Computing Optimal Mixed Strategies for Terrorist Plot Detection Games with the Consideration of Information Leakage

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Computing Optimal Mixed Strategies for Security Games with Dynamic Payoffs

Security agencies in the real world often need to protect targets with time-dependent values, e.g., tourist sites where the number of travelers changes over time. Since the values of different targets often change asynchronously, the defender can relocate security resources among targets dynamically to make the best use of limited resources. We propose a game-theoretic scheme to develop dynamic...

متن کامل

Finding Optimal Strategies for Imperfect Information Games

Ian Frank Complex Games Lab Electrotechnical Laboratory Umezono 1-1-4, Tsukuba Ibaraki, JAPAN 305 [email protected] David Basin Institut f ur Informatik Universitat Freiburg Am Flughafen 17 Freiburg, Germany [email protected] Hitoshi Matsubara Complex Games Lab Electrotechnical Laboratory Umezono 1-1-4, Tsukuba Ibaraki, JAPAN 305 [email protected] Abstract We examine three heuris...

متن کامل

Existence of optimal strategies in Markov games with incomplete information

The existence of a value and optimal strategies is proved for the class of twoperson repeated games where the state follows a Markov chain independently of players’ actions and at the beginning of each stage only player one is informed about the state. The results apply to the case of standard signaling where players’ stage actions are observable, as well as to the model with general signals pr...

متن کامل

Computing Weakest Strategies for Safety Games of Imperfect Information

CEDAR (Counter Example Driven Antichain Refinement) is a new symbolic algorithm for computing weakest strategies for safety games of imperfect information. The algorithm computes a fixed point over the lattice of contravariant antichains. Here contravariant antichains are antichains over pairs consisting of an information set and an allow set representing the associated move. We demonstrate how...

متن کامل

Information Leakage Games

We formalize the interplay between defender and adversary in a game-theoretic framework adapted to the specific issues of quantitative information flow. Assuming that both defender and adversary may be active and influence the system during the attack, we define a general framework of information leakage games in which the payoff function of the game is information leakage. We provide methods f...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ITM Web of Conferences

سال: 2017

ISSN: 2271-2097

DOI: 10.1051/itmconf/20171203001