Computing the optimal strategy to commit to
EC '06 Proceedings of the 7th ACM conference on Electronic commerce
An efficient heuristic approach for security against multiple adversaries
Proceedings of the 6th international joint conference on Autonomous agents and multiagent systems
Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games
Proceedings of the 7th international joint conference on Autonomous agents and multiagent systems - Volume 2
Proceedings of the 7th international joint conference on Autonomous agents and multiagent systems: industrial track
Leader-follower strategies for robotic patrolling in environments with arbitrary topologies
Proceedings of The 8th International Conference on Autonomous Agents and Multiagent Systems - Volume 1
A graph-theoretic approach to protect static and moving targets from adversaries
Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems: volume 1 - Volume 1
Network Security: A Decision and Game-Theoretic Approach
Network Security: A Decision and Game-Theoretic Approach
GUARDS and PROTECT: next generation applications of security games
ACM SIGecom Exchanges
GUARDS: game theoretic security allocation on a national scale
The 10th International Conference on Autonomous Agents and Multiagent Systems - Volume 1
A double oracle algorithm for zero-sum security games on graphs
The 10th International Conference on Autonomous Agents and Multiagent Systems - Volume 1
The 10th International Conference on Autonomous Agents and Multiagent Systems - Volume 3
Solving Stackelberg games with uncertain observability
The 10th International Conference on Autonomous Agents and Multiagent Systems - Volume 3
Security and Game Theory: Algorithms, Deployed Systems, Lessons Learned
Security and Game Theory: Algorithms, Deployed Systems, Lessons Learned
Security games with multiple attacker resources
IJCAI'11 Proceedings of the Twenty-Second international joint conference on Artificial Intelligence - Volume Volume One
Improving resource allocation strategy against human adversaries in security games
IJCAI'11 Proceedings of the Twenty-Second international joint conference on Artificial Intelligence - Volume Volume One
PROTECT: a deployed game theoretic system to protect the ports of the United States
Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems - Volume 1
Multi-objective optimization for security games
Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems - Volume 2
Game-theoretic resource allocation for malicious packet detection in computer networks
Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems - Volume 2
Hi-index | 0.00 |
The goal of this paper is to introduce a real-world challenge problem for researchers in multiagent systems and beyond, where our collective efforts may have a significant impact on activities in the real-world. The challenge is in applying game theory for security: Our goal is not only to introduce the problem, but also to provide exemplars of initial successes of deployed systems in this challenge problem arena, some key open research challenges and pointers to getting started in this research.