Projects per year
Abstract
Security is a critical concern around the world. Since resources for security are always limited, lots of interest have arisen in using game theory to handle security resource allocation problems. However, most of the existing work does not address adequately how a defender chooses his optimal strategy in a game with absent, inaccurate, uncertain, and even ambiguous strategy profiles' payoffs. To address this issue, we propose a general framework of security games under ambiguities based on Dempster-Shafer theory and the ambiguity aversion principle of minimax regret. Then, we reveal some properties of this framework. Also, we present two methods to reduce the influence of complete ignorance. Our investigation shows that this new framework is better in handling security resource allocation problems under ambiguities.
Original language | English |
---|---|
Title of host publication | Proceedings of the Twenty-Third International Joint Conference on Artificial Intelligence |
Editors | Francesca Rossi |
Publisher | International Joint Conference on Artificial Intelligence (IJCAI) |
Pages | 271-278 |
Number of pages | 8 |
ISBN (Print) | 978-1-57735-633-2 |
Publication status | Published - Aug 2013 |
Event | International Joint Conference on Artificial Intelligence, (IJCAI 2013) - Beijing, China Duration: 03 Aug 2013 → 09 Aug 2013 |
Conference
Conference | International Joint Conference on Artificial Intelligence, (IJCAI 2013) |
---|---|
Country/Territory | China |
City | Beijing |
Period | 03/08/2013 → 09/08/2013 |
Keywords
- Security
- Game theory
- Uncertainty
Fingerprint
Dive into the research topics of 'An Ambiguity Aversion Framework of Security Game under Ambiguities'. Together they form a unique fingerprint.Projects
- 2 Finished
-
R1118ECI: Centre for Secure Information Technologies (CSIT)
McCanny, J. V. (PI), Cowan, C. (CoI), Crookes, D. (CoI), Fusco, V. (CoI), Linton, D. (CoI), Liu, W. (CoI), Miller, P. (CoI), O'Neill, M. (CoI), Scanlon, W. (CoI) & Sezer, S. (CoI)
01/08/2009 → 30/06/2014
Project: Research
-
R1982ECI: Centre for Secure Information Technology
McCanny, J. V. (PI), Cowan, C. (CoI), Crookes, D. (CoI), Fusco, V. (CoI), Linton, D. (CoI), Liu, W. (CoI), Miller, P. (CoI), O'Neill, M. (CoI), Scanlon, W. (CoI) & Sezer, S. (CoI)
01/08/2008 → 31/03/2015
Project: Research