Preventing crimes or terrorist attacks in urban areas is challenging. Law enforcement officers need to respond quickly to catch the attacker on his escape route, which is subject to time-dependent traffic conditions on transportation networks. The attacker can strategically choose his escape path and driving speed to avoid being captured. Existing work on security resource allocation has not considered such scenarios with time-dependent strategies for both players. Therefore, in this paper, we study the problem of efficiently scheduling security resources for interdicting the escaping attacker. We propose: 1) a new defender-attacker security game model for escape interdiction on transportation networks; and 2) an efficient double oracle alg...
Algorithms to solve security games, an important class of Stackelberg games, have seen successful re...
In recent years, Stackelberg Security Games have been successfully applied to solve re-source alloca...
Abstract. Previous work on Stackelberg Security Games for scheduling secu-rity resources has mostly ...
Most violent crimes happen in urban and suburban cities. With emerging tracking techniques, law enfo...
Most violent crimes happen in urban and suburban cities. With emerging tracking techniques, law enfo...
Law enforcement agencies frequently must allocate limited resources to protect targets embedded in a...
We study a network security game arising in the interdiction of fare evasion or smuggling. A defende...
This paper advances the field of network interdiction analysis by introducing an application to the ...
Security forces are deployed to protect networks that are threatened by multiple intruders. To selec...
Abstract. The interdiction problem arises in a variety of areas including military logistics, infect...
High profile large scale public events are attractive targets for terrorist attacks. The recent Bost...
Network based security games, where a defender strategically places security measures on the edges o...
Abstract. In network interdiction problems, evaders (e.g., hostile agents or data packets) may be mo...
104 p.The work proposed here will explore applications of game theory, optimization, and demonstrabl...
Large scale smuggling of illegal goods is a longstanding problem, with $1.4b and thousands of agents...
Algorithms to solve security games, an important class of Stackelberg games, have seen successful re...
In recent years, Stackelberg Security Games have been successfully applied to solve re-source alloca...
Abstract. Previous work on Stackelberg Security Games for scheduling secu-rity resources has mostly ...
Most violent crimes happen in urban and suburban cities. With emerging tracking techniques, law enfo...
Most violent crimes happen in urban and suburban cities. With emerging tracking techniques, law enfo...
Law enforcement agencies frequently must allocate limited resources to protect targets embedded in a...
We study a network security game arising in the interdiction of fare evasion or smuggling. A defende...
This paper advances the field of network interdiction analysis by introducing an application to the ...
Security forces are deployed to protect networks that are threatened by multiple intruders. To selec...
Abstract. The interdiction problem arises in a variety of areas including military logistics, infect...
High profile large scale public events are attractive targets for terrorist attacks. The recent Bost...
Network based security games, where a defender strategically places security measures on the edges o...
Abstract. In network interdiction problems, evaders (e.g., hostile agents or data packets) may be mo...
104 p.The work proposed here will explore applications of game theory, optimization, and demonstrabl...
Large scale smuggling of illegal goods is a longstanding problem, with $1.4b and thousands of agents...
Algorithms to solve security games, an important class of Stackelberg games, have seen successful re...
In recent years, Stackelberg Security Games have been successfully applied to solve re-source alloca...
Abstract. Previous work on Stackelberg Security Games for scheduling secu-rity resources has mostly ...