Towards a science of security games

Security is a critical concern around the world. In many domains from counter-terrorism to sustainability, limited security resources prevent full security coverage at all times; instead, these limited resources must be scheduled, while simultaneously taking into account different target priorities,...

Full description

Saved in:
Bibliographic Details
Main Authors: NGUYEN, Thanh Hong, KAR, Debarun, BROWN, Matthew, SINHA, Arunesh, XIN JIANG, Albert, TAMBE, Milind
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2016
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/4621
https://ink.library.smu.edu.sg/context/sis_research/article/5624/viewcontent/2016_Chapter_.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-5624
record_format dspace
spelling sg-smu-ink.sis_research-56242020-01-02T08:50:30Z Towards a science of security games NGUYEN, Thanh Hong KAR, Debarun BROWN, Matthew SINHA, Arunesh XIN JIANG, Albert TAMBE, Milind Security is a critical concern around the world. In many domains from counter-terrorism to sustainability, limited security resources prevent full security coverage at all times; instead, these limited resources must be scheduled, while simultaneously taking into account different target priorities, the responses of the adversaries to the security posture and potential uncertainty over adversary types.Computational game theory can help design such security schedules. Indeed, casting the problem as a Bayesian Stackelberg game, we have developed new algorithms that are now deployed over multiple years in multiple applications for security scheduling. These applications are leading to real-world use-inspired research in the emerging research area of "security games"; specifically, the research challenges posed by these applications include scaling up security games to large-scale problems, handling significant adversarial uncertainty, dealing with bounded rationality of human adversaries, and other interdisciplinary challenges. 2016-01-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/4621 info:doi/10.1007/978-3-319-31323-8_16 https://ink.library.smu.edu.sg/context/sis_research/article/5624/viewcontent/2016_Chapter_.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Security games Bayesian Stackelberg games Game theory Scalability Uncertainty Bounded rationality Databases and Information Systems
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Security games
Bayesian Stackelberg games
Game theory
Scalability
Uncertainty
Bounded rationality
Databases and Information Systems
spellingShingle Security games
Bayesian Stackelberg games
Game theory
Scalability
Uncertainty
Bounded rationality
Databases and Information Systems
NGUYEN, Thanh Hong
KAR, Debarun
BROWN, Matthew
SINHA, Arunesh
XIN JIANG, Albert
TAMBE, Milind
Towards a science of security games
description Security is a critical concern around the world. In many domains from counter-terrorism to sustainability, limited security resources prevent full security coverage at all times; instead, these limited resources must be scheduled, while simultaneously taking into account different target priorities, the responses of the adversaries to the security posture and potential uncertainty over adversary types.Computational game theory can help design such security schedules. Indeed, casting the problem as a Bayesian Stackelberg game, we have developed new algorithms that are now deployed over multiple years in multiple applications for security scheduling. These applications are leading to real-world use-inspired research in the emerging research area of "security games"; specifically, the research challenges posed by these applications include scaling up security games to large-scale problems, handling significant adversarial uncertainty, dealing with bounded rationality of human adversaries, and other interdisciplinary challenges.
format text
author NGUYEN, Thanh Hong
KAR, Debarun
BROWN, Matthew
SINHA, Arunesh
XIN JIANG, Albert
TAMBE, Milind
author_facet NGUYEN, Thanh Hong
KAR, Debarun
BROWN, Matthew
SINHA, Arunesh
XIN JIANG, Albert
TAMBE, Milind
author_sort NGUYEN, Thanh Hong
title Towards a science of security games
title_short Towards a science of security games
title_full Towards a science of security games
title_fullStr Towards a science of security games
title_full_unstemmed Towards a science of security games
title_sort towards a science of security games
publisher Institutional Knowledge at Singapore Management University
publishDate 2016
url https://ink.library.smu.edu.sg/sis_research/4621
https://ink.library.smu.edu.sg/context/sis_research/article/5624/viewcontent/2016_Chapter_.pdf
_version_ 1770574942337761280