[PDF][PDF] Computational game theory for security: Progress and challenges

M Tambe, AX Jiang, B An… - … spring symposium on …, 2014 - teamcore.seas.harvard.edu
The goal of this paper is to (re) introduce a real-world challenge problem for researchers in
multiagent systems and beyond, where our collective efforts may have a significant impact …

What happened next? Using deep learning to value defensive actions in football event-data

C Merhej, RJ Beal, T Matthews… - Proceedings of the 27th …, 2021 - dl.acm.org
Objectively quantifying the value of player actions in football (soccer) is a challenging
problem. To date, studies in football analytics have mainly focused on the attacking side of …

Stackelberg security games (ssg) basics and application overview

B An, M Tambe, A Sinha - Improving Homeland Security …, 2017 - books.google.com
Security is a critical concern around the world that arises in protecting our ports, airports,
transportation or other critical national infrastructure, curtailing the illegal flow of drugs …

[PDF][PDF] Comparing Strategic Secrecy and Stackelberg Commitment in Security Games.

Q Guo, B An, B Bosanský, C Kiekintveld - IJCAI, 2017 - ijcai.org
Abstract The Strong Stackelberg Equilibrium (SSE) has drawn extensive attention recently in
several security domains. However, the SSE concept neglects the advantage of defender's …

Stackelberg game in critical infrastructures from a network science perspective

Y Li, S Qiao, Y Deng, J Wu - Physica A: Statistical Mechanics and its …, 2019 - Elsevier
Defending critical infrastructures has received enormous attentions by security agencies.
Many infrastructures function as networks such as transportation and communication …

[HTML][HTML] Game Theory for Unmanned Vehicle Path Planning in the Marine Domain: State of the Art and New Possibilities

M Cococcioni, L Fiaschi, PFJ Lermusiaux - Journal of Marine Science …, 2021 - mdpi.com
Thanks to the advent of new technologies and higher real-time computational capabilities,
the use of unmanned vehicles in the marine domain has received a significant boost in the …

Computing optimal monitoring strategy for detecting terrorist plots

Z Wang, Y Yin, B An - Proceedings of the AAAI Conference on Artificial …, 2016 - ojs.aaai.org
In recent years, terrorist organizations (eg, ISIS or al-Qaeda) are increasingly directing
terrorists to launch coordinated attacks in their home countries. One example is the Paris …

Security games with protection externalities

J Gan, B An, Y Vorobeychik - Proceedings of the AAAI Conference on …, 2015 - ojs.aaai.org
Stackelberg security games have been widely deployed in recent years to schedule security
resources. An assumption in most existing security game models is that one security …

Optimising game tactics for football

R Beal, G Chalkiadakis, TJ Norman… - arXiv preprint arXiv …, 2020 - arxiv.org
In this paper we present a novel approach to optimise tactical and strategic decision making
in football (soccer). We model the game of football as a multi-stage game which is made up …

Which targets to protect in critical infrastructures-a game-theoretic solution from a network science perspective

Y Li, Y Xiao, Y Li, J Wu - IEEE Access, 2018 - ieeexplore.ieee.org
Modern society is highly dependent on its critical infrastructures. These infrastructures
usually suffer intentional attacks, which is a serious threat to social wellbeing, making the …