Continuous Patrolling Games

08/13/2020
by   Steve Alpern, et al.
0

The continuous patrolling game studied here was first proposed in Alpern et al. (2011), which studied a discrete time game where facilities to be protected were modeled as the nodes of a graph. Here we consider protecting roads or pipelines, modeled as the arcs of a continuous network Q. The Attacker chooses a point of Q to attack during a chosen time interval of fixed duration (the attack time, α). The Patroller chooses a unit speed path on Q and intercepts the attack (and wins) if she visits the attacked point during the attack time interval. Solutions to the game have previously been given in certain special cases. Here, we analyze the game on arbitrary networks. Our results include the following: (i) a solution to the game for any network Q, as long as α is sufficiently short, generalizing the known solutions for circle or Eulerian networks and the network with two nodes joined by three arcs; (ii) a solution to the game for all tree networks that satisfy a condition on their extremities. We present a conjecture on the solution of the game for arbitrary trees and establish it in certain cases.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/26/2022

Optimal Patrolling Strategies for Trees and Complete Networks

We present solutions to a continuous patrolling game played on network. ...
research
02/10/2020

Edge colouring Game on Trees with maximum degree Δ=4

Consider the following game. We are given a tree T and two players (say)...
research
12/25/2021

Practical Fixed-Parameter Algorithms for Defending Active Directory Style Attack Graphs

Active Directory is the default security management system for Windows d...
research
12/22/2020

Spatial Parrondo games with spatially dependent game A

Parrondo games with spatial dependence were introduced by Toral (2001) a...
research
12/14/2019

Periodic attractor in the discrete time best-response dynamics of the Rock-Paper-Scissors game

The Rock-Paper-Scissors (RPS) game is a classic non-cooperative game wid...
research
04/16/2018

Towards Robust Monitoring of Stealthy Diffusion

In this work, we introduce and study the (α, β)-Monitoring game on netwo...
research
10/17/2019

FASHION: Functional and Attack graph Secured HybrId Optimization of virtualized Networks

Maintaining a resilient computer network is a delicate task with conflic...

Please sign up or login with your details

Forgot password? Click here to reset