Skip to main content

A New Approach to Security Games

  • Conference paper
Artificial Intelligence and Soft Computing (ICAISC 2015)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 9120))

Included in the following conference series:

Abstract

The paper proposes a new approach to finding Defender’s strategy in Security Games. The method is based on a modification to the Upper Confidence bound applied to Trees (UCT) algorithm that allows to address the imperfect information games. The key advantage of our approach compared to the ones proposed hitherto in the literature lies in high flexibility of our method which can be applied, without any modifications, to a large variety of security games models. Furthermore, due to simulation-based nature of the proposed solution, various Attacker’s profiles (e.g. non-completely rational behavior) can be easily tested, as opposed to the methods rooted in the game-theoretic framework.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ahmadizadeh, K., Gomes, C.P., Sabharwal, A.: Game playing techniques for optimization under uncertainty (2010)

    Google Scholar 

  2. Auer, P., Cesa-Bianchi, N., Fischer, P.: Finite-time analysis of the multiarmed bandit problem. Machine Learning 47(2-3), 235–256 (2002)

    Article  Google Scholar 

  3. Fang, F., Jiang, A.X., Tambe, M.: Optimal patrol strategy for protecting moving targets with multiple mobile resources. In: Proceedings of the 2013 International Conference on Autonomous Agents and Multi-agent Systems, pp. 957–964. International Foundation for Autonomous Agents and Multiagent Systems (2013)

    Google Scholar 

  4. Jain, M., Tsai, J., Pita, J., Kiekintveld, C., Rathi, S., Tambe, M., Ordóñez, F.: Software assistants for randomized patrol planning for the lax airport police and the federal air marshal service. Interfaces 40(4), 267–290 (2010)

    Article  Google Scholar 

  5. Johnson, M.P., Fang, F., Tambe, M.: Patrol strategies to maximize pristine forest area. In: AAAI (2012)

    Google Scholar 

  6. Kocsis, L., Szepesvári, C.: Bandit based monte-carlo planning. In: Fürnkranz, J., Scheffer, T., Spiliopoulou, M. (eds.) ECML 2006. LNCS (LNAI), vol. 4212, pp. 282–293. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  7. Mańdziuk, J., Świechowski, M.: UCT application to Dynamic Vehicle Routing Problem with Heavy Traffic Jams (submitted) (2015)

    Google Scholar 

  8. Pita, J., John, R., Maheswaran, R., Tambe, M., Yang, R., Kraus, S.: A robust approach to addressing human adversaries in security games. In: Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems, vol. 3, pp. 1297–1298. International Foundation for Autonomous Agents and Multiagent Systems (2012)

    Google Scholar 

  9. Rimmel, A., Teytaud, F., Cazenave, T.: Optimization of the nested monte-carlo algorithm on the traveling salesman problem with time windows. In: Di Chio, C., et al. (eds.) EvoApplications 2011, Part II. LNCS, vol. 6625, pp. 501–510. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  10. Sabharwal, A., Samulowitz, H., Reddy, C.: Guiding combinatorial optimization with UCT. In: Beldiceanu, N., Jussien, N., Pinson, É. (eds.) CPAIOR 2012. LNCS, vol. 7298, pp. 356–361. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  11. Shieh, E., An, B., Yang, R., Tambe, M., Baldwin, C., DiRenzo, J., Maule, B., Meyer, G.: Protect: A deployed game theoretic system to protect the ports of the united states. In: Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems, vol. 1, pp. 13–20. International Foundation for Autonomous Agents and Multiagent Systems (2012)

    Google Scholar 

  12. Stackelberg, H.V.: Marktform und gleichgewicht. Springer, Vienna (1934)

    Google Scholar 

  13. Świechowski, M., Mańdziuk, J.: Self-adaptation of playing strategies in general game playing. IEEE Transactions on Computational Intelligence and AI in Games 6(4), 367–381 (2014)

    Article  Google Scholar 

  14. Walędzik, K., Mańdziuk, J.: Multigame playing by means of UCT enhanced with automatically generated evaluation functions. In: Schmidhuber, J., Thórisson, K.R., Looks, M. (eds.) AGI 2011. LNCS(LNAI), vol. 6830, pp. 327–332. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  15. Walędzik, K., Mańdziuk, J.: An automatically-generated evaluation function in general game playing. IEEE Transactions on Computational Intelligence and AI in Games 6(3), 258–270 (2014)

    Article  Google Scholar 

  16. Walędzik, K., Mańdziuk, J., Zadrożny, S.: Proactive and reactive risk-aware project scheduling. In: 2nd IEEE Symposium on Computational Intelligence for Human-like Intelligence (CIHLI 2014), pp. 94–101. IEEE Press (2014)

    Google Scholar 

  17. Wang, Y., Gelly, S.: Modifications of uct and sequence-like simulations for monte-carlo go. CIG 7, 175–182 (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jan Karwowski .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Karwowski, J., Mańdziuk, J. (2015). A New Approach to Security Games. In: Rutkowski, L., Korytkowski, M., Scherer, R., Tadeusiewicz, R., Zadeh, L., Zurada, J. (eds) Artificial Intelligence and Soft Computing. ICAISC 2015. Lecture Notes in Computer Science(), vol 9120. Springer, Cham. https://doi.org/10.1007/978-3-319-19369-4_36

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-19369-4_36

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-19368-7

  • Online ISBN: 978-3-319-19369-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics