Stackelberg security games: Looking beyond a decade of success

A Sinha, F Fang, B An, C Kiekintveld, M Tambe - 2018 - ink.library.smu.edu.sg
Abstract The Stackelberg Security Game (SSG) model has been immensely influential in
security research since it was introduced roughly a decade ago. Furthermore, deployed SSG …

The maximum clique interdiction problem

F Furini, I Ljubić, S Martin, P San Segundo - European Journal of …, 2019 - Elsevier
Given a graph G and an interdiction budget k, the Maximum Clique Interdiction Problem
asks to find a subset of at most k vertices to remove from G so that the size of the maximum …

Stackelberg security games with multiple uncoordinated defenders

J Gan, E Elkind, M Wooldridge - … of the 17th international conference on …, 2018 - ora.ox.ac.uk
Stackelberg security games have received much attention in recent years. While most
existing work focuses on single-defender settings, there are many real-world scenarios that …

Optimal interdiction of illegal network flow

Q Guo, Y Zick, C Miao, B An - 2016 - dr.ntu.edu.sg
Large scale smuggling of illegal goods is a longstanding problem, with $1.4 b and
thousands of agents assigned to protect the borders from such activity in the US-Mexico …

A memetic approach for sequential security games on a plane with moving targets

J Karwowski, J Mańdziuk, A Żychowski, F Grajek… - Proceedings of the AAAI …, 2019 - aaai.org
This paper introduces a new type of Security Games (SG) played on a plane with targets
moving along predefined straight line trajectories and its respective Mixed Integer Linear …

Divide to defend: Collusive security games

S Gholami, B Wilder, M Brown, D Thomas… - Decision and Game …, 2016 - Springer
Research on security games has focused on settings where the defender must protect
against either a single adversary or multiple, independent adversaries. However, there are a …

[HTML][HTML] Defense coordination in security games: Equilibrium analysis and mechanism design

J Gan, E Elkind, S Kraus, M Wooldridge - Artificial Intelligence, 2022 - Elsevier
Real-world security scenarios sometimes involve multiple defenders: security agencies of
two or more countries might patrol the same border areas, and domestic security agencies …

Intelligent Cybersecurity Agents [Guest editors' introduction]

JM Such, N Criado, L Vercouter… - IEEE Intelligent …, 2016 - ieeexplore.ieee.org
The cross-fertilization between agent technologies and cybersecurity is giving rise to a
number of intelligent approaches that can help mitigate the ever-growing cyber threats …

[PDF][PDF] Defender Stackelberg Game with Inverse Geodesic Length as Utility Metric.

H Aziz, S Gaspers, EJ Lee, K Najeebullah - AAMAS, 2018 - cgi.cse.unsw.edu.au
Networks are ubiquitous, most critical infrastructure systems can be modeled as a network.
Examples of such systems include transportation, power, water (drinking and irrigation) …

Game theoretic characterization of collusive behavior among attackers

A Roy, CA Kamhoua… - IEEE INFOCOM 2018-IEEE …, 2018 - ieeexplore.ieee.org
Recent observations have shown that most of the attacks are fruits of collaboration among
attackers. In this work we have developed a coalition formation game to model the collusive …