Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Green security games: apply game theory to addressing green security challenges

Published: 06 September 2016 Publication History

Abstract

In the past decade, game-theoretic applications have been successfully deployed in the real world to address security resource allocation challenges. Inspired by the success, researchers have begun focusing on applying game theory to green security domains such as protection of forests, fish, and wildlife, forming a stream of research on Green Security Games (GSGs). We provide an overview of recent advances in GSGs and list the challenges that remained open for future study.

References

[1]
An, B., Pita, J., Shieh, E., Tambe, M., Kiekintveld, C., and Marecki, J. 2011. GUARDS and PROTECT: Next Generation Applications of Security Games. ACM SIGecom Exchanges 10, 1, 31--34.
[2]
Fang, F., Jiang, A. X., and Tambe, M. 2013. Optimal Patrol Strategy for Protecting Moving Targets with Multiple Mobile Resources. In AAMAS.
[3]
Fang, F., Nguyen, T. H., Pickles, R., Lam, W. Y., Clements, G. R., An, B., Singh, A., Tambe, M., and Lemieux, A. 2016. Deploying PAWS: Field Optimization of the Protection Assistant for Wildlife Security. In Proceedings of the Twenty-Eighth Innovative Applications of Artificial Intelligence Conference (IAAI 2016).
[4]
Fang, F., Stone, P., and Tambe, M. 2015. When Security Games Go Green: Designing Defender Strategies to Prevent Poaching and Illegal Fishing. In International Joint Conference on Artificial Intelligence (IJCAI).
[5]
Haghtalab, N., Fang, F., Nguyen, T. H., Sinha, A., Procaccia, A. D., and Tambe, M. 2016. Three Strategies to Success: Learning Adversary Models in Security Games. In IJCAI'16.
[6]
Haskell, W. B., Kar, D., Fang, F., Tambe, M., Cheung, S., and Denicola, L. E. 2014. Robust protection of fisheries with COmPASS. In IAAI.
[7]
Kar, D., Fang, F., Fave, F. D., Sintov, N., and Tambe, M. 2015. "A Game of Thrones": When Human Behavior Models Compete in Repeated Stackelberg Security Games. In International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2015).
[8]
Mc Carthy, S., Tambe, M., Kiekintveld, C., Gore, M. L., and Killion, A. 2016. Preventing Illegal Logging: Simultaneous Optimization of Resource Teams and Tactics for Security. In AAAI Computational Sustainability Track.
[9]
Nguyen, T. H., Fave, F. M. D., Kar, D., Lakshminarayanan, A. S., Yadav, A., Tambe, M., Agmon, N., Plumptre, A. J., Driciru, M., Wanyama, F., and Rwetsiba, A. 2015. Making the most of Our Regrets: Regret-based Solutions to Handle Payoff Uncertainty and Elicitation in Green Security Games. In Conference on Decision and Game Theory for Security.
[10]
Nguyen, T. H., Sinha, A., Gholami, S., Plumptre, A., Joppa, L., Tambe, M., Driciru, M., Wanyama, F., Rwetsiba, A., Critchlow, R., and Beale, C. 2016. CAPTURE: A new predictive anti-poaching tool for wildlife protection. In 15th International Conference on Autonomous Agents and Multiagent Systems (AAMAS).
[11]
Nguyen, T. H., Yang, R., Azaria, A., Kraus, S., and Tambe, M. 2013. Analyzing the Effectiveness of Adversary Modeling in Security Games. In Conference on Artificial Intelligence (AAAI).
[12]
Pita, J., Jain, M., Western, C., Portway, C., Tambe, M., Ordonez, F., Kraus, S., and Paruchuri, P. 2008. Deployed ARMOR protection: The application of a game theroetic model for security at the Los Angeles International Airport. In AAMAS.
[13]
Pita, J., John, R., Maheswaran, R., Tambe, M., and Kraus, S. 2012. A Robust Approach to Addressing Human Adversaries in Security Games. In In ECAI.
[14]
Qian, Y., Zhang, C., Krishnamachari, B., And Tambe, M. 2016. Restless Poachers: Handling Exploration-Exploitation Tradeoffs in Security Domains. In AAMAS'16.
[15]
Sinha, A., Kar, D., and Tambe, M. 2016. Learning Adversary Behavior in Security Games: A PAC Model Perspective. In AAMAS'16.
[16]
Tambe, M. 2011. Security and Game Theory: Algorithms, Deployed Systems, Lessons Learned. Cambridge University Press.
[17]
Yang, R., Ford, B., Tambe, M., and Lemieux, A. 2014. Adaptive Resource Allocation for Wildlife Protection against Illegal Poachers. In AAMAS.
[18]
Yang, R., Ordonez, F., and Tambe, M. 2012. Computing Optimal Strategy against Quantal Response in Security Games. In AAMAS'12.

Cited By

View all
  • (2024)Verification of Stochastic Multi-Agent Systems with Forgetful StrategiesProceedings of the 23rd International Conference on Autonomous Agents and Multiagent Systems10.5555/3635637.3662863(160-169)Online publication date: 6-May-2024
  • (2024)Signaling Security Games with Attack Planner DeceptionMathematics10.3390/math1216253212:16(2532)Online publication date: 16-Aug-2024
  • (2024)A survey of decision making in adversarial gamesScience China Information Sciences10.1007/s11432-022-3777-y67:4Online publication date: 4-Feb-2024
  • Show More Cited By

Index Terms

  1. Green security games: apply game theory to addressing green security challenges

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM SIGecom Exchanges
    ACM SIGecom Exchanges  Volume 15, Issue 1
    July 2016
    87 pages
    EISSN:1551-9031
    DOI:10.1145/2994501
    Issue’s Table of Contents

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 06 September 2016
    Published in SIGECOM Volume 15, Issue 1

    Check for updates

    Author Tags

    1. computational sustainability
    2. conservation
    3. game theory
    4. security

    Qualifiers

    • Research-article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)16
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 16 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Verification of Stochastic Multi-Agent Systems with Forgetful StrategiesProceedings of the 23rd International Conference on Autonomous Agents and Multiagent Systems10.5555/3635637.3662863(160-169)Online publication date: 6-May-2024
    • (2024)Signaling Security Games with Attack Planner DeceptionMathematics10.3390/math1216253212:16(2532)Online publication date: 16-Aug-2024
    • (2024)A survey of decision making in adversarial gamesScience China Information Sciences10.1007/s11432-022-3777-y67:4Online publication date: 4-Feb-2024
    • (2023)Two-phase attacks in security gamesProceedings of the Thirty-Ninth Conference on Uncertainty in Artificial Intelligence10.5555/3625834.3625974(1489-1498)Online publication date: 31-Jul-2023
    • (2023)Protecting critical infrastructure with game theory, optimization techniques, and AI algorithmsTerroryzm10.4467/27204383TER.23.029.18331(293-324)Online publication date: 15-Sep-2023
    • (2023)Ochrona infrastruktury krytycznej z wykorzystaniem teorii gier, technik optymalizacji i algorytmów sztucznej inteligencjiTerroryzm10.4467/27204383TER.23.017.18319(13-47)Online publication date: 15-Sep-2023
    • (2022)Robust No-Regret Learning in Min-Max Stackelberg GamesProceedings of the 21st International Conference on Autonomous Agents and Multiagent Systems10.5555/3535850.3535912(543-552)Online publication date: 9-May-2022
    • (2021)Food web conservation vs. strategic threats: A security game approachEcological Modelling10.1016/j.ecolmodel.2021.109426442(109426)Online publication date: Feb-2021
    • (2021)A security game approach for strategic conservation against poaching considering food web complexitiesEcological Complexity10.1016/j.ecocom.2021.10097048(100970)Online publication date: Dec-2021
    • (2020)Mitigating Wild Animals Poaching Through State-of-the-art Multimedia Data Mining Techniques: A ReviewProceedings of the 2020 2nd International Conference on Image Processing and Machine Vision10.1145/3421558.3421584(158-172)Online publication date: 5-Aug-2020
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media