Security games with limited surveillance

B An, D Kempe, C Kiekintveld, E Shieh… - Proceedings of the …, 2012 - ojs.aaai.org
… strategies of Stackelberg games are used in several deployed applications to allocate limited
resources for the protection of critical infrastructure. Stackelberg games model the fact that …

[PDF][PDF] Security games with surveillance cost and optimal timing of attack execution

B An, M Brown, Y Vorobeychik… - Proceedings of the 2013 …, 2013 - aamas.csc.liv.ac.uk
… actions and surveillance cost. Such an optimal stopping model for limited surveillance does
… introduce a model of security games with limited surveillance in which attacker dynamically …

[PDF][PDF] Security games with limited surveillance: An initial report

B An, D Kempe, C Kiekintveld, E Shieh… - 2012 AAAI Spring …, 2012 - cdn.aaai.org
… model of how attackers conduct surveillance operations and update their … of security games
with strategic surveillance and formulate how the attacker updates his belief given limited

[PDF][PDF] Security Games with Limited Surveillance: An Initial Report.

Y Vorobeychik, B An, S Singh, M Tambe - 2012 - osti.gov
… model of how attackers conduct surveillance operations and update their … of security games
with strategic surveillance and formulate how the attacker updates his belief given limited

[PDF][PDF] Security games with partial surveillance.

Y Zhang, X Luo - AAMAS, 2014 - aamas.csc.liv.ac.uk
Security games are used to deploy limited security resources. Much work on the topic
assumes that attackers have the perfect knowledge of defenders’ strategies. However, it is not …

[图书][B] Security games: Surveillance and control at mega-events

C Bennett, K Haggerty - 2012 - books.google.com
… of fear, heightened security and surveillance; and that this … of the security and surveillance
measures, once the Games are … noia at the Games, we argue, depend on limited conceptual …

Introduction: Security games: Surveillance and control at mega-events

CJ Bennett, KD Haggerty - Security Games, 2012 - api.taylorfrancis.com
… The football venues as well as the “fan miles” in downtown areas were converted into
high-security zones with access limited to registered persons, and overseen by sophisticated …

Approximation approaches for solving security games with surveillance cost: a preliminary study

Q Guo, B An, A Kolobov - 2015 - dr.ntu.edu.sg
… security forces while conducting surveillance [20]. Therefore, … limited surveillance. An et al.
[1, 3] propose a natural model of limited surveillance OPTS (OPtimal sTopping Security games

[PDF][PDF] Trends and applications in Stackelberg security games

D Kar, TH Nguyen, F Fang, M Brown… - … of dynamic game …, 2017 - andrew.cmu.edu
… , (3) addressing human adversaries’ bounded rationality and bounded surveillance (limited
capabilities in surveillance), and (4) evaluation of the framework in the field. Given the …

Physical intrusion games—optimizing surveillance by simulation and game theory

S Rass, A Alshawish, MA Abid, S Schauer, Q Zhu… - IEEE …, 2017 - ieeexplore.ieee.org
… Having dynamic and mobile surveillance systems (or strategies) … stay ahead of the attackers
in the respective security game. … Additionally, there is a limited number of video surveillance