Security Games with Multiple Attacker Resources

  title={Security Games with Multiple Attacker Resources},
  author={Dmytro Korzhyk and Vincent Conitzer and Ronald Parr},
Algorithms for finding game-theoretic solutions are now used in several real-world security applications. This work has generally assumed a Stackelberg model where the defender commits to a mixed strategy first. In general two-player normal-form games, Stackelberg strategies are easier to compute than Nash equilibria, though it has recently been shown that in many security games, Stackelberg strategies are also Nash strategies for the defender. However, the work on security games so far assumes… CONTINUE READING
Highly Cited
This paper has 53 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.
36 Citations
10 References
Similar Papers


Publications citing this paper.

54 Citations

Citations per Year
Semantic Scholar estimates that this publication has 54 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.

Similar Papers

Loading similar papers…