th International Conference on Network Games, Control and Optimization (NetGCoop), pp.232-238, 2014.

E. Takimoto and M. K. Warmuth, Path kernels and multiplicative updates, Journal of Machine Learning Research, vol.4, pp.773-818, 2003.

R. Vidal, O. Shakernia, H. J. Kim, D. H. Shim, and S. Sastry, Probabilistic pursuit-evasion games: theory, implementation, and experimental evaluation, IEEE transactions on robotics and automation, vol.18, issue.5, pp.662-669, 2002.

V. Neumann and J. , A certain zero-sum two-person game equivalent to the optimal assignment problem, Contributions to the Theory of Games, vol.2, pp.5-12, 1953.

D. Q. Vu, P. Loiseau, and A. Silva, Efficient computation of approximate equilibria in discrete colonel blotto games, the 27th International Joint Conference on Artificial Intelligence (IJCAI), pp.519-526, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01955448

Q. Wang and M. Liu, Learning in hide-and-seek, 2016.

, IEEE/ACM Transactions on Networking, vol.24, issue.2, pp.1279-1292

Y. Yavin, Pursuit-evasion differential games with deception or interrupted observation, Pursuit-Evasion Differential Games, pp.191-203, 1987.

T. Yucek, A. , and H. , A survey of spectrum sensing algorithms for cognitive radio applications, IEEE communications surveys & tutorials, vol.11, issue.1, pp.116-130, 2009.

C. Zhang, V. Lesser, and P. Shenoy, A multi-agent learning approach to online distributed resource allocation, the 21st International Joint Conference on Artificial Intelligence (IJCAI), 2009.