In adversarial multiagent domains, security, commonly de-fined as the ability to deal with intentional threats from other agents, is a critical issue. This paper focuses on domains where these threats come from unknown adversaries. These domains can be modeled as Bayesian games; much work has been done on finding equilibria for such games. However, it is often the case in multiagent security domains that one agent can commit to a mixed strategy which its adversaries observe before choosing their own strategies. In this case, the agent can maximize reward by finding an optimal strategy, without requiring equilibrium. Previous work has shown this problem of optimal strategy selection to be NP-hard. There-fore, we present a heuristic called AS...
An effective way of preventing attacks in secure areas is to screen for threats (people, objects) be...
had a striking real-world impact. But an algorithm that computes an optimal strategy for the defende...
We propose interdependent defense (IDD) games, a computational game-theoretic framework to study asp...
In a class of games known as Stackelberg games, one agent (the leader) must commit to a strategy tha...
We study the problem of allocating limited security countermeasures to protect network data from cyb...
UnrestrictedRecent advances in the field of agent/multiagent systems brings us closer to agents acti...
Security agencies have found security games to be useful models to understand how to better protect ...
Stackelberg security games have received much attention in recent years. While most existing work fo...
Abstract. Boundedly rational human adversaries pose a serious chal-lenge to security because they de...
Abstract. Recently, there has been an increase in interest in applying game the-oretic approaches to...
This paper investigates repeated security games with unknown (to the defender) game payoffs and atta...
Game theoretic models of security, and associated computational methods, have emerged as critical co...
Abstract Defender-Attacker Stackelberg games are the foundations of tools deployed for computing opt...
Abstract — We investigate reduction of the complexity of a multi-agent adversarial search in the dom...
Security agencies in the real world often need to protect targets with time-dependent values, e.g., ...
An effective way of preventing attacks in secure areas is to screen for threats (people, objects) be...
had a striking real-world impact. But an algorithm that computes an optimal strategy for the defende...
We propose interdependent defense (IDD) games, a computational game-theoretic framework to study asp...
In a class of games known as Stackelberg games, one agent (the leader) must commit to a strategy tha...
We study the problem of allocating limited security countermeasures to protect network data from cyb...
UnrestrictedRecent advances in the field of agent/multiagent systems brings us closer to agents acti...
Security agencies have found security games to be useful models to understand how to better protect ...
Stackelberg security games have received much attention in recent years. While most existing work fo...
Abstract. Boundedly rational human adversaries pose a serious chal-lenge to security because they de...
Abstract. Recently, there has been an increase in interest in applying game the-oretic approaches to...
This paper investigates repeated security games with unknown (to the defender) game payoffs and atta...
Game theoretic models of security, and associated computational methods, have emerged as critical co...
Abstract Defender-Attacker Stackelberg games are the foundations of tools deployed for computing opt...
Abstract — We investigate reduction of the complexity of a multi-agent adversarial search in the dom...
Security agencies in the real world often need to protect targets with time-dependent values, e.g., ...
An effective way of preventing attacks in secure areas is to screen for threats (people, objects) be...
had a striking real-world impact. But an algorithm that computes an optimal strategy for the defende...
We propose interdependent defense (IDD) games, a computational game-theoretic framework to study asp...