Game theory and human behavior: challenges in security and sustainability
ADT'11 Proceedings of the Second international conference on Algorithmic decision theory
PROTECT: a deployed game theoretic system to protect the ports of the United States
Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems - Volume 1
Designing better strategies against human adversaries in network security games
Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems - Volume 3
Game theory for security: an important challenge for multiagent systems
EUMAS'11 Proceedings of the 9th European conference on Multi-Agent Systems
Game-theoretic randomization for security patrolling with dynamic execution uncertainty
Proceedings of the 2013 international conference on Autonomous agents and multi-agent systems
Security games with surveillance cost and optimal timing of attack execution
Proceedings of the 2013 international conference on Autonomous agents and multi-agent systems
Security games with interval uncertainty
Proceedings of the 2013 international conference on Autonomous agents and multi-agent systems
Double-oracle algorithm for computing an exact nash equilibrium in zero-sum extensive-form games
Proceedings of the 2013 international conference on Autonomous agents and multi-agent systems
Optimal patrol strategy for protecting moving targets with multiple mobile resources
Proceedings of the 2013 international conference on Autonomous agents and multi-agent systems
Game-theoretic patrol strategies for transit systems: the TRUSTS system and its mobile app
Proceedings of the 2013 international conference on Autonomous agents and multi-agent systems
Solving extensive-form games with double-oracle methods
Proceedings of the 2013 international conference on Autonomous agents and multi-agent systems
Planning and learning in security games
ACM SIGecom Exchanges
IJCAI'13 Proceedings of the Twenty-Third international joint conference on Artificial Intelligence
Using double-oracle method and serialized alpha-beta search for pruning in simultaneous move games
IJCAI'13 Proceedings of the Twenty-Third international joint conference on Artificial Intelligence
Defender (mis)coordination in security games
IJCAI'13 Proceedings of the Twenty-Third international joint conference on Artificial Intelligence
An ambiguity aversion framework of security games under ambiguities
IJCAI'13 Proceedings of the Twenty-Third international joint conference on Artificial Intelligence
Efficiently solving joint activity based security games
IJCAI'13 Proceedings of the Twenty-Third international joint conference on Artificial Intelligence
Scaling-up security games with boundedly rational adversaries: a cutting-plane approach
IJCAI'13 Proceedings of the Twenty-Third international joint conference on Artificial Intelligence
Protecting moving targets with multiple mobile resources
Journal of Artificial Intelligence Research
Hi-index | 0.00 |
Global threats of terrorism, drug-smuggling, and other crimes have led to a significant increase in research on game theory for security. Game theory provides a sound mathematical approach to deploy limited security resources to maximize their effectiveness. A typical approach is to randomize security schedules to avoid predictability, with the randomization using artificial intelligence techniques to take into account the importance of different targets and potential adversary reactions. This book distills the forefront of this research to provide the first and only study of long-term deployed applications of game theory for security for key organizations such as the Los Angeles International Airport police and the U.S. Federal Air Marshals Service. The author and his research group draw from their extensive experience working with security officials to intelligently allocate limited security resources to protect targets, outlining the applications of these algorithms in research and the real world. The book also includes professional perspectives from security experts Erroll G. Southers; Lieutenant Commander Joe DiRenzo III, U.S. Coast Guard; Lieutenant Commander Ben Maule, U.S. Coast Guard; Erik Jensen, U.S. Coast Guard; and Lieutenant Fred S. Bertsch IV, U.S. Coast Guard.