Projects per year
Abstract
Game-theoretic security resource allocation problems have generated significant interest in the area of designing and developing security systems. These approaches traditionally utilize the Stackelberg game model for security resource scheduling in order to improve the protection of critical assets. The basic assumption in Stackelberg games is that a defender will act first, then an attacker will choose their best response after observing the defender’s strategy commitment (e.g., protecting a specific asset). Thus, it requires an attacker’s full or partial observation of a defender’s strategy. This assumption is unrealistic in real-time threat recognition and prevention. In this paper, we propose a new solution concept (i.e., a method to predict how a game will be played) for deriving the defender’s optimal strategy based on the principle of acceptable costs of minimax regret. Moreover, we demonstrate the advantages of this solution concept by analyzing its properties.
Original language | English |
---|---|
Title of host publication | Symbolic and Quantitative Approaches to Reasoning with Uncertainty - Proceedings of 13th European Conference, ECSQARU 2015 |
Editors | Sebastien Destercke, Thierry Denoeux |
Publisher | Springer |
Pages | 151-161 |
Number of pages | 11 |
ISBN (Electronic) | 978-3-319-20807-7 |
ISBN (Print) | 978-3-319-20806-0 |
DOIs | |
Publication status | Published - 12 Jul 2015 |
Event | The 13th European Conference on Symbolic and Quantitative Approaches to Reasoning with Uncertainty (ECSQARU) 2015 - Compiegne, France Duration: 15 Jul 2015 → 17 Jul 2015 |
Publication series
Name | Lecture Notes in Artificial Intelligence |
---|---|
ISSN (Print) | 0302-9743 |
Conference
Conference | The 13th European Conference on Symbolic and Quantitative Approaches to Reasoning with Uncertainty (ECSQARU) 2015 |
---|---|
Country/Territory | France |
City | Compiegne |
Period | 15/07/2015 → 17/07/2015 |
Fingerprint
Dive into the research topics of 'Game-theoretic Resource Allocation with Real-time Probabilistic Surveillance Information'. Together they form a unique fingerprint.Projects
- 2 Finished
-
R1070CSC: Providing Autonomous Capabilities for Evolving SCADA (PACES)
Liu, W. (PI), Hong, J. (CoI) & Sezer, S. (CoI)
01/08/2011 → 31/03/2016
Project: Research
-
R1982ECI: Centre for Secure Information Technology
McCanny, J. V. (PI), Cowan, C. (CoI), Crookes, D. (CoI), Fusco, V. (CoI), Linton, D. (CoI), Liu, W. (CoI), Miller, P. (CoI), O'Neill, M. (CoI), Scanlon, W. (CoI) & Sezer, S. (CoI)
01/08/2008 → 31/03/2015
Project: Research