Abstract
We provide an overview of two recent applications of security games. We describe new features and challenges introduced in the new applications.
- An, B., Jain, M., Tambe, M., and Klekintveld, C. 2011. Mixed-initiative optimization in security games: A preliminary report. In Proceedings of the AAAI Spring Symposium on Help Me Help You: Bridging the Gaps in Human-Agent Collaboration.Google Scholar
- Basilico, N., Gatti, N., and Amigoni, F. 2009. Leader-follower strategies for robotic patrolling in environments with arbitrary topologies. In Proceedings of The 8th International Conference on Autonomous Agents and Multiagent Systems (AAMAS). 500--503. Google ScholarDigital Library
- Dickerson, J. P., Simari, G. I., Subrahmanian, V. S., and Kraus, S. 2010. A graph-theoretic approach to protect static and moving targets from adversaries. In Proceedings of The 9th International Conference on Autonomous Agents and Multiagent Systems (AAMAS). 299--306. Google ScholarDigital Library
- Jain, M., Kardes, E., Kiekintveld, C., Ordonez, F., and Tambe, M. 2010. Security games with arbitrary schedules: A branch and price approach. In Proceedings of The 24th AAAI Conference on Artificial Intelligence. 792--797.Google Scholar
- Jain, M., Kiekintveld, C., and Tambe, M. 2011. Quality-bounded solutions for finite bayesian stackelberg games: Scaling up. In Proceedings of The 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS). Google ScholarDigital Library
- Jain, M., Korzhyk, D., Vanek, O., Pechoucek, M., Conitzer, V., and Tambe, M. 2011. A double oracle algorithm for zero-sum security games on graphs. In Proceedings of The 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS). Google ScholarDigital Library
- Jakob, M., Vanek, O., Urban, S., Benda, P., and Pechoucek, M. 2010. Employing agents to improve the security of international maritime transport. In Proceedings of AAMAS 2010 Workshop on Agents In Traffic and Transportation.Google Scholar
- Kiekintveld, C., Jain, M., Tsai, J., Pita, J., Tambe, M., and Ordonez, F. 2009. Computing optimal randomized resource allocations for massive security games. In Proceedings of The 8th International Conference on Autonomous Agents and Multiagent Systems (AAMAS). 689--696. Google ScholarDigital Library
- Kiekintveld, C., Marecki, J., and Tambe, M. 2011. Approximation methods for infinite bayesian stackelberg games: Modeling distributional uncertainty. In Proceedings of The 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS). Google ScholarDigital Library
- Korzhyk, D., Conitzer, V., and Parr, R. 2010. Complexity of computing optimal stackelberg strategies in security resource allocation games. In Proceedings of The 24th AAAI Conference on Artificial Intelligence. 805--810.Google Scholar
- Korzhyk, D., Conitzer, V., and Parr, R. 2011. Solving stackelberg games with uncertain observability. In Proceedings of The 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS). Google ScholarDigital Library
- Paruchuri, P., Pearce, J. P., Marecki, J., Tambe, M., Ordonez, F., and Kraus, S. 2008. Playing games with security: An efficient exact algorithm for Bayesian Stackelberg games. In Proceedings of The 7th International Conference on Autonomous Agents and Multiagent Systems (AAMAS). 895--902. Google ScholarDigital Library
- Pita, J., Bellamane, H., Jain, M., Kiekintveld, C., Tsai, J., Ordez, F., and Tambe, M. 2009. Security applications: Lessons of real-world deployment. ACM SIGecom Exchanges 8, 2. Google ScholarDigital Library
- Pita, J., Jain, M., Tambe, M., Ordóñez, F., and Kraus, S. 2010. Robust solutions to stackelberg games: Addressing bounded rationality and limited observations in human cognition. Artificial Intelligence 174, 15, 1142--1171. Google ScholarDigital Library
- Pita, J., Jain, M., Western, C., Portway, C., Tambe, M., Ordonez, F., Kraus, S., and Parachuri, P. 2008. Deployed ARMOR protection: The application of a game-theoretic model for security at the Los Angeles International Airport. In Proceedings of The 7th International Conference on Autonomous Agents and Multiagent Systems (AAMAS). 125--132. Google ScholarDigital Library
- Pita, J., Tambe, M., Kiekintveld, C., Cullen, S., and Steigerwald, E. 2011. Guards - game theoretic security allocation on a national scale. In Proceedings of The 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS). Google ScholarDigital Library
- Taylor, M. E., Kiekintveld, C., Western, C., and Tambe, M. 2010. A framework for evaluating deployed security systems: Is there a chink in your armor? Informatica 34, 129--139.Google Scholar
- Tsai, J., Rathi, S., Kiekintveld, C., Ordonez, F., and Tambe, M. 2009. IRIS: a tool for strategic security allocation in transportation networks. In Proceedings of The 8th International Conference on Autonomous Agents and Multiagent Systems (AAMAS). 37--44.Google Scholar
- Yin, Z., Korzhyk, D., Kiekintveld, C., Conitzer, V., and Tambe, M. 2010. Stackelberg vs. nash in security games: Interchangeability, equivalence, and uniqueness. In Proceedings of The 9th International Conference on Autonomous Agents and Multiagent Systems (AAMAS). 1139--1146. Google ScholarDigital Library
Index Terms
- GUARDS and PROTECT: next generation applications of security games
Recommendations
Computing optimal randomized resource allocations for massive security games
AAMAS '09: Proceedings of The 8th International Conference on Autonomous Agents and Multiagent Systems - Volume 1Predictable allocations of security resources such as police officers, canine units, or checkpoints are vulnerable to exploitation by attackers. Recent work has applied game-theoretic methods to find optimal randomized security policies, including a ...
How to protect a city: strategic security placement in graph-based domains
AAMAS '10: Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems: volume 1 - Volume 1We apply game-theoretic techniques to urban security deployment and propose new algorithms to efficiently solve real-world domains that are intractable with existing algorithms.
Improving behavior of computer game bots using fictitious play
In modern computer games, "bots" -- intelligent realistic agents play a prominent role in the popularity of a game in the market. Typically, bots are modeled using finite-state machine and then programmed via simple conditional statements which are hard-...
Comments