Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Planning and learning in security games

Published: 01 June 2013 Publication History
  • Get Citation Alerts
  • Abstract

    We present two new critical domains where security games are applied to generate randomized patrol schedules. For each setting, we present the current research that we have produced. We then propose two new challenges to build accurate schedules that can be deployed effectively in the real world. The first is a planning challenge. Current schedules cannot handle interruptions. Thus, more expressive models, that allow for reasoning over stochastic actions, are needed. The second is a learning challenge. In several security domains, data can be used to extract information about both the environment and the attacker. This information can then be used to improve the defender's strategies.

    References

    [1]
    Conitzer, V. and Sandholm, T. 2006. Computing the optimal strategy to commit to. In Conference on Electronic Commerce (EC).
    [2]
    Jain, M., Conitzer, V., and Tambe, M. 2013. Security scheduling for real-world networks. In International Conference on Autonomous Agents and Multiagent Systems (AAMAS).
    [3]
    Jain, M., Tambe, M., and Kiekintveld, C. 2011. Quality-bounded solutions for finite bayesian stackelberg games: Scaling up. In Int. Conf. on Autonomous Agents and Multiagent Systems.
    [4]
    Jiang, A. X., Yin, Z., Zhang, C., Tambe, M., and Kraus, S. 2013. Game-theoretic randomization for security patrolling with dynamic execution uncertainty. In International Conference on Autonomous Agents and Multiagent Systems (AAMAS).
    [5]
    Johnson, M. P., Fang, F., and Tambe, M. 2012. Patrol strategies to maximize pristine forest area. In Conference on Artificial Intelligence (AAAI).
    [6]
    Nguyen, T. H., Yang, R., Azaria, A., Kraus, S., and Tambe, M. 2013. Analyzing the effectiveness of adversary modeling in security games. In Conf. on Artificial Intelligence (AAAI).
    [7]
    Tambe, M. 2011. Security and Game Theory: Algorithms, Deployed Systems, Lessons Learned. Cambridge University Press.
    [8]
    Yang, R., Kiekintveld, C., Ordonez, F., Tambe, M., and John, R. 2011. Improving resource allocation strategy against human adversaries in security games. In International Joint Conference on Artificial Intelligence (IJCAI).
    [9]
    Yin, Z., Jain, M., Tambe, M., and Ordonez, F. 2011. Risk-averse strategies for security games with execution and observational uncertainty. In Conference on Artificial Intelligence (AAAI).
    [10]
    Yin, Z., Jiang, A., Johnson, M., Tambe, M., Kiekintveld, C., Leyton-Brown, K., Sandholm, T., and Sullivan, J. 2012. Trusts: Scheduling randomized patrols for fare inspection in transit systems. In Conference on Innovative Applications of Artificial Intelligence (IAAI).
    [11]
    Yin, Z. and Tambe, M. 2012. A unified method for handling discrete and continuous uncertainty in Bayesian stackelberg games. In International Conference on Autonomous Agents and Multiagent Systems (AAMAS).

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM SIGecom Exchanges
    ACM SIGecom Exchanges  Volume 12, Issue 1
    June 2013
    56 pages
    EISSN:1551-9031
    DOI:10.1145/2509013
    Issue’s Table of Contents

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 01 June 2013
    Published in SIGECOM Volume 12, Issue 1

    Check for updates

    Author Tags

    1. artificial intelligence
    2. game theory

    Qualifiers

    • Research-article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 687
      Total Downloads
    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)0

    Other Metrics

    Citations

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media