2010
DOI: 10.1287/inte.1100.0505
|View full text |Cite
|
Sign up to set email alerts
|

Software Assistants for Randomized Patrol Planning for the LAX Airport Police and the Federal Air Marshal Service

Abstract: The increasing threat of terrorism makes security at major locations of economic or political importance a major concern. Limited security resources prevent complete security coverage, allowing adversaries to observe and exploit patterns in patrolling or monitoring, and enabling them to plan attacks that avoid existing patrols. The use of randomized security policies that are more difficult for adversaries to predict and exploit can counter their surveillance capabilities. We describe two applications, ARMOR a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

2
133
0
4

Year Published

2011
2011
2021
2021

Publication Types

Select...
4
3
1

Relationship

5
3

Authors

Journals

citations
Cited by 166 publications
(139 citation statements)
references
References 29 publications
2
133
0
4
Order By: Relevance
“…Security games, an important class of attackerdefender Stackelberg games, are at the heart of several significant deployed decision-support applications. Such systems include ARMOR at the Los Angeles International Airport (LAX) [20], IRIS deployed by the US Federal Air Marshals Service [20], GUARDS developed for the US Transportation Security Administration [3], and PROTECT used at the Port of Boston by the US Coast Guard [3].…”
Section: Introductionmentioning
confidence: 99%
“…Security games, an important class of attackerdefender Stackelberg games, are at the heart of several significant deployed decision-support applications. Such systems include ARMOR at the Los Angeles International Airport (LAX) [20], IRIS deployed by the US Federal Air Marshals Service [20], GUARDS developed for the US Transportation Security Administration [3], and PROTECT used at the Port of Boston by the US Coast Guard [3].…”
Section: Introductionmentioning
confidence: 99%
“…The payoffs for the attacker are in the same format, U e., when a defender covers b, she receives a higher reward while the attacker receives a lower reward compared to when the defender does not cover b [5,28,56]. The model in our paper allows a non-zero-sum game, where the sum of the defender's and attacker's payoff values may be non-zero.…”
Section: Security Games With An Example Application In the Metro Domainmentioning
confidence: 99%
“…Significant research on the strong Stackelberg equilibrium versus other types of Stackelberg equilibrium has already been done in previous work and led to SSE being commonly used in security game research [3,12,19,26,27,28,30,31,44,45,49,50,66].…”
Section: Security Games With An Example Application In the Metro Domainmentioning
confidence: 99%
“…In particular, we developed: (i) Aspen and Rugged, algorithms that compute the optimal defender strategy with a very large number of pure strategies for both the defender and the attacker [3,5]; (ii) a new hierarchical framework for Bayesian games that can scale-up to large number of attacker types and is applicable to all Stackelberg solvers [4]. Moreover, these algorithms have not only been experimentally validated, but Aspen has also been deployed in the real-world [6].…”
Section: Addressing the Scalability Challengementioning
confidence: 99%