Towards a science of security games
Security is a critical concern around the world. In many domains from counter-terrorism to sustainability, limited security resources prevent full security coverage at all times; instead, these limited resources must be scheduled, while simultaneously taking into account different target priorities,...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2016
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/4621 https://ink.library.smu.edu.sg/context/sis_research/article/5624/viewcontent/2016_Chapter_.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-5624 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-56242020-01-02T08:50:30Z Towards a science of security games NGUYEN, Thanh Hong KAR, Debarun BROWN, Matthew SINHA, Arunesh XIN JIANG, Albert TAMBE, Milind Security is a critical concern around the world. In many domains from counter-terrorism to sustainability, limited security resources prevent full security coverage at all times; instead, these limited resources must be scheduled, while simultaneously taking into account different target priorities, the responses of the adversaries to the security posture and potential uncertainty over adversary types.Computational game theory can help design such security schedules. Indeed, casting the problem as a Bayesian Stackelberg game, we have developed new algorithms that are now deployed over multiple years in multiple applications for security scheduling. These applications are leading to real-world use-inspired research in the emerging research area of "security games"; specifically, the research challenges posed by these applications include scaling up security games to large-scale problems, handling significant adversarial uncertainty, dealing with bounded rationality of human adversaries, and other interdisciplinary challenges. 2016-01-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/4621 info:doi/10.1007/978-3-319-31323-8_16 https://ink.library.smu.edu.sg/context/sis_research/article/5624/viewcontent/2016_Chapter_.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Security games Bayesian Stackelberg games Game theory Scalability Uncertainty Bounded rationality Databases and Information Systems |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Security games Bayesian Stackelberg games Game theory Scalability Uncertainty Bounded rationality Databases and Information Systems |
spellingShingle |
Security games Bayesian Stackelberg games Game theory Scalability Uncertainty Bounded rationality Databases and Information Systems NGUYEN, Thanh Hong KAR, Debarun BROWN, Matthew SINHA, Arunesh XIN JIANG, Albert TAMBE, Milind Towards a science of security games |
description |
Security is a critical concern around the world. In many domains from counter-terrorism to sustainability, limited security resources prevent full security coverage at all times; instead, these limited resources must be scheduled, while simultaneously taking into account different target priorities, the responses of the adversaries to the security posture and potential uncertainty over adversary types.Computational game theory can help design such security schedules. Indeed, casting the problem as a Bayesian Stackelberg game, we have developed new algorithms that are now deployed over multiple years in multiple applications for security scheduling. These applications are leading to real-world use-inspired research in the emerging research area of "security games"; specifically, the research challenges posed by these applications include scaling up security games to large-scale problems, handling significant adversarial uncertainty, dealing with bounded rationality of human adversaries, and other interdisciplinary challenges. |
format |
text |
author |
NGUYEN, Thanh Hong KAR, Debarun BROWN, Matthew SINHA, Arunesh XIN JIANG, Albert TAMBE, Milind |
author_facet |
NGUYEN, Thanh Hong KAR, Debarun BROWN, Matthew SINHA, Arunesh XIN JIANG, Albert TAMBE, Milind |
author_sort |
NGUYEN, Thanh Hong |
title |
Towards a science of security games |
title_short |
Towards a science of security games |
title_full |
Towards a science of security games |
title_fullStr |
Towards a science of security games |
title_full_unstemmed |
Towards a science of security games |
title_sort |
towards a science of security games |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2016 |
url |
https://ink.library.smu.edu.sg/sis_research/4621 https://ink.library.smu.edu.sg/context/sis_research/article/5624/viewcontent/2016_Chapter_.pdf |
_version_ |
1770574942337761280 |