• Mathematics, Computer Science
  • Published in J. Artif. Intell. Res. 2011
  • DOI:10.1613/jair.3269

Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness

@article{Korzhyk2011StackelbergVN,
  title={Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness},
  author={Dmytro Korzhyk and Zhengyu Yin and Christopher Kiekintveld and Vincent Conitzer and Milind Tambe},
  journal={J. Artif. Intell. Res.},
  year={2011},
  volume={41},
  pages={297-327}
}
There has been significant recent interest in game-theoretic approaches to security, with much of the recent research focused on utilizing the leader-follower Stackelberg game model. Among the major applications are the ARMOR program deployed at LAX Airport and the IRIS program in use by the US Federal Air Marshals (FAMS). The foundational assumption for using Stackelberg games is that security forces (leaders), acting first, commit to a randomized strategy; while their adversaries (followers… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 138 CITATIONS

The Best Defense Strategy against Session Hijacking Using Security Game in SDN

  • 2017 IEEE 19th International Conference on High Performance Computing and Communications; IEEE 15th International Conference on Smart City; IEEE 3rd International Conference on Data Science and Systems (HPCC/SmartCity/DSS)
  • 2017
VIEW 9 EXCERPTS
HIGHLY INFLUENCED

MultiDefender security games on networks

VIEW 15 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Stackelberg Equilibria of an Anti-Jamming Game in Cooperative Cognitive Radio Networks

  • IEEE Transactions on Cognitive Communications and Networking
  • 2018
VIEW 5 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Security Game with Non-additive Utilities and Multiple Attacker Resources

  • SIGMETRICS '17 Abstracts
  • 2017
VIEW 5 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Security Game with Non-additive Utilities and Multiple Attacker Resources

VIEW 6 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

FILTER CITATIONS BY YEAR

2012
2019

CITATION STATISTICS

  • 11 Highly Influenced Citations

  • Averaged 21 Citations per year from 2017 through 2019

  • 11% Increase in citations per year in 2019 over 2018

References

Publications referenced by this paper.
SHOWING 1-10 OF 40 REFERENCES

Leadership games with convex strategy sets

  • Games and Economic Behavior
  • 2010
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Choosing what to protect.

  • Risk analysis : an official publication of the Society for Risk Analysis
  • 2007
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Commitment and observability in games

VIEW 6 EXCERPTS
HIGHLY INFLUENTIAL

On generalized Stackelberg strategies

VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL