Computing Robust Counter-Strategies