Deploying paws: Field optimization of the protection assistant for wildlife security
Poaching is a serious threat to the conservation of key species and whole ecosystems.
While conducting foot patrols is the most commonly used approach in many countries to …
While conducting foot patrols is the most commonly used approach in many countries to …
A Review of Incident Prediction, Resource Allocation, and Dispatch Models for Emergency Management
In the last fifty years, researchers have developed statistical, data-driven, analytical, and
algorithmic approaches for designing and improving emergency response management …
algorithmic approaches for designing and improving emergency response management …
Capture: A new predictive anti-poaching tool for wildlife protection
Wildlife poaching presents a serious extinction threat to many animalspecies. Agencies
(“defenders”) focused on protecting suchanimals need tools that help analyze, model and …
(“defenders”) focused on protecting suchanimals need tools that help analyze, model and …
Cloudy with a chance of poaching: Adversary behavior modeling and forecasting with real-world poaching data
Wildlife conservation organizations task rangers to deter and capture wildlife poachers.
Since rangers are responsible for patrolling vast areas, adversary behavior modeling can …
Since rangers are responsible for patrolling vast areas, adversary behavior modeling can …
PAWS—A deployed game-theoretic application to combat poaching
Poaching is considered a major driver for the population drop of key species such as tigers,
elephants, and rhinos, which can be detrimental to whole ecosystems. While conducting foot …
elephants, and rhinos, which can be detrimental to whole ecosystems. While conducting foot …
[PDF][PDF] Trends and applications in Stackelberg security games
Security is a critical concern around the world, whether it is the challenge of protecting ports,
airports and other critical infrastructure, interdicting the illegal flow of drugs, weapons and …
airports and other critical infrastructure, interdicting the illegal flow of drugs, weapons and …
Three strategies to success: Learning adversary models in security games
State-of-the-art applications of Stackelberg security games--including wildlife protection--
offer a wealth of data, which can be used to learn the behavior of the adversary. But existing …
offer a wealth of data, which can be used to learn the behavior of the adversary. But existing …
Adversary models account for imperfect crime data: Forecasting and planning against real-world poachers
Poachers are engaged in extinction level wholesale slaughter, so it is critical to harness
historical data for predicting poachers' behavior. However, in these domains, data collected …
historical data for predicting poachers' behavior. However, in these domains, data collected …
Learning adversary behavior in security games: A PAC model perspective
Recent applications of Stackelberg Security Games (SSG), from wildlife crime to urban
crime, have employed machine learning tools to learn and predict adversary behavior using …
crime, have employed machine learning tools to learn and predict adversary behavior using …
Preventing illegal logging: Simultaneous optimization of resource teams and tactics for security
Green security—protection of forests, fish and wildlife—is a critical problem in environmental
sustainability. We focus on the problem of optimizing the defense of forests againstillegal …
sustainability. We focus on the problem of optimizing the defense of forests againstillegal …