1. bookVolume 13 (2020): Issue 2 (December 2020)
Journal Details
License
Format
Journal
eISSN
1338-4309
ISSN
1337-9038
First Published
03 Aug 2009
Publication timeframe
2 times per year
Languages
English
Open Access

Using Game Theory in Public Domains: The Potential and Limitations of Security Games

Published Online: 10 Dec 2020
Volume & Issue: Volume 13 (2020) - Issue 2 (December 2020)
Page range: 249 - 272
Journal Details
License
Format
Journal
eISSN
1338-4309
ISSN
1337-9038
First Published
03 Aug 2009
Publication timeframe
2 times per year
Languages
English

An, B., E. Shieh, R. Yang, M. Tambe, C. Baldwin, J. DiRenzo, B. Maule and G. Meyer. 2012. “PROTECT: A Deployed Game Theoretic System for Strategic Security Allocation for the United States Coast Guard.” AI MAGAZINE 33(4), 96 – 110, doi: 10.1609/aimag.v33i4.2401.10.1609/aimag.v33i4.2401Search in Google Scholar

Birkland, T. A. 2009. “Disasters, Catastrophes, and Policy Failure in the Homeland Security Era.” Review of Policy Research 26(4), 423 – 438.Search in Google Scholar

Chappell, A. T. and S. A. Gibson. 2009. “Community Policing and Homeland Security Policing Friend or Foe ?” Criminal Justice Policy Review 20(3), 326 – 343.Search in Google Scholar

Clarke, S. E. and E. Chenoweth. 2006. “The Politics of Vulnerability: Constructing Local Performance Regimes for Homeland Security.” Review of Policy Research 23(1), 95 – 114.Search in Google Scholar

Cross, M. K. D. 2007. “An EU Homeland Security ? Sovereignty vs. Supranational Order.” European Security 16(1), 79 – 97.Search in Google Scholar

Danila, V. B. 2013. “Homeland Security: Designing Security in South-East European Countries.” In Editor (ed.). Applied Social Sciences: Economics and Politics. Newcastle upon Tyne: Cambridge Scholars Publishing, 111 – 118.Search in Google Scholar

Donley, M. B. and N. A. Pollard. 2002. “Homeland Security: The Difference between a Vision and a Wish.” Public Administration Review 62 (Special Issue), 138 – 144.Search in Google Scholar

Fang, F. S., Stone, P. and M. Tambe. 2015. “When Security Games Go Green: Designing Defender Strategies to Prevent Poaching and Illegal Fishing.” In Yand, Q. and M. Wooldridge (eds.). Twenty-Fourth International Joint Conference on Artificial Intelligence. Available at https://www.aaai.org/ocs/index.php/IJCAI/IJCAI15/paper/viewFile/10763/11025 (last accessed 7 October 2020).Search in Google Scholar

Friedmann, R. R. and W. J. Cannon. 2007. “Homeland Security and Community Policing: Competing or Complementing Public Safety Policies.” Journal of Homeland Security and Emergency Management 4(4), doi: 10.2202/1547-7355.1371.10.2202/1547-7355.1371Search in Google Scholar

Ge, X., T. Zhou and Y. Zang. 2019. “Defense Strategy Selection Method for Stackelberg Security Game Based on Incomplete Information.” In Tao, Q., Zhou, Y., and Jie Huang (eds.). AICS 2019: Proceedings of the 2019 International Conference on Artificial Intelligence and Computer Science. New York: Association for Computing Machinery, 555 – 561, https://doi.org/10.1145/3349341.3349467 (last accessed 30 April 2020).10.1145/3349341.3349467Search in Google Scholar

Gerber, B. J., D. B. Cohen and K. B. Stewart. 2007. “U.S. Cities and Homeland Security: Examining the Role of Financial Conditions and Administrative Capacity in Municipal Preparedness Efforts.” Public Finance and Management 7(2), 152 – 188.Search in Google Scholar

Jain, M., E. Kardes, C. Kiekintveld, F. Ordóñez and M. Tambe. 2010. “Security Games with Arbitrary Schedules: A Branch and Price Approach.” In Fox, M. and D. Poole (eds.). Proceedings of the Twenty-Fourth AAAI Conference on Artificial Intelligence (AAAI-10). Palo Alto: Association for the Advancement of Artificial Intelligence, 792 – 797, doi: 10.1017/CBO9780511973031.009.10.1017/CBO9780511973031.009Search in Google Scholar

Kamra, N., U. Gupta, F. Fang, Y. Liu and M. Tambe. 2018. “Policy Learning for Continuous Space Security Games Using Neural Networks.” In Zhang, S. (ed.). Proceedings of the 2018 conference of the Association for the Advancement of Artificial Intelligence. Available at https://www.aaai.org/ocs/index.php/AAAI/AAAI18/paper/view/16525 (last accessed 30 April 2020).Search in Google Scholar

Kar, D., T. H. Nguyen, F. Fang, M. Brown, A. Sinha, M. Tambe and A. X. Jiang. 2017. “Trends and Applications in Stackelberg Security Games.” In Baş ar, T. and G. Zaccour (ed.). Handbook of Dynamic Game Theory. Cham: Springer, 1 – 47.Search in Google Scholar

May, P. J., A. E. Jochim and J. Sapotichne. 2011. “Constructing Homeland Security: An Anemic Policy Regime.” The Policy Studies Journal 39(2), 285 – 307.Search in Google Scholar

Morag, N. 2011. “Does Homeland Security Exist Outside the United States ?” Home-land Security Affairs 9(11), 1 – 5.Search in Google Scholar

Noftsinger, J. B., K. F. Newbold and J. K. Wheeler. 2007. Understanding Homeland Security. Basingstoke: Palgrave.10.1057/9780230605114Search in Google Scholar

Okamoto, S., N. Hazon and K. Sycara. 2012. “Solving Non-Zero Sum Multiagent Network Flow Security Games with Attack Costs.” In Albrecht, S. V. and R. Ramamoorthy (eds.). Proceedings of the 11thInternational Conference on Autonomous Agents and Multiagent Systems (AAMAS 2012). Valencia, Spain: International Foundation for Autonomous Agents and Multiagent Systems, 879 – 888). Available at http://www.aamas-conference.org/Proceedings/aamas2012/papers/3E_5.pdf (last accessed 7 October 2020).Search in Google Scholar

Owen, G. 2013. Game Theory. Melbourne: Emerald Group Publishing Limited.Search in Google Scholar

Pita, J., H. Bellamane, M. Jain, Ch. Kiekintveld, J. Tsai, F. Ordónez and M. Tambe. 2009. “Security Applications: Lessons of Real-World Deployment.” ACM SIGecom Exchanges 8(2). Available at https://www.researchgate.net/publication/220553701_Security_applications_Lessons_of_real-world_deployment (last accessed 29 April 2020).10.1145/1980522.1980527Search in Google Scholar

Pita, J., M. Jain, J. Marecki, F. Ordóñez, C. Portway, M. Tambe, C. Western, P. Parachuri and S. Kraus. 2008. “Deployed ARMOR Protection: The Application of a Game Theoretic Model for Security at the Los Angeles International Airport.” In Padgham, L., Parkes, D. and J. P. Muller (eds.). Proceedings of the 7thInternational Conference on Autonomous Agents and Multiagent Systems (AAMAS 2008): Industry and Applications Track. Estoril, Portugal: International Foundation for Autonomous Agents and Multiagent Systems, 125 – 132, doi: 10.1145/1402795.1402819.Search in Google Scholar

Pita, J., M. Tambe, C. Kiekintveld, S. Cullen and E. Steigerwald. 2011. “GUARDS – Game Theoretic Security Allocation on a National Scale.” In Tumer, K., Yolum, P., Sonenberg, L. and P. Stone (eds.). Proceedings of the 10thInternational Conference on Autonomous Agents and Multiagent Systems: Innovative Applications Track (AAMAS 2011). Taipei, Taiwan: International Foundation for Autonomous Agents and Multiagent Systems, 37 – 44, doi: 10.1017/CBO9780511973031.006.10.1017/CBO9780511973031.006Search in Google Scholar

Powell, R. 2007. “Defending against Terrorist Attacks with Limited Resources.” American Political Science Review 101(3), 527 – 541.Search in Google Scholar

Prisner, E. (2014). Game Theory: Th rough Examples. Washington, District of Columbia: Mathematical Association of America.Search in Google Scholar

Reddick, Ch. G. 2008. “Collaboration and Homeland Security Preparedness: A Survey of U.S. City Managers.” Journal of Homeland Security and Emergency Management 5(1), doi: 10.2202/1547-7355.1414.10.2202/1547-7355.1414Search in Google Scholar

Rhinard, M. and A. Boin. 2009. “European Homeland Security: Bureaucratic Politics and Policymaking in the EU.” Journal of Homeland Security and Emergency Management 6(1), doi: 10.2202/1547-7355.1480.10.2202/1547-7355.1480Search in Google Scholar

Ridinger, G., R. S. John, M. McBride and N. Scurich. 2016. “Attacker Deterrence and Perceived Risk in a Stackelberg Security Game.” Risk Analysis 36(8), 1666 – 1681.Search in Google Scholar

Shor, M. 2015. “Dictionary of Game Theory Terms.” Available at http://www.game-theory.net/dictionary/ (last accessed 20 July 2019).Search in Google Scholar

Sinha, A., F. Fang, B. An, Ch. Kiekintveld and M. Tambe. 2018. “Stackelberg Security Games: Looking Beyond a Decade of Success.” In Lang, J. and J. S. Rosenschein (eds.). Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence (IJCAI-18), 5494 – 5501, https://doi.org/10.24963/ijcai.2018/775.10.24963/ijcai.2018/775Search in Google Scholar

Špaček, D. 2020. COVID-19 – National government approach – Czechia. Study prepared for the IIAS Special Report: The COVID-19 Pandemic: Early Lessons for Public Governance (forthcoming).Search in Google Scholar

Tadelis, S. 2013. Game Theory: An Introduction. Princeton: Princeton University Press.Search in Google Scholar

Tambe, M. 2011. Security and Game theory: Algorithms, Deployed Systems, Lessons Learned. Cambridge: Cambridge University Press.10.1109/Allerton.2012.6483443Search in Google Scholar

Trejo, K. K., J. B. Clempner and A. Poznyak. 2015. “A Stackelberg Security Game with Random Strategies Based on the Extraproximal Theoretic Approach.” Engineering Applications of Artificial Intelligence 37, 145 – 153.Search in Google Scholar

Tsai, J., S. Rathi, C. Kiekintveld, F. Ordóñez and M. Tambe. 2009. “IRIS: A Tool for Strategic Security Allocation in Transportation Networks.” In Sierra, C. and C. Castelfranchi (eds.). Proceedings of the 8thInternational Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009). Budapest, Hungary: International Foundation for Autonomous Agents and Multiagent Systems (www.ifaamas.org), doi: 10.1017/cbo9780511973031.005.10.1017/CBO9780511973031.005Search in Google Scholar

Von Neumann, J. 1928. “Zur Theorie der Gesellschaftsspiele.” Mathematische Annalen 100(1), 295 – 320, https://doi.org/10.1007/BF01448847.10.1007/BF01448847Search in Google Scholar

Von Neumann, J., and O. Morgenstern. 1944. Theory of Games and Economic Behavior. Princeton: Princeton University Press.Search in Google Scholar

Von Stackelberg, H. 1934. Marktform und Gleichgewicht. Wien: J. Springer.Search in Google Scholar

Wang, B., Y. Zhang, Z.-H. Zhou and S. Zhong. 2019. “On Repeated Stackelberg Security Game with the Cooperative Human Behavior Model for Wildlife Protection.” Applied Intelligence 49, 1002 – 1015.Search in Google Scholar

Webster, T. J. 2014. Analyzing Strategic Behavior in Business and Economics: A Game Theory Primer. Lanham: Lexington Books.Search in Google Scholar

Wilczyński, A., A. Jakóbik and J. Kołodziej. 2016. “Stackelberg Security Games: Models, Applications and Computational Aspects.” Journal of Telecommunications and Information Technology 3(3): 70 – 79. Available at https://www.itl.waw.pl/czasopisma/JTIT/2016/3/70.pdf (last accessed 8 July 2019).Search in Google Scholar

Yang, R., F. Ordonez and M. Tambe. 2012. “Computing Optimal Strategy against Quantal Response in Security Games.” In Albrecht, S. V. and R. Ramamoorthy (eds.). Proceedings of the 11thInternational Conference on Autonomous Agents and Multiagent Systems (AAMAS 2012). Valencia, Spain: International Foundation for Autonomous Agents and Multiagent Systems, 847 – 854. Available at http://teamcore.usc.edu/papers/2012/aamas2012_paper12_cameraReady.pdf (last accessed 8 July 2019).Search in Google Scholar

Yin, Y., B. An and M. Jain. 2014. “Game-Theoretic Resource Allocation for Protecting Large Public Events.” In Brodley, C. E. and P. Stone (eds.). Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence. Palo Alto: Association for the Advancement of Artificial Intelligence. Available at https://www.aaai.org/ocs/index.php/AAAI/AAAI14/paper/download/8182/8507 (last accessed 8 July 2019).Search in Google Scholar

Yin, Z., A. X. Jiang, M. Tambe, C. Kiekintveld, K. Leyton-Brown, T. Sandholm and J. P. Sullivan. 2012. “TRUSTS: Scheduling Randomized Patrols for Fare Inspection in Transit Systems Using Game Theory.” AI MAGAZINE 33(4): 59 – 72, doi: 10.1609/aimag.v33i4.2432.10.1609/aimag.v33i4.2432Search in Google Scholar

Zhang, C., A. Sinha and M. Tambe. 2015. “Keeping Pace with Criminals: Designing Patrol Allocation against Adaptive Opportunistic Criminals.” In Bazzan, A. and M. Huhns (eds). Proceedings of the 14thInternational Conference on Autonomous Agents and Multiagent Systems (AAMAS 2015). Istanbul, Turkey: International Foundation for Autonomous Agents and Multiagent Systems, 1351 – 1359. Available at http://teamcore.usc.edu/papers/2015/keep_pace_with_criminal.pdf (last accessed 11 February 2020).Search in Google Scholar

Recommended articles from Trend MD

Plan your remote conference with Sciendo