2012
DOI: 10.1007/978-1-4614-5278-2_3
|View full text |Cite
|
Sign up to set email alerts
|

Deployed Security Games for Patrol Planning

Abstract: Nations and organizations need to secure locations of economic, military, or political importance from groups or individuals that can cause harm. The fact that there are limited security resources prevents complete security coverage, which allows adversaries to observe and exploit patterns in patrolling or monitoring, and enables them to plan attacks that avoid existing patrols. The use of randomized security policies that are more difficult for adversaries to predict and exploit can counter their surveillance… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 36 publications
0
4
0
Order By: Relevance
“…One example is police officers strolling in the streets of a neighborhood. Security examples include airport scanners, additional patrol boats, or improving firearms for security guards (Ordónez et al 2013). This is in keeping with the conclusions of the 9/11 report (Roth, Greenburg, and Wille 2004) in which the adversary observes government effort by observing the extent that targets are protected.…”
Section: A Model Of Defender‐adversary Gamementioning
confidence: 99%
See 1 more Smart Citation
“…One example is police officers strolling in the streets of a neighborhood. Security examples include airport scanners, additional patrol boats, or improving firearms for security guards (Ordónez et al 2013). This is in keeping with the conclusions of the 9/11 report (Roth, Greenburg, and Wille 2004) in which the adversary observes government effort by observing the extent that targets are protected.…”
Section: A Model Of Defender‐adversary Gamementioning
confidence: 99%
“…Other forms of informational imperfections can exist where secrecy is a key strategic asset to each party. For example, in the case of government effort, the U.S. Coast Guard randomizes its surveillance and counter‐insurgency efforts, suggesting mixed strategy games as the appropriate modeling framework (Ordónez et al 2013). We do not focus on mixed strategy or asymmetric information games as their relevance is tactical , such as in the Coast Guard example, whereas our focus is on the broader policy issues measured by the budgetary priorities of the U.S. government that are measurable and readily observed.…”
Section: A Model Of Defender‐adversary Gamementioning
confidence: 99%
“…On one hand, secrecy may be a key strategic asset of a defending government, suggesting that, not only the adversary, but also even the defending government may withhold key defensive information. For example, in the case of government effort, the US Coast guard randomizes its surveillance and counter-insurgency efforts (Ordónez et al , 2013), in a mixed strategy incomplete information game to keep the opponent uncertain. On the other hand, by showing and revealing its robust defensive expenditures and effort level, a defending government may be able to deter potential adversary plots.…”
Section: Modelmentioning
confidence: 99%
“…We justify this by noting that many of the strategic decisions of the government are visible to the adversary and common knowledge. Examples include airport scanners, additional patrol boats, or improving firearms for security guards (Ordónez et al , 2013). Government efforts reduce the probability of a successful attack ( P s ) in equation (2), both directly through the effect of g on P s , and indirectly through the effect of g on adversary optimal effort ( a *) in equation (5), and in turn a * on P s .…”
Section: Modelmentioning
confidence: 99%