Security Game with Non-additive Utilities and Multiple Attacker Resources
نویسندگان
چکیده
منابع مشابه
Security Games with Multiple Attacker Resources
Algorithms for finding game-theoretic solutions are now used in several real-world security applications. This work has generally assumed a Stackelberg model where the defender commits to a mixed strategy first. In general two-player normal-form games, Stackelberg strategies are easier to compute than Nash equilibria, though it has recently been shown that in many security games, Stackelberg st...
متن کاملNon-additive Security Game
Strategically allocating resources to protect targets against potential threats in an efficient way is a key challenge facing our society. From the classical interdiction game to the recently proposed Stackelberg Security Game, applying computational game models to the security domain has made a real-world impact on numerous fields including military attack and defense, financial system securit...
متن کاملAttacker Deterrence and Perceived Risk in a Stackelberg Security Game
In Stackelberg security games, a defender must allocate scarce resources to defend against a potential attacker. The optimal defense involves the randomization of scarce security resources, yet how attackers perceive the risk given randomized defense is not well understood. We conducted an experiment where attackers chose whether to attack or not attack targets protected by randomized defense s...
متن کاملAttacker Deterrence and Perceived Risk in a Stackelberg Security Game.
In Stackelberg security games, a defender must allocate scarce resources to defend against a potential attacker. The optimal defense involves the randomization of scarce security resources, yet how attackers perceive the risk given randomized defense is not well understood. We conducted an experiment where attackers chose whether to attack or not attack targets protected by randomized defense s...
متن کاملNetwork Game with Attacker and Protector Entities
Consider an information network with harmful procedures called attackers (e.g., viruses); each attacker uses a probability distribution to choose a node of the network to damage. Opponent to the attackers is the system protector scanning and cleaning from attackers some part of the network (e.g., an edge or a path), which it chooses independently using another probability distribution. Each att...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ACM SIGMETRICS Performance Evaluation Review
سال: 2017
ISSN: 0163-5999
DOI: 10.1145/3143314.3078519