[PDF][PDF] A double oracle algorithm for zero-sum security games on graphs
In response to the Mumbai attacks of 2008, the Mumbai police have started to schedule a
limited number of inspection checkpoints on the road network throughout the city. Algorithms …
limited number of inspection checkpoints on the road network throughout the city. Algorithms …
Individual calibration with randomized forecasting
Abstract Machine learning applications often require calibrated predictions, eg a 90%
credible interval should contain the true outcome 90% of the times. However, typical …
credible interval should contain the true outcome 90% of the times. However, typical …
Trusts: Scheduling randomized patrols for fare inspection in transit systems
In proof-of-payment transit systems, passengers are legally required to purchase tickets
before entering but are not physically forced to do so. Instead, patrol units move about the …
before entering but are not physically forced to do so. Instead, patrol units move about the …
TRUSTS: Scheduling randomized patrols for fare inspection in transit systems using game theory
In proof-of-payment transit systems, passengers are legally required to purchase tickets
before entering but are not physically forced to do so. Instead, patrol units move about the …
before entering but are not physically forced to do so. Instead, patrol units move about the …
Improving resource allocation strategies against human adversaries in security games: An extended study
Stackelberg games have garnered significant attention in recent years given their
deployment for real world security. Most of these systems, such as ARMOR, IRIS and …
deployment for real world security. Most of these systems, such as ARMOR, IRIS and …
[PDF][PDF] Security scheduling for real-world networks
Network based security games, where a defender strategically places security measures on
the edges of a graph to protect against an adversary, who chooses a path through a graph is …
the edges of a graph to protect against an adversary, who chooses a path through a graph is …
A cybersecurity insurance model for power system reliability considering optimal defense resource allocation
With the increasing application of Information and Communication Technologies (ICTs),
cyberattacks have become more prevalent against Cyber-Physical Systems (CPSs) such as …
cyberattacks have become more prevalent against Cyber-Physical Systems (CPSs) such as …
Integrated resource allocation and strategy synthesis in safety games on graphs with deception
AN Kulkarni, MS Cohen, CA Kamhoua, J Fu - ar** an online cooperative police patrol routing strategy
A cooperative routing strategy for daily operations is necessary to maintain the effects of
hotspot policing and to reduce crime and disorder. Existing robot patrol routing strategies …
hotspot policing and to reduce crime and disorder. Existing robot patrol routing strategies …