Handbook of Dynamic Game Theory 2018
DOI: 10.1007/978-3-319-44374-4_27
|View full text |Cite
|
Sign up to set email alerts
|

Trends and Applications in Stackelberg Security Games

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 31 publications
0
8
0
Order By: Relevance
“…Some suggested that understanding how individuals perceive risk is vital to understanding the behaviour of attackers (Ridinger et al 2016). Not long ago, for instance, it has been pointed out that in the cyber-security domain the interaction between the defender and the adversary is quite complicated with a high degree of incomplete information and uncertainty (Kar et al 2017).…”
Section: Discussion and Concluding Remarksmentioning
confidence: 99%
See 1 more Smart Citation
“…Some suggested that understanding how individuals perceive risk is vital to understanding the behaviour of attackers (Ridinger et al 2016). Not long ago, for instance, it has been pointed out that in the cyber-security domain the interaction between the defender and the adversary is quite complicated with a high degree of incomplete information and uncertainty (Kar et al 2017).…”
Section: Discussion and Concluding Remarksmentioning
confidence: 99%
“…We prepared this paper with the main aim to provide a survey of selected cases of real-world deployed applications of the game-theoretic Stackelberg model and, also, to discuss some further potential applications based on it in a specifi c public domain, security. Another motivation to prepare the paper was the fact that the Stackelberg model has been applied es-pecially in Western democracies (and especially in the USA - Kar et al 2017), and such cases may be inspiring for creators of public policies in the security areas in the Central and Eastern European (CEE) region. Th e paper is divided into a theoretical and an applied part.…”
Section: Introductionmentioning
confidence: 99%
“…Security games 3‐5 are a special type of Bayesian Stackelberg game with only one type of leader (defender) but still many possible types of the follower (attacker). Moreover, it assumes that for each pure strategy profile, either the defender or the attacker wins and the other loses.…”
Section: Preliminariesmentioning
confidence: 99%
“…The problem of modelling uncertainty has become a key challenge in the realm of security. Existing approaches are primarily based on Bayesian Stackelberg games, which model probabilistic uncertainty over the attacker's motivation 3‐5 . Paruchuri et al 41 provide a mixed‐integer linear programming formulation for solving Bayesian Stackelberg games.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation