Security games with surveillance cost and optimal timing of attack execution

  title={Security games with surveillance cost and optimal timing of attack execution},
  author={Bo An and Matthew Brown and Yevgeniy Vorobeychik and Milind Tambe},
Stackelberg games have been used in several deployed applications to allocate limited resources for critical infrastructure protection. These resource allocation strategies are randomized to prevent a strategic attacker from using surveillance to learn and exploit patterns in the allocation. Past work has typically assumed that the attacker has perfect knowledge of the defender’s randomized strategy or can learn the defender’s strategy after conducting a fixed period of surveillance. In… CONTINUE READING

From This Paper

Figures, tables, and topics from this paper.


Publications citing this paper.
Showing 1-10 of 37 extracted citations

Security games with partial surveillance

AAMAS • 2014
View 5 Excerpts
Highly Influenced


Publications referenced by this paper.
Showing 1-10 of 19 references

LAX - terror target: the history, the reason, the countermeasure, chapter Security and Game Theory: Algorithms, Deployed Systems, Lessons Learned, pages 27–50

E. Southers
View 3 Excerpts
Highly Influenced

Mixed-Initiative Optimization in Security Games: A Preliminary Report

AAAI Spring Symposium: Help Me Help You: Bridging the Gaps in Human-Agent Collaboration • 2011
View 1 Excerpt

Similar Papers

Loading similar papers…