Game Theory for Security: An Important Challenge for Multiagent Systems
@inproceedings{An2011GameTF, title={Game Theory for Security: An Important Challenge for Multiagent Systems}, author={Bo An and Milind Tambe}, booktitle={EUMAS}, year={2011} }
The goal of this paper is to introduce a real-world challenge problem for researchers in multiagent systems and beyond, where our collective efforts may have a significant impact on activities in the real-world. The challenge is in applying game theory for security: Our goal is not only to introduce the problem, but also to provide exemplars of initial successes of deployed systems in this challenge problem arena, some key open research challenges and pointers to getting started in this… CONTINUE READING
3 Citations
Game Theory Meets Wireless Sensor Networks Security Requirements and Threats Mitigation: A Survey
- Engineering, Medicine
- Sensors
- 2016
- 51
- Highly Influenced
- PDF
References
SHOWING 1-10 OF 44 REFERENCES
An efficient heuristic approach for security against multiple adversaries
- Computer Science
- AAMAS '07
- 2007
- 120
- PDF
Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games
- Computer Science
- AAMAS
- 2008
- 438
- PDF
Mixed-Initiative Optimization in Security Games: A Preliminary Report
- Computer Science
- AAAI Spring Symposium: Help Me Help You: Bridging the Gaps in Human-Agent Collaboration
- 2011
- 19
- PDF
Improving Resource Allocation Strategy against Human Adversaries in Security Games
- Computer Science
- IJCAI
- 2011
- 111
- PDF
Game theory for security: Key algorithmic principles, deployed systems, lessons learned
- Computer Science
- 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton)
- 2012
- 32
- PDF
Complexity of Computing Optimal Stackelberg Strategies in Security Resource Allocation Games
- Computer Science
- AAAI
- 2010
- 174
- PDF
Risk-Averse Strategies for Security Games with Execution and Observational Uncertainty
- Computer Science
- AAAI
- 2011
- 82
- PDF