Introduction and Overview of Security Games

نویسندگان

  • Milind Tambe
  • Manish Jain
چکیده

Game theory’s popularity continues to increase in a whole variety of disciplines, including economics, biology, political science, computer science, electrical engineering, business, law, and public policy. In the arena of security, where game theory has always been popular, there now seems to be an exponential increase in interest. This increase is in part due to the new set of problems our societies face, from terrorism to drugs to crime. These problems are ubiquitous. Yet, limited security resources cannot be everywhere all the time, raising a crucial question of how to best utilize them. Game theory provides a sound mathematical approach for deploying limited security resources to maximize their effectiveness. While the connection between game theory and security has been studied for the last several decades, there has been a fundamental shift in the relationship due to the emergence of computational game theory. More specifically, with the development of new computational approaches to game theory over the past two decades, very large-scale problems can be cast in game-theoretic contexts, thus providing us computational tools to address problems of security allocations. My research group has been at the forefront of this effort to apply computational game theory techniques to security problems. We have led a wide range of actual deployed applications of game theory for security. Our first application, Assistant for Randomized Monitoring Over Routes (ARMOR), successfully deployed game-theoretic algorithms at the Los Angeles International Airport (LAX) in 2007 and has been in use there ever since. In particular, ARMOR uses game theory to randomize allocation of police checkpoints and canine units. Our second application, Intelligent Randomization in Scheduling (IRIS), has been used by the U.S. Federal Air Marshal Service since 2009 to deploy air marshals on U.S. air carriers. A third application, Game-theoretic Unpredictable and

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

overview of ways to enhance the security of video surveillance networks using blockchain

In recent decades, video surveillance systems have an increasing development that are used to prevent crime and manage facilities with rapid diffusion of  (CCTV)cameras to prevent crime and manage facilities. The video stored in the video surveillance system should be managed comfortably, but sometimes the movies are leaking out to unauthorized people or by unauthorized people, thus violating i...

متن کامل

An Overview of Group Key Management Issues in IEEE 802.16e Networks

The computer industry has defined the IEEE 802.16 family of standards that will enable mobile devices to access a broadband network as an alternative to digital subscriber line technology. As the mobile devices join and leave a network, security measures must be taken to ensure the safety of the network against unauthorized usage by encryption and group key management. IEEE 802.16e uses Multica...

متن کامل

Stackelberg Security Games (SSG) Basics and Application Overview

Security is a critical concern around the world, whether it is the challenge of protecting ports, airports and other critical infrastructure, interdicting the illegal flow of drugs, weapons and money, protecting endangered species, forests and fisheries, suppressing urban crime or security in cyberspace. Unfortunately, limited security resources prevent full security coverage at all times; inst...

متن کامل

An overview on security in networked computer games

Network security issues and game exploits can undermine the gameplay experience of networked games. With this in mind, this work tries to draw attention of the academic community to the issue and, through a vast bibliography, present: why research in this area matters, the state of current research in the field, a categorization of cheating types and, also, some possible counter measures. And t...

متن کامل

Food Losses and Waste: A Global Overview with a Focus on Near East and North Africa Region

Food losses refer to edible food mass decrease throughout the human food chain. Food losses occurring at consumption stage are called food waste. Food Losses and Waste (FLW) represent one of the most critical social, economic and ecological challenges facing humanity, besides being also an ethical issue. FAO data show that roughly one-third of food produced for human consumption is lost or wast...

متن کامل

Trade and National Security: A Test for Best-Known Hypothesis

National security depends on soft power, the ability of a country to generate and use its economic power and to project its national values. It also depends on long-term factors that contribute to economic growth and increase the total resources base available not only for defense but to provide economic security in the form of income and business opportunities for individuals. The economic iss...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012