Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence 2018
DOI: 10.24963/ijcai.2018/775
|View full text |Cite
|
Sign up to set email alerts
|

Stackelberg Security Games: Looking Beyond a Decade of Success

Abstract: The Stackelberg Security Game (SSG) model has been immensely influential in security research since it was introduced roughly a decade ago. Furthermore, deployed SSG-based applications are one of most successful examples of game theory applications in the real world. We present a broad survey of recent technical advances in SSG and related literature, and then look to the future by highlighting the new potential applications and open research problems in SSG.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
96
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 132 publications
(97 citation statements)
references
References 16 publications
1
96
0
Order By: Relevance
“…Research on Stackelberg Security Games (SSGs) led to the development of algorithms that have greatly improved physical security systems (e.g., protecting ports, scheduling air marshals, and mitigating poachers) through the optimal allocation of limited defense resources (Pita et al, 2008; Shieh et al, 2012; Sinha, Fang, An, Kiekintveld, & Tambe, 2018; Tambe, 2011). Xu et al (2015) extended these models by incorporating elements of signaling , in which a defender (sender) strategically reveals information about their strategy to the attacker (receiver) to influence the attacker's decision‐making (Battigalli, 2006; Cho & Kreps, 1987).…”
Section: Deceptive Signaling For Cybersecuritymentioning
confidence: 99%
“…Research on Stackelberg Security Games (SSGs) led to the development of algorithms that have greatly improved physical security systems (e.g., protecting ports, scheduling air marshals, and mitigating poachers) through the optimal allocation of limited defense resources (Pita et al, 2008; Shieh et al, 2012; Sinha, Fang, An, Kiekintveld, & Tambe, 2018; Tambe, 2011). Xu et al (2015) extended these models by incorporating elements of signaling , in which a defender (sender) strategically reveals information about their strategy to the attacker (receiver) to influence the attacker's decision‐making (Battigalli, 2006; Cho & Kreps, 1987).…”
Section: Deceptive Signaling For Cybersecuritymentioning
confidence: 99%
“…Then (2d) states that a set of arcs known to the interdictor at round t is updated according to assumption A5. From the game theoretic perspective, the evader's problem (2) can be viewed as a finitely repeated Stackelberg game with incomplete information; see, e.g., [34] and the references therein. Definition 1.…”
Section: The Evader Traverses Along Pathmentioning
confidence: 99%
“…Bayesian Stackelberg games 27 then generalise this model by introducing a probability distributions over the set of types for each player, while payoffs are again defined for all the possible combinations of player types over the set of pure strategy profiles. Security games [3][4][5] are a special type of Bayesian Stackelberg game with only one type of leader (defender) but still many possible types of the follower (attacker). Moreover, it assumes that for each pure strategy profile, either the defender or the attacker wins and the other loses.…”
Section: Security Gamesmentioning
confidence: 99%
“…Since today the public security issue is so crucial, 1,2 it is very significant to decide how to allocate limited security resources for the success of security operations globally. [3][4][5][6] Most existing studies address this issue using a special type of (Bayesian) Stackelberg game, known as a security game with two players (a defender and an attacker). In a security game, the defender selects a strategy that can maximise their payoff.…”
Section: Introductionmentioning
confidence: 99%