Skip to main content
Top

2017 | OriginalPaper | Chapter

Security Games with Probabilistic Constraints on the Agent’s Strategy

Authors : Corine M. Laan, Ana Isabel Barros, Richard J. Boucherie, Herman Monsuur

Published in: Decision and Game Theory for Security

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This paper considers a special case of security games dealing with the protection of a large area divided in multiple cells for a given planning period. An intruder decides on which cell to attack and an agent selects a patrol route visiting multiple cells from a finite set of patrol routes such that some given operational conditions on the agent’s mobility are met. For example, the agent might be required to patrol some cells more often than others. In order to determine strategies for the agent that deal with these conditions and remain unpredictable for the intruder, this problem is modeled as a two-player zero-sum game with probabilistic constraints such that the operational conditions are met with high probability. We also introduce a variant of the basic constrained security game in which the payoff matrices change over time, to allow for the payoff that may change during the planning period.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Brown, G., Carlyle, M., Salmeron, J., Wood, K.: Defending critical infrastructure. Interfaces 36(6), 530–544 (2006)CrossRef Brown, G., Carlyle, M., Salmeron, J., Wood, K.: Defending critical infrastructure. Interfaces 36(6), 530–544 (2006)CrossRef
4.
go back to reference Fang, F., Stone, P., Tambe, M.: When security games go green: Designing defender strategies to prevent poaching and illegal fishing. In: IJCAI, pp. 2589–2595 (2015) Fang, F., Stone, P., Tambe, M.: When security games go green: Designing defender strategies to prevent poaching and illegal fishing. In: IJCAI, pp. 2589–2595 (2015)
5.
go back to reference Gatti, N.: Game theoretical insights in strategic patrolling: model and algorithm in normal-form. In: ECAI, pp. 403–407 (2008) Gatti, N.: Game theoretical insights in strategic patrolling: model and algorithm in normal-form. In: ECAI, pp. 403–407 (2008)
6.
go back to reference Golany, B., Goldberg, N., Rothblum, U.G.: A two-resource allocation algorithm with an application to large-scale zero-sum defensive games. Comput. Oper. Res. 78, 218–229 (2017)MathSciNetCrossRef Golany, B., Goldberg, N., Rothblum, U.G.: A two-resource allocation algorithm with an application to large-scale zero-sum defensive games. Comput. Oper. Res. 78, 218–229 (2017)MathSciNetCrossRef
7.
go back to reference Haskell, W., Kar, D., Fang, F., Tambe, M., Cheung, S., Denicola, E.: Robust protection of fisheries with compass. In: Twenty-Sixth IAAI Conference (2014) Haskell, W., Kar, D., Fang, F., Tambe, M., Cheung, S., Denicola, E.: Robust protection of fisheries with compass. In: Twenty-Sixth IAAI Conference (2014)
8.
go back to reference Lin, K.Y., Atkinson, M.P., Chung, T.H., Glazebrook, K.D.: A graph patrol problem with random attack times. Oper. Res. 61(3), 694–710 (2013)MathSciNetCrossRefMATH Lin, K.Y., Atkinson, M.P., Chung, T.H., Glazebrook, K.D.: A graph patrol problem with random attack times. Oper. Res. 61(3), 694–710 (2013)MathSciNetCrossRefMATH
9.
go back to reference MATLAB. version 9.1 (R2016b). The MathWorks Inc., Natick, Massachusetts (2016) MATLAB. version 9.1 (R2016b). The MathWorks Inc., Natick, Massachusetts (2016)
10.
go back to reference Meng, F., Zhan, J.: Two methods for solving constrained bi-matrix games. Open Cybern. Syst. J. 8, 1038–1041 (2014)CrossRef Meng, F., Zhan, J.: Two methods for solving constrained bi-matrix games. Open Cybern. Syst. J. 8, 1038–1041 (2014)CrossRef
11.
go back to reference Owen, G.: Game Theory, 3rd edn. Academic Press, London (1995)MATH Owen, G.: Game Theory, 3rd edn. Academic Press, London (1995)MATH
12.
13.
go back to reference Ross, S.: Stochastic Processes. John Wiley & Sons Inc, New York (1996)MATH Ross, S.: Stochastic Processes. John Wiley & Sons Inc, New York (1996)MATH
15.
go back to reference Washburn, A., Lee, E.L.T.C.: Allocation of clearance assets in IED warfare. Nav. Res. Logistics (NRL) 58(3), 180–187 (2011)MathSciNetCrossRef Washburn, A., Lee, E.L.T.C.: Allocation of clearance assets in IED warfare. Nav. Res. Logistics (NRL) 58(3), 180–187 (2011)MathSciNetCrossRef
16.
go back to reference Winston, W.L.: Operation Research, Applications and Algorithms. Brooks/Cole, Belmont (2004) Winston, W.L.: Operation Research, Applications and Algorithms. Brooks/Cole, Belmont (2004)
17.
go back to reference Wood, K.R.: Bilevel network interdiction models: formulations and solutions. In: Wiley Encyclopedia of Operations Research and Management Science (2011) Wood, K.R.: Bilevel network interdiction models: formulations and solutions. In: Wiley Encyclopedia of Operations Research and Management Science (2011)
Metadata
Title
Security Games with Probabilistic Constraints on the Agent’s Strategy
Authors
Corine M. Laan
Ana Isabel Barros
Richard J. Boucherie
Herman Monsuur
Copyright Year
2017
DOI
https://doi.org/10.1007/978-3-319-68711-7_25

Premium Partner