Skip to main content
Top

2016 | OriginalPaper | Chapter

Game Theoretical Approach for Dynamic Active Patrolling in a Counter-Piracy Framework

Authors : Francesca De Simio, Marco Tesei, Roberto Setola

Published in: Recent Advances in Computational Intelligence in Defense and Security

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Maritime piracy has become an important security focus area due to the influence that this phenomenon has on the global economy (Bowden, The economic costs of maritime piracy. Technical Report. Oceans Beyond Piracy, One Earth Future Foundation, 2011, [1]).

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Bowden, A., et al.: The economic costs of maritime piracy. Oceans Beyond Piracy, One Earth Future Foundation, Technical Report (2011) Bowden, A., et al.: The economic costs of maritime piracy. Oceans Beyond Piracy, One Earth Future Foundation, Technical Report (2011)
2.
go back to reference Basilico, N., Gatti, N., Amigoni, F. : Leader-follower strategies for robotic patrolling in environments with arbitrary topologies, In: AAMAS (2009) Basilico, N., Gatti, N., Amigoni, F. : Leader-follower strategies for robotic patrolling in environments with arbitrary topologies, In: AAMAS (2009)
3.
go back to reference Agmon, N., Kraus, S., Kaminka, G.A.: Multi-robot perimeter patrol in adversarial settings. In: ICRA, pp. 2339-2345 (2008) Agmon, N., Kraus, S., Kaminka, G.A.: Multi-robot perimeter patrol in adversarial settings. In: ICRA, pp. 2339-2345 (2008)
4.
go back to reference Vanek, O., Bosansky, B., Jakob, M., Pechoucek, M.: Transiting areas patrolled by a mobile adversary. Comput. Intell. Games (CIG) (2010) Vanek, O., Bosansky, B., Jakob, M., Pechoucek, M.: Transiting areas patrolled by a mobile adversary. Comput. Intell. Games (CIG) (2010)
5.
go back to reference Pita, J., et al.: ARMOR Software: A Game Theoretic Approach for Airport Security (2008) Pita, J., et al.: ARMOR Software: A Game Theoretic Approach for Airport Security (2008)
6.
go back to reference Tsai, J., Rathi, S., Kiekintveld, C., Ordez, F., Tambe, M.: IRIS–A Tool for Strategic Security Allocation in Transportation Networks (2009) Tsai, J., Rathi, S., Kiekintveld, C., Ordez, F., Tambe, M.: IRIS–A Tool for Strategic Security Allocation in Transportation Networks (2009)
7.
go back to reference An, B., Pita, J., Shieh, E., Tambe, M.: GUARDS and PROTECT: Next Generation Applications of Security Games (2011) An, B., Pita, J., Shieh, E., Tambe, M.: GUARDS and PROTECT: Next Generation Applications of Security Games (2011)
8.
go back to reference Tambe, M.: Security and Game Theory Algorithms, Deployed Systems, Lesson. Springer, New York (2012) Tambe, M.: Security and Game Theory Algorithms, Deployed Systems, Lesson. Springer, New York (2012)
9.
go back to reference Article 101 of the United Nations Convention on the Law of the Sea (UNCLOS) (1982) Article 101 of the United Nations Convention on the Law of the Sea (UNCLOS) (1982)
10.
go back to reference Kraska, J.: Contemporary Maritime Piracy International Law, Strategy, and Diplomacy at Sea. Praeger, New York (2011) Kraska, J.: Contemporary Maritime Piracy International Law, Strategy, and Diplomacy at Sea. Praeger, New York (2011)
11.
go back to reference IMO Doc. MSC.4/Circ.164, Reports on Acts of Piracy and Armed Robbery against Ships, at 2, 3 Dec 2010 IMO Doc. MSC.4/Circ.164, Reports on Acts of Piracy and Armed Robbery against Ships, at 2, 3 Dec 2010
15.
go back to reference Fudenberg, D., Tirole, J.: Game Theory. MIT Press, Cambridge (1993) Fudenberg, D., Tirole, J.: Game Theory. MIT Press, Cambridge (1993)
16.
go back to reference Bologna, S., Setola, R.: The need to improve local self-awareness in CIP/CIIP. In: First IEEE International Workshop on Critical Infrastructure Protection. IEEE (2005) Bologna, S., Setola, R.: The need to improve local self-awareness in CIP/CIIP. In: First IEEE International Workshop on Critical Infrastructure Protection. IEEE (2005)
17.
go back to reference Leboucher, C., Chelouah, R., Siarry, P., Le Menec, S.: A swarm intelligence method combined to evolutionary game theory applied to resources allocation problem. In: International Conference on Swarm Intelligence (2011) Leboucher, C., Chelouah, R., Siarry, P., Le Menec, S.: A swarm intelligence method combined to evolutionary game theory applied to resources allocation problem. In: International Conference on Swarm Intelligence (2011)
18.
go back to reference Woosun, An., Ayala, D.F.M., Sidoti, D., Mishra, M., Xu, Han., Pattipati, K.R., Regnier, E.D., Kleinman, D.L., Hansen, J.A.: Dynamic asset allocation approaches for counter-piracy operations. In: Proceedings of the 15th International Conference on Information Fusion (FUSION), pp.1284-1291, 9-12 July 2012 Woosun, An., Ayala, D.F.M., Sidoti, D., Mishra, M., Xu, Han., Pattipati, K.R., Regnier, E.D., Kleinman, D.L., Hansen, J.A.: Dynamic asset allocation approaches for counter-piracy operations. In: Proceedings of the 15th International Conference on Information Fusion (FUSION), pp.1284-1291, 9-12 July 2012
19.
go back to reference Grasso, R., Braca, P., Osler, J., Hansen, J.: Asset network planning: integration of environmental data and sensor performance for counter piracy. EUSIPCO (2013) Grasso, R., Braca, P., Osler, J., Hansen, J.: Asset network planning: integration of environmental data and sensor performance for counter piracy. EUSIPCO (2013)
20.
go back to reference Grasso, R., Braca, P., Osler, J., Hansen, J., Willet, P.: Optimal asset network planning for counter piracy operation support, part 1: under the hood. IEEE A & E Syst. Mag. (2013) Grasso, R., Braca, P., Osler, J., Hansen, J., Willet, P.: Optimal asset network planning for counter piracy operation support, part 1: under the hood. IEEE A & E Syst. Mag. (2013)
21.
go back to reference Grasso, R., Braca, P., Osler, J., Hansen, J., Willet, P.: Optimal asset network planning for counter piracy operation support, part 2: results. IEEE A & E Syst. Mag. (2013) Grasso, R., Braca, P., Osler, J., Hansen, J., Willet, P.: Optimal asset network planning for counter piracy operation support, part 2: results. IEEE A & E Syst. Mag. (2013)
22.
go back to reference Paruchuri, P., Pearce, J.P., Tambe, M., Ordonez, F., Kraus, S.: Ancefficient heuristic approach for security against multiple adversaries. In: Proceedings of AAMAS, pp. 311-318. Honolulu, USA (2007) Paruchuri, P., Pearce, J.P., Tambe, M., Ordonez, F., Kraus, S.: Ancefficient heuristic approach for security against multiple adversaries. In: Proceedings of AAMAS, pp. 311-318. Honolulu, USA (2007)
23.
go back to reference Paruchuri, P., Tambe, M., Ordonez, F., Kraus, S.: Security in multiagentvsystems by policy randomization. In: Proceedings of AAMAS, pp. 273-280. Hakodate, Japan (2006) Paruchuri, P., Tambe, M., Ordonez, F., Kraus, S.: Security in multiagentvsystems by policy randomization. In: Proceedings of AAMAS, pp. 273-280. Hakodate, Japan (2006)
24.
go back to reference Gatti, N.: Game theoretical insights in strategic patrolling: model and algorithm in normal-form. In: Proceedings of the ECAI (2008) Gatti, N.: Game theoretical insights in strategic patrolling: model and algorithm in normal-form. In: Proceedings of the ECAI (2008)
25.
go back to reference Agmon, N., Kraus, S., Kaminka, G.: Multi-robot perimeter patrol in adversarial settings. In: IEEE International Conference on Robotics and Automation, ICRA 2008, pp. 2339-2345 (2008) Agmon, N., Kraus, S., Kaminka, G.: Multi-robot perimeter patrol in adversarial settings. In: IEEE International Conference on Robotics and Automation, ICRA 2008, pp. 2339-2345 (2008)
26.
go back to reference Agmon, N., Sadov, V., Kaminka, G., Kraus S.: The impact of adversarial knowledge on adversarial planning in perimeter patrol. In: Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems, International Foundation for Autonomous Agents and Multiagent Systems, vol. 1, pp. 55-62 (2008) Agmon, N., Sadov, V., Kaminka, G., Kraus S.: The impact of adversarial knowledge on adversarial planning in perimeter patrol. In: Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems, International Foundation for Autonomous Agents and Multiagent Systems, vol. 1, pp. 55-62 (2008)
27.
go back to reference Basilico, N., Gatti, N., Rossi, T., Ceppi, S., Amigoni, F.: Extending algorithms for mobile robot patrolling in the presence of adversaries to more realistic settings. In: Proceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology, vol. 02 (2009) Basilico, N., Gatti, N., Rossi, T., Ceppi, S., Amigoni, F.: Extending algorithms for mobile robot patrolling in the presence of adversaries to more realistic settings. In: Proceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology, vol. 02 (2009)
28.
go back to reference Basilico, N., Gatti, N., Villa, F.: Asynchronous Multi-Robot Patrolling Against Intrusions in Arbitrary Topologies (2010) Basilico, N., Gatti, N., Villa, F.: Asynchronous Multi-Robot Patrolling Against Intrusions in Arbitrary Topologies (2010)
29.
go back to reference Vanek, O., Hrstka, O., Pechoucek, M.: Improving group transit schemes to minimize negative effects of maritime piracy. IEEE Intell. Trans. Syst. (2014) Vanek, O., Hrstka, O., Pechoucek, M.: Improving group transit schemes to minimize negative effects of maritime piracy. IEEE Intell. Trans. Syst. (2014)
30.
go back to reference Vanek, O., Pechoucek, M.: Dynamic group transit scheme for corridor transit. In: Proceedings of the 5th International Conference on Modeling, Simulation and Applied Optimization (2013) Vanek, O., Pechoucek, M.: Dynamic group transit scheme for corridor transit. In: Proceedings of the 5th International Conference on Modeling, Simulation and Applied Optimization (2013)
31.
go back to reference Vanek, O., Jakob, M., Hrstka, O., Pechoucek, M.: Agent-based Model of Mariime Traffic in Piracy-affected Waters. Trans. Res. Part C: Emerg. Technol. (2013) Vanek, O., Jakob, M., Hrstka, O., Pechoucek, M.: Agent-based Model of Mariime Traffic in Piracy-affected Waters. Trans. Res. Part C: Emerg. Technol. (2013)
32.
go back to reference Shieh, E., An, B., Yang, R., Tambe, M., Baldwin, C., Di Renzo, J., Maule, B., Meyer, G.: PROTECT: an application of computational game theory for the security of the ports of the united states.In: Proceedings of the Conference on Artificial Intelligence (AAAI) Spotlight Track (2012) Shieh, E., An, B., Yang, R., Tambe, M., Baldwin, C., Di Renzo, J., Maule, B., Meyer, G.: PROTECT: an application of computational game theory for the security of the ports of the united states.In: Proceedings of the Conference on Artificial Intelligence (AAAI) Spotlight Track (2012)
33.
go back to reference Kiekintveld, C., Jain, M., Tsai, J., Pita, J., Tambe, M., Ordonez, F.: Computing Optimal Randomized Resource Allocations for Massive Security Games (2009) Kiekintveld, C., Jain, M., Tsai, J., Pita, J., Tambe, M., Ordonez, F.: Computing Optimal Randomized Resource Allocations for Massive Security Games (2009)
34.
go back to reference Kiekintveld, C., et al.: Computing optimal randomized resource allocations for massive security games. In: Proceedings of the 8th International Conference on Autonomous Agents and Multiagent Systems, vol. 1, pp. 689-696 (2009) Kiekintveld, C., et al.: Computing optimal randomized resource allocations for massive security games. In: Proceedings of the 8th International Conference on Autonomous Agents and Multiagent Systems, vol. 1, pp. 689-696 (2009)
Metadata
Title
Game Theoretical Approach for Dynamic Active Patrolling in a Counter-Piracy Framework
Authors
Francesca De Simio
Marco Tesei
Roberto Setola
Copyright Year
2016
DOI
https://doi.org/10.1007/978-3-319-26450-9_16

Premium Partner