Skip to main content

2017 | OriginalPaper | Buchkapitel

Security Games with Probabilistic Constraints on the Agent’s Strategy

verfasst von : Corine M. Laan, Ana Isabel Barros, Richard J. Boucherie, Herman Monsuur

Erschienen in: Decision and Game Theory for Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This paper considers a special case of security games dealing with the protection of a large area divided in multiple cells for a given planning period. An intruder decides on which cell to attack and an agent selects a patrol route visiting multiple cells from a finite set of patrol routes such that some given operational conditions on the agent’s mobility are met. For example, the agent might be required to patrol some cells more often than others. In order to determine strategies for the agent that deal with these conditions and remain unpredictable for the intruder, this problem is modeled as a two-player zero-sum game with probabilistic constraints such that the operational conditions are met with high probability. We also introduce a variant of the basic constrained security game in which the payoff matrices change over time, to allow for the payoff that may change during the planning period.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Brown, G., Carlyle, M., Salmeron, J., Wood, K.: Defending critical infrastructure. Interfaces 36(6), 530–544 (2006)CrossRef Brown, G., Carlyle, M., Salmeron, J., Wood, K.: Defending critical infrastructure. Interfaces 36(6), 530–544 (2006)CrossRef
4.
Zurück zum Zitat Fang, F., Stone, P., Tambe, M.: When security games go green: Designing defender strategies to prevent poaching and illegal fishing. In: IJCAI, pp. 2589–2595 (2015) Fang, F., Stone, P., Tambe, M.: When security games go green: Designing defender strategies to prevent poaching and illegal fishing. In: IJCAI, pp. 2589–2595 (2015)
5.
Zurück zum Zitat Gatti, N.: Game theoretical insights in strategic patrolling: model and algorithm in normal-form. In: ECAI, pp. 403–407 (2008) Gatti, N.: Game theoretical insights in strategic patrolling: model and algorithm in normal-form. In: ECAI, pp. 403–407 (2008)
6.
Zurück zum Zitat Golany, B., Goldberg, N., Rothblum, U.G.: A two-resource allocation algorithm with an application to large-scale zero-sum defensive games. Comput. Oper. Res. 78, 218–229 (2017)MathSciNetCrossRef Golany, B., Goldberg, N., Rothblum, U.G.: A two-resource allocation algorithm with an application to large-scale zero-sum defensive games. Comput. Oper. Res. 78, 218–229 (2017)MathSciNetCrossRef
7.
Zurück zum Zitat Haskell, W., Kar, D., Fang, F., Tambe, M., Cheung, S., Denicola, E.: Robust protection of fisheries with compass. In: Twenty-Sixth IAAI Conference (2014) Haskell, W., Kar, D., Fang, F., Tambe, M., Cheung, S., Denicola, E.: Robust protection of fisheries with compass. In: Twenty-Sixth IAAI Conference (2014)
8.
Zurück zum Zitat Lin, K.Y., Atkinson, M.P., Chung, T.H., Glazebrook, K.D.: A graph patrol problem with random attack times. Oper. Res. 61(3), 694–710 (2013)MathSciNetCrossRefMATH Lin, K.Y., Atkinson, M.P., Chung, T.H., Glazebrook, K.D.: A graph patrol problem with random attack times. Oper. Res. 61(3), 694–710 (2013)MathSciNetCrossRefMATH
9.
Zurück zum Zitat MATLAB. version 9.1 (R2016b). The MathWorks Inc., Natick, Massachusetts (2016) MATLAB. version 9.1 (R2016b). The MathWorks Inc., Natick, Massachusetts (2016)
10.
Zurück zum Zitat Meng, F., Zhan, J.: Two methods for solving constrained bi-matrix games. Open Cybern. Syst. J. 8, 1038–1041 (2014)CrossRef Meng, F., Zhan, J.: Two methods for solving constrained bi-matrix games. Open Cybern. Syst. J. 8, 1038–1041 (2014)CrossRef
11.
Zurück zum Zitat Owen, G.: Game Theory, 3rd edn. Academic Press, London (1995)MATH Owen, G.: Game Theory, 3rd edn. Academic Press, London (1995)MATH
12.
Zurück zum Zitat Peters, H.: Game Theory: A Multi-leveled Approach, 1st edn. Springer, Heidelberg (2008)CrossRefMATH Peters, H.: Game Theory: A Multi-leveled Approach, 1st edn. Springer, Heidelberg (2008)CrossRefMATH
13.
Zurück zum Zitat Ross, S.: Stochastic Processes. John Wiley & Sons Inc, New York (1996)MATH Ross, S.: Stochastic Processes. John Wiley & Sons Inc, New York (1996)MATH
14.
15.
Zurück zum Zitat Washburn, A., Lee, E.L.T.C.: Allocation of clearance assets in IED warfare. Nav. Res. Logistics (NRL) 58(3), 180–187 (2011)MathSciNetCrossRef Washburn, A., Lee, E.L.T.C.: Allocation of clearance assets in IED warfare. Nav. Res. Logistics (NRL) 58(3), 180–187 (2011)MathSciNetCrossRef
16.
Zurück zum Zitat Winston, W.L.: Operation Research, Applications and Algorithms. Brooks/Cole, Belmont (2004) Winston, W.L.: Operation Research, Applications and Algorithms. Brooks/Cole, Belmont (2004)
17.
Zurück zum Zitat Wood, K.R.: Bilevel network interdiction models: formulations and solutions. In: Wiley Encyclopedia of Operations Research and Management Science (2011) Wood, K.R.: Bilevel network interdiction models: formulations and solutions. In: Wiley Encyclopedia of Operations Research and Management Science (2011)
Metadaten
Titel
Security Games with Probabilistic Constraints on the Agent’s Strategy
verfasst von
Corine M. Laan
Ana Isabel Barros
Richard J. Boucherie
Herman Monsuur
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-68711-7_25