skip to main content
research-article

GUARDS and PROTECT: next generation applications of security games

Published:01 March 2011Publication History
Skip Abstract Section

Abstract

We provide an overview of two recent applications of security games. We describe new features and challenges introduced in the new applications.

References

  1. An, B., Jain, M., Tambe, M., and Klekintveld, C. 2011. Mixed-initiative optimization in security games: A preliminary report. In Proceedings of the AAAI Spring Symposium on Help Me Help You: Bridging the Gaps in Human-Agent Collaboration.Google ScholarGoogle Scholar
  2. Basilico, N., Gatti, N., and Amigoni, F. 2009. Leader-follower strategies for robotic patrolling in environments with arbitrary topologies. In Proceedings of The 8th International Conference on Autonomous Agents and Multiagent Systems (AAMAS). 500--503. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Dickerson, J. P., Simari, G. I., Subrahmanian, V. S., and Kraus, S. 2010. A graph-theoretic approach to protect static and moving targets from adversaries. In Proceedings of The 9th International Conference on Autonomous Agents and Multiagent Systems (AAMAS). 299--306. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Jain, M., Kardes, E., Kiekintveld, C., Ordonez, F., and Tambe, M. 2010. Security games with arbitrary schedules: A branch and price approach. In Proceedings of The 24th AAAI Conference on Artificial Intelligence. 792--797.Google ScholarGoogle Scholar
  5. Jain, M., Kiekintveld, C., and Tambe, M. 2011. Quality-bounded solutions for finite bayesian stackelberg games: Scaling up. In Proceedings of The 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS). Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Jain, M., Korzhyk, D., Vanek, O., Pechoucek, M., Conitzer, V., and Tambe, M. 2011. A double oracle algorithm for zero-sum security games on graphs. In Proceedings of The 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS). Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Jakob, M., Vanek, O., Urban, S., Benda, P., and Pechoucek, M. 2010. Employing agents to improve the security of international maritime transport. In Proceedings of AAMAS 2010 Workshop on Agents In Traffic and Transportation.Google ScholarGoogle Scholar
  8. Kiekintveld, C., Jain, M., Tsai, J., Pita, J., Tambe, M., and Ordonez, F. 2009. Computing optimal randomized resource allocations for massive security games. In Proceedings of The 8th International Conference on Autonomous Agents and Multiagent Systems (AAMAS). 689--696. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Kiekintveld, C., Marecki, J., and Tambe, M. 2011. Approximation methods for infinite bayesian stackelberg games: Modeling distributional uncertainty. In Proceedings of The 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS). Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Korzhyk, D., Conitzer, V., and Parr, R. 2010. Complexity of computing optimal stackelberg strategies in security resource allocation games. In Proceedings of The 24th AAAI Conference on Artificial Intelligence. 805--810.Google ScholarGoogle Scholar
  11. Korzhyk, D., Conitzer, V., and Parr, R. 2011. Solving stackelberg games with uncertain observability. In Proceedings of The 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS). Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Paruchuri, P., Pearce, J. P., Marecki, J., Tambe, M., Ordonez, F., and Kraus, S. 2008. Playing games with security: An efficient exact algorithm for Bayesian Stackelberg games. In Proceedings of The 7th International Conference on Autonomous Agents and Multiagent Systems (AAMAS). 895--902. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Pita, J., Bellamane, H., Jain, M., Kiekintveld, C., Tsai, J., Ordez, F., and Tambe, M. 2009. Security applications: Lessons of real-world deployment. ACM SIGecom Exchanges 8, 2. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Pita, J., Jain, M., Tambe, M., Ordóñez, F., and Kraus, S. 2010. Robust solutions to stackelberg games: Addressing bounded rationality and limited observations in human cognition. Artificial Intelligence 174, 15, 1142--1171. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Pita, J., Jain, M., Western, C., Portway, C., Tambe, M., Ordonez, F., Kraus, S., and Parachuri, P. 2008. Deployed ARMOR protection: The application of a game-theoretic model for security at the Los Angeles International Airport. In Proceedings of The 7th International Conference on Autonomous Agents and Multiagent Systems (AAMAS). 125--132. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Pita, J., Tambe, M., Kiekintveld, C., Cullen, S., and Steigerwald, E. 2011. Guards - game theoretic security allocation on a national scale. In Proceedings of The 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS). Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Taylor, M. E., Kiekintveld, C., Western, C., and Tambe, M. 2010. A framework for evaluating deployed security systems: Is there a chink in your armor? Informatica 34, 129--139.Google ScholarGoogle Scholar
  18. Tsai, J., Rathi, S., Kiekintveld, C., Ordonez, F., and Tambe, M. 2009. IRIS: a tool for strategic security allocation in transportation networks. In Proceedings of The 8th International Conference on Autonomous Agents and Multiagent Systems (AAMAS). 37--44.Google ScholarGoogle Scholar
  19. Yin, Z., Korzhyk, D., Kiekintveld, C., Conitzer, V., and Tambe, M. 2010. Stackelberg vs. nash in security games: Interchangeability, equivalence, and uniqueness. In Proceedings of The 9th International Conference on Autonomous Agents and Multiagent Systems (AAMAS). 1139--1146. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. GUARDS and PROTECT: next generation applications of security games

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM SIGecom Exchanges
      ACM SIGecom Exchanges  Volume 10, Issue 1
      March 2011
      43 pages
      EISSN:1551-9031
      DOI:10.1145/1978721
      Issue’s Table of Contents

      Copyright © 2011 Authors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 1 March 2011

      Check for updates

      Qualifiers

      • research-article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader