Abstract
In the past decade, game-theoretic applications have been successfully deployed in the real world to address security resource allocation challenges. Inspired by the success, researchers have begun focusing on applying game theory to green security domains such as protection of forests, fish, and wildlife, forming a stream of research on Green Security Games (GSGs). We provide an overview of recent advances in GSGs and list the challenges that remained open for future study.
- An, B., Pita, J., Shieh, E., Tambe, M., Kiekintveld, C., and Marecki, J. 2011. GUARDS and PROTECT: Next Generation Applications of Security Games. ACM SIGecom Exchanges 10, 1, 31--34. Google ScholarDigital Library
- Fang, F., Jiang, A. X., and Tambe, M. 2013. Optimal Patrol Strategy for Protecting Moving Targets with Multiple Mobile Resources. In AAMAS. Google ScholarDigital Library
- Fang, F., Nguyen, T. H., Pickles, R., Lam, W. Y., Clements, G. R., An, B., Singh, A., Tambe, M., and Lemieux, A. 2016. Deploying PAWS: Field Optimization of the Protection Assistant for Wildlife Security. In Proceedings of the Twenty-Eighth Innovative Applications of Artificial Intelligence Conference (IAAI 2016).Google Scholar
- Fang, F., Stone, P., and Tambe, M. 2015. When Security Games Go Green: Designing Defender Strategies to Prevent Poaching and Illegal Fishing. In International Joint Conference on Artificial Intelligence (IJCAI). Google ScholarDigital Library
- Haghtalab, N., Fang, F., Nguyen, T. H., Sinha, A., Procaccia, A. D., and Tambe, M. 2016. Three Strategies to Success: Learning Adversary Models in Security Games. In IJCAI'16.Google Scholar
- Haskell, W. B., Kar, D., Fang, F., Tambe, M., Cheung, S., and Denicola, L. E. 2014. Robust protection of fisheries with COmPASS. In IAAI. Google ScholarDigital Library
- Kar, D., Fang, F., Fave, F. D., Sintov, N., and Tambe, M. 2015. "A Game of Thrones": When Human Behavior Models Compete in Repeated Stackelberg Security Games. In International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2015). Google ScholarDigital Library
- Mc Carthy, S., Tambe, M., Kiekintveld, C., Gore, M. L., and Killion, A. 2016. Preventing Illegal Logging: Simultaneous Optimization of Resource Teams and Tactics for Security. In AAAI Computational Sustainability Track.Google Scholar
- Nguyen, T. H., Fave, F. M. D., Kar, D., Lakshminarayanan, A. S., Yadav, A., Tambe, M., Agmon, N., Plumptre, A. J., Driciru, M., Wanyama, F., and Rwetsiba, A. 2015. Making the most of Our Regrets: Regret-based Solutions to Handle Payoff Uncertainty and Elicitation in Green Security Games. In Conference on Decision and Game Theory for Security.Google Scholar
- Nguyen, T. H., Sinha, A., Gholami, S., Plumptre, A., Joppa, L., Tambe, M., Driciru, M., Wanyama, F., Rwetsiba, A., Critchlow, R., and Beale, C. 2016. CAPTURE: A new predictive anti-poaching tool for wildlife protection. In 15th International Conference on Autonomous Agents and Multiagent Systems (AAMAS). Google ScholarDigital Library
- Nguyen, T. H., Yang, R., Azaria, A., Kraus, S., and Tambe, M. 2013. Analyzing the Effectiveness of Adversary Modeling in Security Games. In Conference on Artificial Intelligence (AAAI). Google ScholarDigital Library
- Pita, J., Jain, M., Western, C., Portway, C., Tambe, M., Ordonez, F., Kraus, S., and Paruchuri, P. 2008. Deployed ARMOR protection: The application of a game theroetic model for security at the Los Angeles International Airport. In AAMAS. Google ScholarDigital Library
- Pita, J., John, R., Maheswaran, R., Tambe, M., and Kraus, S. 2012. A Robust Approach to Addressing Human Adversaries in Security Games. In In ECAI.Google Scholar
- Qian, Y., Zhang, C., Krishnamachari, B., And Tambe, M. 2016. Restless Poachers: Handling Exploration-Exploitation Tradeoffs in Security Domains. In AAMAS'16. Google ScholarDigital Library
- Sinha, A., Kar, D., and Tambe, M. 2016. Learning Adversary Behavior in Security Games: A PAC Model Perspective. In AAMAS'16. Google ScholarDigital Library
- Tambe, M. 2011. Security and Game Theory: Algorithms, Deployed Systems, Lessons Learned. Cambridge University Press. Google ScholarDigital Library
- Yang, R., Ford, B., Tambe, M., and Lemieux, A. 2014. Adaptive Resource Allocation for Wildlife Protection against Illegal Poachers. In AAMAS. Google ScholarDigital Library
- Yang, R., Ordonez, F., and Tambe, M. 2012. Computing Optimal Strategy against Quantal Response in Security Games. In AAMAS'12. Google ScholarDigital Library
Index Terms
- Green security games: apply game theory to addressing green security challenges
Recommendations
Real-world security games: toward addressing human decision-making uncertainty
AAMAS '11: The 10th International Conference on Autonomous Agents and Multiagent Systems - Volume 3Game theory is a useful tool for reasoning about interactions between agents and in turn aiding in the decisions of those agents. In fact, Stackelberg games are natural models for many important applications such as oligopolistic markets and security ...
Combining Graph Contraction and Strategy Generation for Green Security Games
GameSec 2016: 7th International Conference on Decision and Game Theory for Security - Volume 9996Many real-world security problems can be modeled using Stackelberg security games SSG, which model the interactions between a defender and attacker. Green security games focus on environmental crime, such as preventing poaching, illegal logging, or ...
Stackelberg vs. Nash in security games: interchangeability, equivalence, and uniqueness
AAMAS '10: Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems: volume 1 - Volume 1There has been significant recent interest in game theoretic approaches to security, with much of the recent research focused on utilizing the leader-follower Stackelberg game model; for example, these games are at the heart of major applications such ...
Comments