Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned

نویسنده

  • Milind Tambe
چکیده

Global threats of terrorism, drug-smuggling, and other crimes have led to a significant increase in the need to deploy limited security resources to maximize their effectiveness. Game theory provides a sound mathematical approach for such effective deployment of limited security resources. A typical resulting approach is to randomize security schedules to avoid predictability, taking into account the importance of different targets and potential adversary reactions. This book distills the forefront of this research on game theory for security to provide the first and only study of long-term deployed applications of game theory in the security of key organizations such as the Los Angeles International Airport police and the U.S. Federal Air Marshals Service. The author and his research group draw on their extensive experience working with security officials to intelligently allocate limited security resources to protect targets, outlining the applications of their algorithms in research and the real world. The book also includes professional perspectives from security experts Erroll G. Southers; Lieutenant Commander Joe DiRenzo III, U.S. Coast Guard; Lieutenant Commander Ben Maule, U.S. Coast Guard; Commander Erik Jensen, U.S. Coast Guard; and Lieutenant Fred S. Bertsch IV, U.S. Coast Guard.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Computational Game Theory for Security and Sustainability

Security is a critical concern around the world that arises in protecting our ports, airports, transportation and other critical national infrastructure from adversaries, in protecting our wildlife and forests from poachers and smugglers, and in curtailing the illegal flow of weapons, drugs and money; and it arises in problems ranging from physical to cyber-physical systems. In all of these pro...

متن کامل

Computing Game-Theoretic Solutions and Applications to Security

The multiagent systems community has adopted game theory as a framework for the design of systems of multiple self-interested agents. For this to be effective, efficient algorithms must be designed to compute the solutions that game theory prescribes. In this paper, I summarize some of the state of the art on this topic, focusing particularly on how this line of work has contributed to several ...

متن کامل

Game Theoretic Analysis of Security and Sustainability

Computational game theory has become a powerful tool to address critical issues in security and sustainability. Casting the security resource allocation problem as a Stackelberg game, novel algorithms have been developed to provide randomized security resource allocations. These algorithms have led to deployed security-game based decision aids for many real-world security domains including infr...

متن کامل

Security Games Applied to Real-World: Research Contributions and Challenges

The goal of this chapter is to introduce a challenging real-world problem for researchers in multiagent systems and beyond, where our collective efforts may have a significant impact on activities in the real-world. The challenge is in applying game theory for security: our goal is not only to introduce the problem, but also to provide exemplars of initial successes of deployed systems in this ...

متن کامل

Real-world security games: toward addressing human decision-making uncertainty

Game theory is a useful tool for reasoning about interactions between agents and in turn aiding in the decisions of those agents. In fact, Stackelberg games are natural models for many important applications such as oligopolistic markets and security domains. Indeed, Stackelberg games are at the heart of three deployed systems, ARMOR; IRIS; and GUARDS, for aiding security officials in making cr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012