Abstract
The paper proposes a new approach to finding Defender’s strategy in Security Games. The method is based on a modification to the Upper Confidence bound applied to Trees (UCT) algorithm that allows to address the imperfect information games. The key advantage of our approach compared to the ones proposed hitherto in the literature lies in high flexibility of our method which can be applied, without any modifications, to a large variety of security games models. Furthermore, due to simulation-based nature of the proposed solution, various Attacker’s profiles (e.g. non-completely rational behavior) can be easily tested, as opposed to the methods rooted in the game-theoretic framework.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ahmadizadeh, K., Gomes, C.P., Sabharwal, A.: Game playing techniques for optimization under uncertainty (2010)
Auer, P., Cesa-Bianchi, N., Fischer, P.: Finite-time analysis of the multiarmed bandit problem. Machine Learning 47(2-3), 235–256 (2002)
Fang, F., Jiang, A.X., Tambe, M.: Optimal patrol strategy for protecting moving targets with multiple mobile resources. In: Proceedings of the 2013 International Conference on Autonomous Agents and Multi-agent Systems, pp. 957–964. International Foundation for Autonomous Agents and Multiagent Systems (2013)
Jain, M., Tsai, J., Pita, J., Kiekintveld, C., Rathi, S., Tambe, M., Ordóñez, F.: Software assistants for randomized patrol planning for the lax airport police and the federal air marshal service. Interfaces 40(4), 267–290 (2010)
Johnson, M.P., Fang, F., Tambe, M.: Patrol strategies to maximize pristine forest area. In: AAAI (2012)
Kocsis, L., Szepesvári, C.: Bandit based monte-carlo planning. In: Fürnkranz, J., Scheffer, T., Spiliopoulou, M. (eds.) ECML 2006. LNCS (LNAI), vol. 4212, pp. 282–293. Springer, Heidelberg (2006)
Mańdziuk, J., Świechowski, M.: UCT application to Dynamic Vehicle Routing Problem with Heavy Traffic Jams (submitted) (2015)
Pita, J., John, R., Maheswaran, R., Tambe, M., Yang, R., Kraus, S.: A robust approach to addressing human adversaries in security games. In: Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems, vol. 3, pp. 1297–1298. International Foundation for Autonomous Agents and Multiagent Systems (2012)
Rimmel, A., Teytaud, F., Cazenave, T.: Optimization of the nested monte-carlo algorithm on the traveling salesman problem with time windows. In: Di Chio, C., et al. (eds.) EvoApplications 2011, Part II. LNCS, vol. 6625, pp. 501–510. Springer, Heidelberg (2011)
Sabharwal, A., Samulowitz, H., Reddy, C.: Guiding combinatorial optimization with UCT. In: Beldiceanu, N., Jussien, N., Pinson, É. (eds.) CPAIOR 2012. LNCS, vol. 7298, pp. 356–361. Springer, Heidelberg (2012)
Shieh, E., An, B., Yang, R., Tambe, M., Baldwin, C., DiRenzo, J., Maule, B., Meyer, G.: Protect: A deployed game theoretic system to protect the ports of the united states. In: Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems, vol. 1, pp. 13–20. International Foundation for Autonomous Agents and Multiagent Systems (2012)
Stackelberg, H.V.: Marktform und gleichgewicht. Springer, Vienna (1934)
Świechowski, M., Mańdziuk, J.: Self-adaptation of playing strategies in general game playing. IEEE Transactions on Computational Intelligence and AI in Games 6(4), 367–381 (2014)
Walędzik, K., Mańdziuk, J.: Multigame playing by means of UCT enhanced with automatically generated evaluation functions. In: Schmidhuber, J., Thórisson, K.R., Looks, M. (eds.) AGI 2011. LNCS(LNAI), vol. 6830, pp. 327–332. Springer, Heidelberg (2011)
Walędzik, K., Mańdziuk, J.: An automatically-generated evaluation function in general game playing. IEEE Transactions on Computational Intelligence and AI in Games 6(3), 258–270 (2014)
Walędzik, K., Mańdziuk, J., Zadrożny, S.: Proactive and reactive risk-aware project scheduling. In: 2nd IEEE Symposium on Computational Intelligence for Human-like Intelligence (CIHLI 2014), pp. 94–101. IEEE Press (2014)
Wang, Y., Gelly, S.: Modifications of uct and sequence-like simulations for monte-carlo go. CIG 7, 175–182 (2007)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Karwowski, J., Mańdziuk, J. (2015). A New Approach to Security Games. In: Rutkowski, L., Korytkowski, M., Scherer, R., Tadeusiewicz, R., Zadeh, L., Zurada, J. (eds) Artificial Intelligence and Soft Computing. ICAISC 2015. Lecture Notes in Computer Science(), vol 9120. Springer, Cham. https://doi.org/10.1007/978-3-319-19369-4_36
Download citation
DOI: https://doi.org/10.1007/978-3-319-19369-4_36
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-19368-7
Online ISBN: 978-3-319-19369-4
eBook Packages: Computer ScienceComputer Science (R0)