2011
DOI: 10.1145/1978721.1978729
|View full text |Cite
|
Sign up to set email alerts
|

GUARDS and PROTECT

Abstract: We provide an overview of two recent applications of security games. We describe new features and challenges introduced in the new applications.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
12
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 85 publications
(12 citation statements)
references
References 8 publications
0
12
0
Order By: Relevance
“…The payoffs for a security domain, and the exact methods used by the domain experts to arrive at these values are sensitive information. Risk analysts use a detailed set of questions to arrive at the exact payoff values; some of the considerations for payoff values are outlined (Pita et al 2008; Tsai et al 2009; Jain et al 2010b; Tambe 2011).…”
Section: Security Applicationsmentioning
confidence: 99%
See 4 more Smart Citations
“…The payoffs for a security domain, and the exact methods used by the domain experts to arrive at these values are sensitive information. Risk analysts use a detailed set of questions to arrive at the exact payoff values; some of the considerations for payoff values are outlined (Pita et al 2008; Tsai et al 2009; Jain et al 2010b; Tambe 2011).…”
Section: Security Applicationsmentioning
confidence: 99%
“…For example, while the Stackelberg formulation assumes that the adversary conducts careful surveillance and thus has perfect knowledge of the defender's mixed strategy, in reality, the adversary's surveillance may be limited or error prone, requiring security game algorithms to be robust to such an occurrence (Yin et al 2011). Similarly, these algorithms must handle the significant uncertainty of the defender's model of the adversary's payoffs (Kiekintveld, Marecki, and Tambe 2011) and uncertainty over the capability of the attacker as well (An et al 2011b). While there are many such uncertainties, we will briefly highlight work that focuses on the adversary's bounded rationality, which introduces uncertainty in the adversary's decision procedure.…”
Section: Security Applicationsmentioning
confidence: 99%
See 3 more Smart Citations