Security Games with Multiple Attacker Resources

@inproceedings{Korzhyk2011SecurityGW,
  title={Security Games with Multiple Attacker Resources},
  author={Dmytro Korzhyk and Vincent Conitzer and Ronald Parr},
  booktitle={IJCAI},
  year={2011}
}
Algorithms for finding game-theoretic solutions are now used in several real-world security applications. This work has generally assumed a Stackelberg model where the defender commits to a mixed strategy first. In general two-player normal-form games, Stackelberg strategies are easier to compute than Nash equilibria, though it has recently been shown that in many security games, Stackelberg strategies are also Nash strategies for the defender. However, the work on security games so far assumes… CONTINUE READING
Highly Cited
This paper has 53 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.
36 Citations
10 References
Similar Papers

Citations

Publications citing this paper.

54 Citations

0510'12'14'16'18
Citations per Year
Semantic Scholar estimates that this publication has 54 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.

Similar Papers

Loading similar papers…