skip to main content
Skip header Section
Security and Game Theory: Algorithms, Deployed Systems, Lessons LearnedDecember 2011
Publisher:
  • Cambridge University Press
  • 40 W. 20 St. New York, NY
  • United States
ISBN:978-1-107-09642-4
Published:12 December 2011
Pages:
328
Skip Bibliometrics Section
Bibliometrics
Skip Abstract Section
Abstract

Global threats of terrorism, drug-smuggling, and other crimes have led to a significant increase in research on game theory for security. Game theory provides a sound mathematical approach to deploy limited security resources to maximize their effectiveness. A typical approach is to randomize security schedules to avoid predictability, with the randomization using artificial intelligence techniques to take into account the importance of different targets and potential adversary reactions. This book distills the forefront of this research to provide the first and only study of long-term deployed applications of game theory for security for key organizations such as the Los Angeles International Airport police and the U.S. Federal Air Marshals Service. The author and his research group draw from their extensive experience working with security officials to intelligently allocate limited security resources to protect targets, outlining the applications of these algorithms in research and the real world. The book also includes professional perspectives from security experts Erroll G. Southers; Lieutenant Commander Joe DiRenzo III, U.S. Coast Guard; Lieutenant Commander Ben Maule, U.S. Coast Guard; Erik Jensen, U.S. Coast Guard; and Lieutenant Fred S. Bertsch IV, U.S. Coast Guard.

Cited By

  1. ACM
    Li N, Zhang M, Li J, Adepu S, Kang E and Jin Z (2024). A Game-Theoretical Self-Adaptation Framework for Securing Software-Intensive Systems, ACM Transactions on Autonomous and Adaptive Systems, 19:2, (1-49), Online publication date: 30-Jun-2024.
  2. Li P, Li S, Wang X, Cerný J, Zhang Y, McAleer S, Chan H and An B Grasper: A Generalist Pursuer for Pursuit-Evasion Problems Proceedings of the 23rd International Conference on Autonomous Agents and Multiagent Systems, (1147-1155)
  3. Guo L, Ye J and Zhang J (2024). Sensitivity Analysis of the Maximal Value Function with Applications in Nonconvex Minimax Programs, Mathematics of Operations Research, 49:1, (536-556), Online publication date: 1-Feb-2024.
  4. Rashid A and Such J (2023). StratDef, Computers and Security, 134:C, Online publication date: 1-Nov-2023.
  5. Sun X, Masur J, Abramowitz B, Mattei N and Zheng Z Pandering in a (flexible) representative democracy Proceedings of the Thirty-Ninth Conference on Uncertainty in Artificial Intelligence, (2058-2068)
  6. Zhao G, Zhu B and Jiao J Online learning in stackelberg games with an omniscient follower Proceedings of the 40th International Conference on Machine Learning, (42304-42316)
  7. Pham C, Griggs W and Saunderson J A scalable Frank-Wolfe-based algorithm for the max-cut SDP Proceedings of the 40th International Conference on Machine Learning, (27822-27839)
  8. Sauer P, Steinmetz M, Künnemann R and Hoffmann J Lifted stackelberg planning Proceedings of the Thirty-Third International Conference on Automated Planning and Scheduling, (370-374)
  9. Cates B, Kulkarni A and Sreedharan S Planning for attacker entrapment in adversarial settings Proceedings of the Thirty-Third International Conference on Automated Planning and Scheduling, (86-94)
  10. Wang S, Sun J, Zhang J, Dong Q, Gu X and Chen C (2023). Attack-Defense game analysis of critical infrastructure network based on Cournot model with fixed operating nodes, International Journal of Critical Infrastructure Protection, 40:C, Online publication date: 1-Mar-2023.
  11. Nguyen T and Sinha A Behavioral learning in security games Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence and Thirty-Fifth Conference on Innovative Applications of Artificial Intelligence and Thirteenth Symposium on Educational Advances in Artificial Intelligence, (9302-9309)
  12. Mai T and Sinha A Securing lifelines Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence and Thirty-Fifth Conference on Innovative Applications of Artificial Intelligence and Thirteenth Symposium on Educational Advances in Artificial Intelligence, (5805-5813)
  13. Gan J, Elkind E, Kraus S and Wooldridge M (2022). Defense coordination in security games, Artificial Intelligence, 313:C, Online publication date: 1-Dec-2022.
  14. Foster D, Rakhlin A, Sekhari A and Sridharan K On the complexity of adversarial decision making Proceedings of the 36th International Conference on Neural Information Processing Systems, (35404-35417)
  15. Maccarone L and Cole D (2022). Bayesian games for the cybersecurity of nuclear power plants, International Journal of Critical Infrastructure Protection, 37:C, Online publication date: 1-Jul-2022.
  16. Ansari Q and Sharma P (2022). Some Properties of Generalized Oriented Distance Function and their Applications to Set Optimization Problems, Journal of Optimization Theory and Applications, 193:1-3, (247-279), Online publication date: 1-Jun-2022.
  17. Sikdar S, Ruan S, Han Q, Pitimanaaree P, Blackthorne J, Yener B and Xia L Anti-Malware Sandbox Games Proceedings of the 21st International Conference on Autonomous Agents and Multiagent Systems, (1201-1209)
  18. Clempner J (2022). Reveling misleading information for defenders and attackers in repeated Stackelberg Security Games, Engineering Applications of Artificial Intelligence, 110:C, Online publication date: 1-Apr-2022.
  19. Birmpas G, Gan J, Hollender A, Marmolejo-Cossío F, Rajgopal N and Voudouris A (2021). Optimally Deceiving a Learning Leader in Stackelberg Games, Journal of Artificial Intelligence Research, 72, (507-531), Online publication date: 4-Jan-2022.
  20. Zhang M System component-level self-adaptations for security via bayesian games Proceedings of the 43rd International Conference on Software Engineering: Companion Proceedings, (102-104)
  21. Venugopal A, Bondi E, Kamarthi H, Dholakia K, Ravindran B and Tambe M Reinforcement Learning for Unified Allocation and Patrolling in Signaling Games with Uncertainty Proceedings of the 20th International Conference on Autonomous Agents and MultiAgent Systems, (1353-1361)
  22. Dhara A, Das B and Natarajan K (2021). Worst-Case Expected Shortfall with Univariate and Bivariate Marginals, INFORMS Journal on Computing, 33:1, (370-389), Online publication date: 1-Jan-2021.
  23. Birmpas G, Gan J, Hollender A, Marmolejo-Cossío F, Rajgopal N and Voudouris A Optimally deceiving a learning leader in stackelberg games Proceedings of the 34th International Conference on Neural Information Processing Systems, (20624-20635)
  24. Ma X, An B, Zhao M, Luo X, Xue L, Li Z, Miu T and Guan X (2020). Randomized Security Patrolling for Link Flooding Attack Detection, IEEE Transactions on Dependable and Secure Computing, 17:4, (795-812), Online publication date: 1-Jul-2020.
  25. ACM
    Roth A, Slivkins A, Ullman J and Wu Z (2020). Multidimensional Dynamic Pricing for Welfare Maximization, ACM Transactions on Economics and Computation, 8:1, (1-35), Online publication date: 29-Feb-2020.
  26. ACM
    Waniek M, Michalak T and Alshamsi A (2019). Strategic Attack & Defense in Security Diffusion Games, ACM Transactions on Intelligent Systems and Technology, 11:1, (1-35), Online publication date: 29-Feb-2020.
  27. Gan J, Guo Q, Tran-Thanh L, An B and Wooldridge M Manipulating a learning defender and ways to counteract Proceedings of the 33rd International Conference on Neural Information Processing Systems, (8274-8283)
  28. Castiglioni M, Marchesi A, Gatti N and Coniglio S (2019). Leadership in singleton congestion games, Artificial Intelligence, 277:C, Online publication date: 1-Dec-2019.
  29. Rosenfeld A and Maksimov O (2019). Optimal cruiser-drone traffic enforcement under energy limitation, Artificial Intelligence, 277:C, Online publication date: 1-Dec-2019.
  30. Durkota K, Lisý V, Bošanský B, Kiekintveld C and Pěchouček M (2022). Hardening networks against strategic attackers using attack graph games, Computers and Security, 87:C, Online publication date: 1-Nov-2019.
  31. Blum A, Haghtalab N, Hajiaghayi M and Seddighin S Computing Stackelberg Equilibria of Large General-Sum Games Algorithmic Game Theory, (168-182)
  32. Vamvoudakis K and Kanellopoulos A Non-Equilibrium Learning and Cyber-Physical Security 2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (1-6)
  33. Cooney S, Wang K, Bondi E, Nguyen T, Vayanos P, Winetrobe H, Cranford E, Gonzalez C, Lebiere C and Tambe M Learning to Signal in the Goldilocks Zone: Improving Adversary Compliance in Security Games Machine Learning and Knowledge Discovery in Databases, (725-740)
  34. ACM
    Outkin A, Eames B, Galiardi M, Walsh S, Vugrin E, Heersink B, Hobbs J and Wyss G (2019). GPLADD, ACM Transactions on Privacy and Security, 22:3, (1-27), Online publication date: 31-Aug-2019.
  35. Nguyen T and Xu H Imitative attacker deception in stackelberg security games Proceedings of the 28th International Joint Conference on Artificial Intelligence, (528-534)
  36. Marchesi A, Castiglioni M and Gatti N Leadership in congestion games Proceedings of the 28th International Joint Conference on Artificial Intelligence, (485-491)
  37. Elkind E, Gan J, Obraztsova S, Rabinovich Z and Voudouris A Protecting elections by recounting ballots Proceedings of the 28th International Joint Conference on Artificial Intelligence, (259-265)
  38. Castiglioni M, Marchesi A and Gatti N Be a leader or become a follower Proceedings of the 28th International Joint Conference on Artificial Intelligence, (123-129)
  39. Szeszlér D (2019). Hitting a path, Journal of Combinatorial Optimization, 38:1, (72-85), Online publication date: 1-Jul-2019.
  40. Ghafouri A, Laszka A, Abbas W, Vorobeychik Y and Koutsoukos X (2019). A game-theoretic approach for selecting optimal time-dependent thresholds for anomaly detection, Autonomous Agents and Multi-Agent Systems, 33:4, (430-456), Online publication date: 1-Jul-2019.
  41. ACM
    Gan J, Xu H, Guo Q, Tran-Thanh L, Rabinovich Z and Wooldridge M Imitative Follower Deception in Stackelberg Games Proceedings of the 2019 ACM Conference on Economics and Computation, (639-657)
  42. Bondi E Bridging the Gap Between High-Level Reasoning in Strategic Agent Coordination and Low-Level Agent Development Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, (2402-2404)
  43. Pacchiano A and Bachrach Y Computing Stable Solutions in Threshold Network Flow Games With Bounded Treewidth Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, (2153-2155)
  44. Ismaili A, Hazon N, Watanabe E, Yokoo M and Kraus S Complexity and Approximations in Robust Coalition Formation via Max-Min k-Partitioning Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, (2036-2038)
  45. Cooney S, Vayanos P, Nguyen T, Gonzalez C, Lebiere C, Cranford E and Tambe M Warning Time Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, (1892-1894)
  46. Bondi E, Oh H, Xu H, Fang F, Dilkina B and Tambe M Broken Signals in Security Games Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, (1838-1840)
  47. Gholami S, Yadav A, Tran-Thanh L, Dilkina B and Tambe M Don't Put All Your Strategies in One Basket Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, (395-403)
  48. ACM
    Speicher P, Steinmetz M, Hoffmann J, Backes M and Künnemann R Towards automated network mitigation analysis Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, (1971-1978)
  49. Wang B, Zhang Y, Zhou Z and Zhong S (2019). On repeated stackelberg security game with the cooperative human behavior model for wildlife protection, Applied Intelligence, 49:3, (1002-1015), Online publication date: 1-Mar-2019.
  50. Kawase Y and Sumita H Randomized strategies for robust combinatorial optimization Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence and Thirty-First Innovative Applications of Artificial Intelligence Conference and Ninth AAAI Symposium on Educational Advances in Artificial Intelligence, (7876-7883)
  51. Peng B, Shen W, Tang P and Zuo S Learning optimal strategies to commit to Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence and Thirty-First Innovative Applications of Artificial Intelligence Conference and Ninth AAAI Symposium on Educational Advances in Artificial Intelligence, (2149-2156)
  52. Marchesi A, Farina G, Kroer C, Gatti N and Sandholm T Quasi-perfect stackelberg equilibrium Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence and Thirty-First Innovative Applications of Artificial Intelligence Conference and Ninth AAAI Symposium on Educational Advances in Artificial Intelligence, (2117-2124)
  53. Igarashi A, Sliwinski J and Zick Y Forming probably stable communities with limited interactions Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence and Thirty-First Innovative Applications of Artificial Intelligence Conference and Ninth AAAI Symposium on Educational Advances in Artificial Intelligence, (2053-2060)
  54. Guo Q, Gan J, Fang F, Tran-Thanh L, Tambe M and An B On the inducibility of stackelberg equilibrium for security games Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence and Thirty-First Innovative Applications of Artificial Intelligence Conference and Ninth AAAI Symposium on Educational Advances in Artificial Intelligence, (2020-2028)
  55. Ma W, McAreavey K, Liu W and Luo X (2018). Acceptable costs of minimax regret equilibrium, Expert Systems with Applications: An International Journal, 108:C, (206-222), Online publication date: 15-Oct-2018.
  56. Vu D, Loiseau P and Silva A Efficient computation of approximate equilibria in discrete colonel blotto games Proceedings of the 27th International Joint Conference on Artificial Intelligence, (519-526)
  57. Mc Carthy S, Laan C, Wang K, Vayanos P, Sinha A and Tambe M The price of usability Proceedings of the 27th International Joint Conference on Artificial Intelligence, (454-460)
  58. Marchesi A, Coniglio S and Gatti N Leadership in singleton congestion games Proceedings of the 27th International Joint Conference on Artificial Intelligence, (447-453)
  59. Farina G, Marchesi A, Kroer C, Gatti N and Sandholm T Trembling-hand perfection in extensive-form games with commitment Proceedings of the 27th International Joint Conference on Artificial Intelligence, (233-239)
  60. Chan H and Jiang A An FPTAS for computing nash equilibrium in resource graph games Proceedings of the 27th International Joint Conference on Artificial Intelligence, (152-158)
  61. Rosenfeld A, Maksimov O and Kraus S Optimal cruiser-drone traffic enforcement under energy limitation Proceedings of the 27th International Joint Conference on Artificial Intelligence, (3848-3855)
  62. Hajaj C and Vorobeychik Y Adversarial task assignment Proceedings of the 27th International Joint Conference on Artificial Intelligence, (3783-3789)
  63. Xu H, Dughmi S, Tambe M and Noronha V Mitigating the Curse of Correlation in Security Games by Entropy Maximization Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, (2127-2129)
  64. Vu D, Loiseau P and Silva A A Simple and Efficient Algorithm to Compute Epsilon-Equilibria of Discrete Colonel Blotto Games Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, (2115-2117)
  65. Guo Q, Gan J, Fang F, Tran-Thanh L, Tambe M and An B Inducible Equilibrium for Security Games Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, (1947-1949)
  66. Schlenker A, Thakoor O, Xu H, Fang F, Tambe M, Tran-Thanh L, Vayanos P and Vorobeychik Y Deceiving Cyber Adversaries Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, (892-900)
  67. Gan J, Elkind E and Wooldridge M Stackelberg Security Games with Multiple Uncoordinated Defenders Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, (703-711)
  68. Aziz H, Gaspers S, Lee E and Najeebullah K Defender Stackelberg Game with Inverse Geodesic Length as Utility Metric Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, (694-702)
  69. ACM
    Hemberg E, Zipkin J, Skowyra R, Wagner N and O'Reilly U Adversarial co-evolution of attack and defense in a segmented computer network environment Proceedings of the Genetic and Evolutionary Computation Conference Companion, (1648-1655)
  70. ACM
    Behnezhad S, Derakhshan M, Hajiaghayi M and Seddighin S Spatio-Temporal Games Beyond One Dimension Proceedings of the 2018 ACM Conference on Economics and Computation, (411-428)
  71. ACM
    Dong J, Roth A, Schutzman Z, Waggoner B and Wu Z Strategic Classification from Revealed Preferences Proceedings of the 2018 ACM Conference on Economics and Computation, (55-70)
  72. Guerrero D, Carsteanu A and Clempner J (2018). Solving Stackelberg security Markov games employing the bargaining Nash approach, Computers and Security, 74:C, (240-257), Online publication date: 1-May-2018.
  73. Speicher P, Steinmetz M, Backes M, Hoffmann J and Künnemann R Stackelberg planning Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence and Thirtieth Innovative Applications of Artificial Intelligence Conference and Eighth AAAI Symposium on Educational Advances in Artificial Intelligence, (6286-6293)
  74. Xu H, Wang K, Vayanos P and Tambe M Strategic coordination of human patrollers and mobile sensors with signaling for security games Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence and Thirtieth Innovative Applications of Artificial Intelligence Conference and Eighth AAAI Symposium on Educational Advances in Artificial Intelligence, (1290-1297)
  75. Deng Y and Conitzer V Disarmament games with resources Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence and Thirtieth Innovative Applications of Artificial Intelligence Conference and Eighth AAAI Symposium on Educational Advances in Artificial Intelligence, (981-988)
  76. Celli A and Gatti N Computational results for extensive-form adversarial team games Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence and Thirtieth Innovative Applications of Artificial Intelligence Conference and Eighth AAAI Symposium on Educational Advances in Artificial Intelligence, (965-972)
  77. Wang X, An B, Strobel M and Kong F Catching captain jack Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence and Thirtieth Innovative Applications of Artificial Intelligence Conference and Eighth AAAI Symposium on Educational Advances in Artificial Intelligence, (208-215)
  78. Kempe D, Schulman L and Tamuz O Quasi-regular sequences and optimal schedules for security games Proceedings of the Twenty-Ninth Annual ACM-SIAM Symposium on Discrete Algorithms, (1625-1644)
  79. ACM
    Bošanský B, Brânzei S, Hansen K, Lund T and Miltersen P (2017). Computation of Stackelberg Equilibria of Finite Sequential Games, ACM Transactions on Economics and Computation, 5:4, (1-24), Online publication date: 22-Dec-2017.
  80. Chuong T and Jeyakumar V (2017). Convergent hierarchy of SDP relaxations for a class of semi-infinite convex polynomial programs and applications, Applied Mathematics and Computation, 315:C, (381-399), Online publication date: 15-Dec-2017.
  81. Dritsoula L, Loiseau P and Musacchio J (2017). A Game-Theoretic Analysis of Adversarial Classification, IEEE Transactions on Information Forensics and Security, 12:12, (3094-3109), Online publication date: 1-Dec-2017.
  82. ACM
    Bowling M, Burch N, Johanson M and Tammelin O (2017). Heads-up limit hold'em poker is solved, Communications of the ACM, 60:11, (81-88), Online publication date: 24-Oct-2017.
  83. ACM
    Wang S and Shroff N (2017). Security Game with Non-additive Utilities and Multiple Attacker Resources, ACM SIGMETRICS Performance Evaluation Review, 45:1, (10-10), Online publication date: 18-Sep-2017.
  84. Zhang Y, An B, Tran-Thanh L, Wang Z, Gan J and Jennings N Optimal escape interdiction on transportation networks Proceedings of the 26th International Joint Conference on Artificial Intelligence, (3936-3944)
  85. Rosenfeld A and Kraus S When security games hit traffic Proceedings of the 26th International Joint Conference on Artificial Intelligence, (3814-3822)
  86. Parkes D, Tylkin P and Xia L Thwarting vote buying through decoy ballots Proceedings of the 26th International Joint Conference on Artificial Intelligence, (3784-3790)
  87. McCarthy S, Vayanos P and Tambe M Staying ahead of the game Proceedings of the 26th International Joint Conference on Artificial Intelligence, (3770-3776)
  88. An B Game theoretic analysis of security and sustainability Proceedings of the 26th International Joint Conference on Artificial Intelligence, (5111-5115)
  89. Schlenker A, Xu H, Guirguis M, Kiekintveld C, Sinha A, Tambe M, Sonya S, Balderas D and Dunstatter N Don't bury your head inwarnings Proceedings of the 26th International Joint Conference on Artificial Intelligence, (381-387)
  90. Clempner J and Poznyak A (2017). Using the extraproximal method for computing the shortest-path mixed Lyapunov equilibrium in Stackelberg security games, Mathematics and Computers in Simulation, 138:C, (14-30), Online publication date: 1-Aug-2017.
  91. Budkuley A, Dey B and Prabhakaran V Coding for arbitrarily varying remote sources 2017 IEEE International Symposium on Information Theory (ISIT), (729-733)
  92. ACM
    Behnezhad S, Derakhshan M, Hajiaghayi M and Slivkins A A Polynomial Time Algorithm for Spatio-Temporal Security Games Proceedings of the 2017 ACM Conference on Economics and Computation, (697-714)
  93. ACM
    Wang S and Shroff N (2017). Security Game with Non-additive Utilities and Multiple Attacker Resources, Proceedings of the ACM on Measurement and Analysis of Computing Systems, 1:1, (1-32), Online publication date: 13-Jun-2017.
  94. ACM
    Wang S and Shroff N Security Game with Non-additive Utilities and Multiple Attacker Resources Proceedings of the 2017 ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, (10-10)
  95. Parkes D, Tylkin P and Xia L Thwarting Vote Buying Through Decoy Ballots Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, (1679-1681)
  96. Gan J and An B (2017). Game-Theoretic Considerations for Optimizing Taxi System Efficiency, IEEE Intelligent Systems, 32:3, (46-52), Online publication date: 1-May-2017.
  97. ACM
    Nikolaidis S, Nath S, Procaccia A and Srinivasa S Game-Theoretic Modeling of Human Adaptation in Human-Robot Collaboration Proceedings of the 2017 ACM/IEEE International Conference on Human-Robot Interaction, (323-331)
  98. Panaousis E, Karapistoli E, Elsemary H, Alpcan T, Khuzani M and Economides A (2017). Game theoretic path selection to support security in device-to-device communications, Ad Hoc Networks, 56:C, (28-42), Online publication date: 1-Mar-2017.
  99. Jiang A, Chan H and Leyton-Brown K Resource graph games Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, (572-578)
  100. Gan J, An B, Vorobeychik Y and Gauch B Security games on a plane Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, (530-536)
  101. Deng Y and Conitzer V Disarmament games Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, (473-479)
  102. Szeszlér D (2017). Security games on matroids, Mathematical Programming: Series A and B, 161:1-2, (347-364), Online publication date: 1-Jan-2017.
  103. Chan H, Jiang A, Leyton-Brown K and Mehta R Multilinear Games Proceedings of the 12th International Conference on Web and Internet Economics - Volume 10123, (44-58)
  104. Hartford J, Wright J and Leyton-Brown K Deep learning for predicting human strategic behavior Proceedings of the 30th International Conference on Neural Information Processing Systems, (2432-2440)
  105. Hota A, Clements A, Sundaram S and Bagchi S Optimal and Game-Theoretic Deployment of Security Investments in Interdependent Assets 7th International Conference on Decision and Game Theory for Security - Volume 9996, (101-113)
  106. Anderson G, Mccusker G and Pym D A Logic for the Compliance Budget 7th International Conference on Decision and Game Theory for Security - Volume 9996, (370-381)
  107. Gholami S, Wilder B, Brown M, Thomas D, Sintov N and Tambe M Divide to Defend 7th International Conference on Decision and Game Theory for Security - Volume 9996, (272-293)
  108. Kujawski E (2016). A Probabilistic Game-Theoretic Method to Assess Deterrence and Defense Benefits of Security Systems, Systems Engineering, 19:6, (549-566), Online publication date: 1-Nov-2016.
  109. Clempner J and Poznyak A (2016). Conforming coalitions in Markov Stackelberg security games, Applied Soft Computing, 47:C, (1-11), Online publication date: 1-Oct-2016.
  110. ACM
    Fang F and Nguyen T (2016). Green security games, ACM SIGecom Exchanges, 15:1, (78-83), Online publication date: 6-Sep-2016.
  111. Gholami S, Wilder B, Brown M, Thomas D, Sintov N and Tambe M Toward addressing collusion among human adversaries in security games Proceedings of the Twenty-second European Conference on Artificial Intelligence, (1750-1751)
  112. ACM
    Wadhawan Y and Neuman C Defending Cyber-Physical Attacks on Oil Pipeline Systems Proceedings of the 1st International Workshop on AI for Privacy and Security, (1-8)
  113. ACM
    Xu H The Mysteries of Security Games Proceedings of the 2016 ACM Conference on Economics and Computation, (497-514)
  114. ACM
    Tang P, Wang Z and Zhang X Optimal Commitments in Asymmetric Auctions with Incomplete Information Proceedings of the 2016 ACM Conference on Economics and Computation, (197-211)
  115. Guo Q, An B, Zick Y and Miao C Optimal interdiction of illegal network flow Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, (2507-2513)
  116. Yin Y, Vorobeychik Y, An B and Hazon N Optimally protecting elections Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, (538-545)
  117. Yin Y and An B Efficient resource allocation for protecting coral reef ecosystems Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, (531-537)
  118. Haghtalab N, Fang F, Nguyen T, Sinha A, Procaccia A and Tambe M Three strategies to success Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, (308-314)
  119. He X, Dai H and Ning P (2016). Faster Learning and Adaptation in Security Games by Exploiting Information Asymmetry, IEEE Transactions on Signal Processing, 64:13, (3429-3443), Online publication date: 1-Jul-2016.
  120. Gholami S, Wilder B, Brown M, Sinha A, Sintov N and Tambe M SPECTRE Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, (1498-1500)
  121. Kučera A and Lamser T Regular Strategies and Strategy Improvement Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, (1171-1179)
  122. Nguyen T, Sinha A, Gholami S, Plumptre A, Joppa L, Tambe M, Driciru M, Wanyama F, Rwetsiba A, Critchlow R and Beale C CAPTURE Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, (767-775)
  123. Rajtmajer S, Squicciarini A, Griffin C, Karumanchi S and Tyagi A Constrained Social-Energy Minimization for Multi-Party Sharing in Online Social Networks Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, (680-688)
  124. Sinha A, Kar D and Tambe M Learning Adversary Behavior in Security Games Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, (214-222)
  125. Zhang C, Bucarey V, Mukhopadhyay A, Sinha A, Qian Y, Vorobeychik Y and Tambe M Using Abstractions to Solve Opportunistic Crime Security Games at Scale Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, (196-204)
  126. Guo Q, An B, Vorobeychik Y, Tran-Thanh L, Gan J and Miao C Coalitional Security Games Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, (159-167)
  127. Xu H, Freeman R, Conitzer V, Dughmi S and Tambe M Signaling in Bayesian Stackelberg Games Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, (150-158)
  128. Qian Y, Zhang C, Krishnamachari B and Tambe M Restless Poachers Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, (123-131)
  129. Xu H, Tran-Thanh L and Jennings N Playing Repeated Security Games with No Prior Knowledge Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, (104-112)
  130. Mastrogiacomo E and Rosazza Gianin E (2015). Portfolio Optimization with Quasiconvex Risk Measures, Mathematics of Operations Research, 40:4, (1042-1059), Online publication date: 1-Oct-2015.
  131. Yin Y, Xu H, Gain J, An B and Jiang A Computing optimal mixed strategies for security games with dynamic payoffs Proceedings of the 24th International Conference on Artificial Intelligence, (681-687)
  132. Xu H, Jiang A, Sinha A, Rabinovich Z, Dughmi S and Tambe M Security games with information leakage Proceedings of the 24th International Conference on Artificial Intelligence, (674-680)
  133. Tammelin O, Burch N, Johanson M and Bowling M Solving heads-up limit Texas Hold'em Proceedings of the 24th International Conference on Artificial Intelligence, (645-652)
  134. Durkota K, Lisy V, Bošansky B and Kiekintveld C Optimal network security hardening using attack graph games Proceedings of the 24th International Conference on Artificial Intelligence, (526-532)
  135. Carbonara A, Datta A, Sinha A and Zick Y Incentivizing peer grading in MOOCS Proceedings of the 24th International Conference on Artificial Intelligence, (497-503)
  136. ACM
    Balcan M, Blum A, Haghtalab N and Procaccia A Commitment Without Regrets Proceedings of the Sixteenth ACM Conference on Economics and Computation, (61-78)
  137. Hata H, Todo T, Onoue S and Matsumoto K Characteristics of sustainable OSS projects Proceedings of the Eighth International Workshop on Cooperative and Human Aspects of Software Engineering, (15-21)
  138. Clempner J and Poznyak A (2015). Stackelberg security games, Expert Systems with Applications: An International Journal, 42:8, (3967-3979), Online publication date: 15-May-2015.
  139. Zhang C Modeling, Learning and Defending against Opportunistic Criminals in Urban Areas Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, (1971-1972)
  140. Durkota K, Lisy V, Kiekintveld C and Bosansky B Game-Theoretic Algorithms for Optimal Network Security Hardening Using Attack Graphs Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, (1773-1774)
  141. Ondracek J, Vanek O and Pechoucek M Solving Infrastructure Monitoring Problems with Multiple Heterogeneous Unmanned Aerial Vehicles Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, (1597-1605)
  142. Kar D, Fang F, Delle Fave F, Sintov N and Tambe M "A Game of Thrones" Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, (1381-1390)
  143. Zhang C, Sinha A and Tambe M Keeping Pace with Criminals Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, (1351-1359)
  144. Lisý V, Lanctot M and Bowling M Online Monte Carlo Counterfactual Regret Minimization for Search in Imperfect Information Games Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, (27-36)
  145. ACM
    Tambe A and Nguyen T Robust resource allocation in security games and ensemble modeling of adversary behavior Proceedings of the 30th Annual ACM Symposium on Applied Computing, (277-282)
  146. Perchet V and Quincampoix M (2015). On a Unified Framework for Approachability with Full or Partial Monitoring, Mathematics of Operations Research, 40:3, (596-610), Online publication date: 1-Mar-2015.
  147. Furuncu E and Sogukpinar I (2015). Scalable risk assessment method for cloud computing using game theory (CCRAM), Computer Standards & Interfaces, 38:C, (44-50), Online publication date: 1-Feb-2015.
  148. ACM
    Chapman M, Tyson G, McBurney P, Luck M and Parsons S Playing hide-and-seek Proceedings of the 1st International Workshop on Agents and CyberSecurity, (1-8)
  149. Yin Y, An B and Jain M Dynamic allocation of security resources for protecting public events Proceedings of the 2014 international conference on Autonomous agents and multi-agent systems, (1473-1474)
  150. Ford B, Kar D, Delle Fave F, Yang R and Tambe M PAWS Proceedings of the 2014 international conference on Autonomous agents and multi-agent systems, (1641-1642)
  151. Abaffy M, Brázdil T, Řehák V, Bošanský B, Kučera A and Krčál J Solving adversarial patrolling games with bounded error Proceedings of the 2014 international conference on Autonomous agents and multi-agent systems, (1617-1618)
  152. Zhang Y and Luo X Security games with partial surveillance Proceedings of the 2014 international conference on Autonomous agents and multi-agent systems, (1527-1528)
  153. Qian Y, Haskell W, Jiang A and Tambe M Online planning for optimal protector strategies in resource conservation games Proceedings of the 2014 international conference on Autonomous agents and multi-agent systems, (733-740)
  154. Yang R, Ford B, Tambe M and Lemieux A Adaptive resource allocation for wildlife protection against illegal poachers Proceedings of the 2014 international conference on Autonomous agents and multi-agent systems, (453-460)
  155. Nguyen T, Jiang A and Tambe M Stop the compartmentalization Proceedings of the 2014 international conference on Autonomous agents and multi-agent systems, (317-324)
  156. Datta A Privacy through Accountability Proceedings of the 10th International Conference on Distributed Computing and Internet Technology - Volume 8337, (43-49)
  157. ACM
    Brandão F, Harrow A, Lee J and Peres Y Adversarial hypothesis testing and a quantum stein's lemma for restricted measurements Proceedings of the 5th conference on Innovations in theoretical computer science, (183-194)
  158. Zhang Y, Luo X and Ma W Security Games with Ambiguous Information about Attacker Types Proceedings of the 26th Australasian Joint Conference on AI 2013: Advances in Artificial Intelligence - Volume 8272, (14-25)
  159. Kukreja N, Halfond W and Tambe M Randomizing regression tests using game theory Proceedings of the 28th IEEE/ACM International Conference on Automated Software Engineering, (616-621)
  160. ACM
    Delle Fave F, Qian Y, Jiang A, Brown M and Tambe M (2013). Planning and learning in security games, ACM SIGecom Exchanges, 12:1, (38-41), Online publication date: 1-Jun-2013.
  161. Bošanský B Solving extensive-form games with double-oracle methods Proceedings of the 2013 international conference on Autonomous agents and multi-agent systems, (1423-1424)
  162. Luber S, Yin Z, Delle Fave F, Xin Jiang A, Tambe M and Sullivan J Game-theoretic patrol strategies for transit systems Proceedings of the 2013 international conference on Autonomous agents and multi-agent systems, (1377-1378)
  163. Fang F, Jiang A and Tambe M Optimal patrol strategy for protecting moving targets with multiple mobile resources Proceedings of the 2013 international conference on Autonomous agents and multi-agent systems, (957-964)
  164. Bosansky B, Kiekintveld C, Lisy V, Cermak J and Pechoucek M Double-oracle algorithm for computing an exact nash equilibrium in zero-sum extensive-form games Proceedings of the 2013 international conference on Autonomous agents and multi-agent systems, (335-342)
  165. Kiekintveld C, Islam T and Kreinovich V Security games with interval uncertainty Proceedings of the 2013 international conference on Autonomous agents and multi-agent systems, (231-238)
  166. An B, Brown M, Vorobeychik Y and Tambe M Security games with surveillance cost and optimal timing of attack execution Proceedings of the 2013 international conference on Autonomous agents and multi-agent systems, (223-230)
  167. Jiang A, Yin Z, Zhang C, Tambe M and Kraus S Game-theoretic randomization for security patrolling with dynamic execution uncertainty Proceedings of the 2013 international conference on Autonomous agents and multi-agent systems, (207-214)
  168. ACM
    Abernethy J, Chen Y and Vaughan J (2013). Efficient Market Making via Convex Optimization, and a Connection to Online Learning, ACM Transactions on Economics and Computation, 1:2, (1-39), Online publication date: 1-May-2013.
  169. Yang R, Kiekintveld C, OrdóñEz F, Tambe M and John R (2013). Improving resource allocation strategies against human adversaries in security games, Artificial Intelligence, 195, (440-469), Online publication date: 1-Feb-2013.
  170. Hu J and Mehrotra S (2012). Robust and Stochastically Weighted Multiobjective Optimization Models and Reformulations, Operations Research, 60:4, (936-953), Online publication date: 1-Jul-2012.
  171. Yang R, Fang F, Jiang A, Rajagopal K, Tambe M and Maheswaran R Designing better strategies against human adversaries in network security games Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems - Volume 3, (1299-1300)
  172. Shieh E, An B, Yang R, Tambe M, Baldwin C, DiRenzo J, Maule B and Meyer G PROTECT Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems - Volume 1, (13-20)
  173. Xu H and Mannor S (2012). Distributionally Robust Markov Decision Processes, Mathematics of Operations Research, 37:2, (288-300), Online publication date: 1-May-2012.
  174. Yang R, Tambe M, Jain M, Kwak J, Pita J and Yin Z Game theory and human behavior Proceedings of the Second international conference on Algorithmic decision theory, (320-330)
  175. Yang R, Tambe M, Jain M, Kwak J, Pita J and Yin Z Game Theory and Human Behavior: Challenges in Security and Sustainability Algorithmic Decision Theory, (320-330)
  176. Balaj M (2011). Alternative principles and their applications, Journal of Global Optimization, 50:3, (537-547), Online publication date: 1-Jul-2011.
  177. Kim Y (2010). Feedback capacity of stationary Gaussian channels, IEEE Transactions on Information Theory, 56:1, (57-85), Online publication date: 1-Jan-2010.
  178. ACM
    Chen Y, Gupta M and Recht B Learning kernels from indefinite similarities Proceedings of the 26th Annual International Conference on Machine Learning, (145-152)
  179. Boucheron S, Garivier A and Gassiat E (2009). Coding on countably infinite alphabets, IEEE Transactions on Information Theory, 55:1, (358-373), Online publication date: 1-Jan-2009.
  180. Philippe F, Debs G and Jaffray J (1999). Decision Making with Monotone Lower Probabilities of Infinite Order, Mathematics of Operations Research, 24:3, (767-784), Online publication date: 1-Aug-1999.
  181. Filar J and Raghavan T (1982). An Algorithm for Solving S-Games and Differential S-Games, SIAM Journal on Control and Optimization, 20:6, (763-769), Online publication date: 1-Nov-1982.
  182. Tijs S (2006). Nash Equilibria for Noncooperative n-Person Games in Normal Form, SIAM Review, 23:2, (225-237), Online publication date: 1-Apr-1981.
  183. Flynn J (1979). Steady State Policies for Deterministic Dynamic Programs, SIAM Journal on Applied Mathematics, 37:1, (128-147), Online publication date: 1-Aug-1979.
  184. Kurtz T (1979). A Variational Formula for the Growth Rate of a Positive Operator Semigroup, SIAM Journal on Mathematical Analysis, 10:1, (112-117), Online publication date: 1-Jan-1979.
  185. Lucas W (1972). An Overview of the Mathematical Theory of Games, Management Science, 18:5-part-2, (3-19), Online publication date: 1-Jan-1972.
  186. Li H and Zheng Z Optimal Timing of Moving Target Defense: A Stackelberg Game Model MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM), (1-6)
  187. Wellman M, Nguyen T and Wright M Empirical Game-Theoretic Methods for Adaptive Cyber-Defense Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, (112-128)
  188. Luenberger D (1968). Quasi-Convex Programming, SIAM Journal on Applied Mathematics, 16:5, (1090-1095), Online publication date: 1-Sep-1968.
  189. Cottle R (1966). Nonlinear Programs with Positively Bounded Jacobians, SIAM Journal on Applied Mathematics, 14:1, (147-158), Online publication date: 1-Jan-1966.
Contributors
  • Google LLC, Asia Pacific

Recommendations

Charles Kenneth Davis

This book deals with the use of game theory as a tool for combating security threats due to terrorism, drug smuggling, and other criminal activity. These threats have accelerated the need to maximize the effectiveness of limited security resources. This typically involves randomizing security schedules to avoid predictability while accounting for the importance of potential targets and any potential adversarial reactions. Game theory provides a sound mathematical approach for deploying such scarce resources effectively. Large-scale computational game theory techniques developed over the past two decades have greatly improved the tools used to address security allocations-hence the need for this book. This book is an anthology of papers by leading theorists and practitioners in the art and science of applying game theoretical methods to complex problems of modern security. It is at the forefront of research in this area. The book begins with an overview of security games, and then presents papers on the "Security Experts' Perspectives" (Part 1), "Deployed Applications" (Part 2), "Efficient Algorithms for Massive Security Games" (Part 3), and issues and directions for "Future Research" (Part 4). The papers deal with local security problems, such as at the Los Angeles International Airport (LAX), as well as larger-scale security questions of a national scope. The book ends with Part 5, "Short [author] Bios." This is not a book for the mathematically challenged. It requires a degree of statistical and mathematical sophistication in order to fully appreciate the methods and techniques described. But for anyone who is an authority in security deployment, or who aspires to be one, this is a truly interesting read. Immersion in the jargon and problem-solving methods presented can only be described as invaluable for such readers. Online Computing Reviews Service

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.