Security Games with Ambiguous Beliefs of Agents

08/09/2015
by   Hossein Khani, et al.
0

Currently the Dempster-Shafer based algorithm and Uniform Random Probability based algorithm are the preferred method of resolving security games, in which defenders are able to identify attackers and only strategy remained ambiguous. However this model is inefficient in situations where resources are limited and both the identity of the attackers and their strategies are ambiguous. The intent of this study is to find a more effective algorithm to guide the defenders in choosing which outside agents with which to cooperate given both ambiguities. We designed an experiment where defenders were compelled to engage with outside agents in order to maximize protection of their targets. We introduced two important notions: the behavior of each agent in target protection and the tolerance threshold in the target protection process. From these, we proposed an algorithm that was applied by each defender to determine the best potential assistant(s) with which to cooperate. Our results showed that our proposed algorithm is safer than the Dempster-Shafer based algorithm.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/30/2022

Targets in Reinforcement Learning to solve Stackelberg Security Games

Reinforcement Learning (RL) algorithms have been successfully applied to...
research
07/08/2020

Multi-Swarm Herding: Protecting against Adversarial Swarms

This paper studies a defense approach against one or more swarms of adve...
research
09/04/2017

Maintaining Ad-Hoc Communication Network in Area Protection Scenarios with Adversarial Agents

We address a problem of area protection in graph-based scenarios with mu...
research
06/07/2016

Multi-resource defensive strategies for patrolling games with alarm systems

Security Games employ game theoretical tools to derive resource allocati...
research
03/28/2023

Scaling Multi-Objective Security Games Provably via Space Discretization Based Evolutionary Search

In the field of security, multi-objective security games (MOSGs) allow d...
research
02/02/2022

Minimizing Expected Intrusion Detection Time in Adversarial Patrolling

In adversarial patrolling games, a mobile Defender strives to discover i...

Please sign up or login with your details

Forgot password? Click here to reset