skip to main content
research-article

Green security games: apply game theory to addressing green security challenges

Published:06 September 2016Publication History
Skip Abstract Section

Abstract

In the past decade, game-theoretic applications have been successfully deployed in the real world to address security resource allocation challenges. Inspired by the success, researchers have begun focusing on applying game theory to green security domains such as protection of forests, fish, and wildlife, forming a stream of research on Green Security Games (GSGs). We provide an overview of recent advances in GSGs and list the challenges that remained open for future study.

References

  1. An, B., Pita, J., Shieh, E., Tambe, M., Kiekintveld, C., and Marecki, J. 2011. GUARDS and PROTECT: Next Generation Applications of Security Games. ACM SIGecom Exchanges 10, 1, 31--34. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Fang, F., Jiang, A. X., and Tambe, M. 2013. Optimal Patrol Strategy for Protecting Moving Targets with Multiple Mobile Resources. In AAMAS. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Fang, F., Nguyen, T. H., Pickles, R., Lam, W. Y., Clements, G. R., An, B., Singh, A., Tambe, M., and Lemieux, A. 2016. Deploying PAWS: Field Optimization of the Protection Assistant for Wildlife Security. In Proceedings of the Twenty-Eighth Innovative Applications of Artificial Intelligence Conference (IAAI 2016).Google ScholarGoogle Scholar
  4. Fang, F., Stone, P., and Tambe, M. 2015. When Security Games Go Green: Designing Defender Strategies to Prevent Poaching and Illegal Fishing. In International Joint Conference on Artificial Intelligence (IJCAI). Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Haghtalab, N., Fang, F., Nguyen, T. H., Sinha, A., Procaccia, A. D., and Tambe, M. 2016. Three Strategies to Success: Learning Adversary Models in Security Games. In IJCAI'16.Google ScholarGoogle Scholar
  6. Haskell, W. B., Kar, D., Fang, F., Tambe, M., Cheung, S., and Denicola, L. E. 2014. Robust protection of fisheries with COmPASS. In IAAI. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Kar, D., Fang, F., Fave, F. D., Sintov, N., and Tambe, M. 2015. "A Game of Thrones": When Human Behavior Models Compete in Repeated Stackelberg Security Games. In International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2015). Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Mc Carthy, S., Tambe, M., Kiekintveld, C., Gore, M. L., and Killion, A. 2016. Preventing Illegal Logging: Simultaneous Optimization of Resource Teams and Tactics for Security. In AAAI Computational Sustainability Track.Google ScholarGoogle Scholar
  9. Nguyen, T. H., Fave, F. M. D., Kar, D., Lakshminarayanan, A. S., Yadav, A., Tambe, M., Agmon, N., Plumptre, A. J., Driciru, M., Wanyama, F., and Rwetsiba, A. 2015. Making the most of Our Regrets: Regret-based Solutions to Handle Payoff Uncertainty and Elicitation in Green Security Games. In Conference on Decision and Game Theory for Security.Google ScholarGoogle Scholar
  10. Nguyen, T. H., Sinha, A., Gholami, S., Plumptre, A., Joppa, L., Tambe, M., Driciru, M., Wanyama, F., Rwetsiba, A., Critchlow, R., and Beale, C. 2016. CAPTURE: A new predictive anti-poaching tool for wildlife protection. In 15th International Conference on Autonomous Agents and Multiagent Systems (AAMAS). Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Nguyen, T. H., Yang, R., Azaria, A., Kraus, S., and Tambe, M. 2013. Analyzing the Effectiveness of Adversary Modeling in Security Games. In Conference on Artificial Intelligence (AAAI). Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Pita, J., Jain, M., Western, C., Portway, C., Tambe, M., Ordonez, F., Kraus, S., and Paruchuri, P. 2008. Deployed ARMOR protection: The application of a game theroetic model for security at the Los Angeles International Airport. In AAMAS. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Pita, J., John, R., Maheswaran, R., Tambe, M., and Kraus, S. 2012. A Robust Approach to Addressing Human Adversaries in Security Games. In In ECAI.Google ScholarGoogle Scholar
  14. Qian, Y., Zhang, C., Krishnamachari, B., And Tambe, M. 2016. Restless Poachers: Handling Exploration-Exploitation Tradeoffs in Security Domains. In AAMAS'16. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Sinha, A., Kar, D., and Tambe, M. 2016. Learning Adversary Behavior in Security Games: A PAC Model Perspective. In AAMAS'16. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Tambe, M. 2011. Security and Game Theory: Algorithms, Deployed Systems, Lessons Learned. Cambridge University Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Yang, R., Ford, B., Tambe, M., and Lemieux, A. 2014. Adaptive Resource Allocation for Wildlife Protection against Illegal Poachers. In AAMAS. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Yang, R., Ordonez, F., and Tambe, M. 2012. Computing Optimal Strategy against Quantal Response in Security Games. In AAMAS'12. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Green security games: apply game theory to addressing green security challenges

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader