Harnessing the power of deception in attack graph-based security games

S Milani, W Shen, KS Chan, S Venkatesan… - Decision and Game …, 2020 - Springer
We study the use of deception in attack graph-based Stackelberg security games. In our
setting, in addition to allocating defensive resources to protect important targets from …

[HTML][HTML] Game Theory for Unmanned Vehicle Path Planning in the Marine Domain: State of the Art and New Possibilities

M Cococcioni, L Fiaschi, PFJ Lermusiaux - Journal of Marine Science …, 2021 - mdpi.com
Thanks to the advent of new technologies and higher real-time computational capabilities,
the use of unmanned vehicles in the marine domain has received a significant boost in the …

Speed trap optimal patrolling: STOP playing stackelberg security games

R Naja, N Mouawad, AJ Ghandour, K Fawaz - Wireless Personal …, 2018 - Springer
Abstract During 2015, 35,092 people died in motor vehicle crashes on the US roadways, an
increase from 32,744 in 2014. The 7.2% increase is the largest percentage increase in …

Multi-game modeling for counter-smuggling

C Bakker, JB Webster, KE Nowak, S Chatterjee… - Reliability Engineering & …, 2020 - Elsevier
International trade provides an avenue for terrorists to smuggle illicit materials into a target
country. Policymakers need models and decision support tools that are both reliable and …

Column generation approaches to patrol asset scheduling with complete and maximum coverage requirements

P Chircop - 2017 - unsworks.unsw.edu.au
This dissertation is concerned with routing and scheduling patrol assets to provide coverage
or presence to a pre-defined set of patrol regions. The motivation for this research began …

[引用][C] 安全博弈论研究综述

王震, 袁勇, 安波, 李明楚, 王飞跃 - 指挥与控制学报, 2015

[引用][C] 巡逻规划的运筹研究综述

王欣, 杜治国, 郑舟毅 - 中国人民公安大学学报(自然科学版), 2013