Security and Game Theory
Home > Computing and Information Technology > Computer security > Security and Game Theory: Algorithms, Deployed Systems, Lessons Learned
Security and Game Theory: Algorithms, Deployed Systems, Lessons Learned

Security and Game Theory: Algorithms, Deployed Systems, Lessons Learned


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

Global threats of terrorism, drug-smuggling and other crimes have led to a significant increase in research on game theory for security. Game theory provides a sound mathematical approach to deploy limited security resources to maximize their effectiveness. A typical approach is to randomize security schedules to avoid predictability, with the randomization using artificial intelligence techniques to take into account the importance of different targets and potential adversary reactions. This book distills the forefront of this research to provide the first and only study of long-term deployed applications of game theory for security for key organizations such as the Los Angeles International Airport police and the US Federal Air Marshals Service. The author and his research group draw from their extensive experience working with security officials to intelligently allocate limited security resources to protect targets, outlining the applications of these algorithms in research and the real world.

Table of Contents:
1. Introduction; Part I. Security Experts' Perspective: 2. LAX - terror target: the history, the reason, the countermeasure Erroll Southers; 3. Maritime transportation system security and the use of game theory: a perfect match to address operational and tactical concerns Joe DiRenzo III, Erik Jensen and Fred Bertsch; Part II. Deployed Applications: 4. Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport James Pita, Manish Jain, Craig Western, Praveen Paruchuri, Janusz Marecki, Milind Tambe, Fernando Ordonez and Sarit Kraus; 5. IRIS: a tool for strategic security allocation in transportation networks Jason Tsai, Shyamsunder Rathi, Christopher Kiekintveld, Milind Tambe and Fernando Ordonez; 6. GUARDS - game theoretic security allocation on a national scale James Pita, Christopher Kiekintveld, Milind Tambe, Shane Cullen and Erin Steigerwald; Part III. Efficient Algorithms for Massive Security Games: 7. Coordinating randomized policies for increasing security of agent systems Praveen Paruchuri, Jonathan Pearce, Janusz Marecki, Milind Tambe, Fernando Ordonez and Sarit Kraus; 8. Computing optimal randomized resource allocations for massive security games Christopher Kiekintveld, James Pita, Manish Jain, Jason Tsai, Milind Tambe and Fernando Ordonez; 9. Security games with arbitrary schedules: a branch and price approach Manish Jain, Christopher Kiekintveld, Erim Kardes, Fernando Ordonez and Milind Tambe; Part IV. Future Research: 10. Effective solutions for real-world Stackelberg games: when agents must deal with human uncertainties James Pita, Manish Jain, Milind Tambe, Fernando Ordonez, Sarit Kraus and Romi Magori-Cohen; 11. Robust Bayesian methods for Stackelberg security games Christopher Kiekintveld, Janusz Marecki and Milind Tambe; 12. Stackelberg vs. Nash in security games: interchangeability, equivalence, and uniqueness Zhengyu Yin, Dmytro Korzhyk, Christopher Kiekintveld, Vincent Conitzer and Milind Tambe; 13. Evaluating deployed decision support systems for security: challenges, arguments, and approaches Matthew E. Taylor, Christopher Kiekintveld and Milind Tambe.

About the Author :
Milind Tambe is a Professor of Computer Science and Industrial and Systems Engineering at the University of Southern California (USC). His research is in the area of Artificial Intelligence, specifically agent-based and multi-agent systems. He is a Fellow of the Association for Advancement of Artificial Intelligence and recipient of the Association for Computing Machinery's Autonomous Agents Research Award. He is also the recipient of the Christopher Columbus Fellowship Foundation Homeland Security Award, a special commendation given by the Los Angeles International Airport's police from the city of Los Angeles, the USC Viterbi School of Engineering's use-inspired research award, an Okawa Foundation faculty research award, the RoboCup scientific challenge award, the USC Steven B. Sample Teaching and Mentoring award and the ACM recognition of service award.

Review :
'This exciting book brings together key papers describing important algorithmic advances in computational game theory and the deployed systems for aviation and transportation security that they have enabled. Milind Tambe has been at the forefront of efforts to bring advances in artificial intelligence research to bear on important national security challenges. The lucid presentations he and his co-authors provide of a family of efficient algorithms, which deal with increasingly more complex types of security situations, provide a wonderful and accessible introduction to anyone interested in this important area of research and technology development.' Barbara J. Grosz, Harvard University 'Preventing terrorism is one of the chief challenges facing governments and security organizations across the globe today. The domain of security games provides a reasoned and rational basis on which such organizations can make complex and sensitive decisions, for example about how to allocate scarce security resources most effectively. The present volume presents a comprehensive survey of the state of the art in the theory and practice of security games, including impressive real-world case studies of deployed systems and fascinating perspectives from many of those charged with the task of ensuring our personal safety. It is essential reading for those who want to understand how game theory can be applied to real-world problems of the most challenging kind.' Michael Wooldridge, University of Liverpool 'Professor Tambe and his team have pioneered the development and practical use of modern game-solving techniques for security games. This is an exceptionally good example of game theory truly getting used in practice. Here, computational game solving is being used in the large scale on a daily basis. A wonderful contribution!' Tuomas Sandholm, Carnegie Mellon University 'Although it has long been understood that attack-defense scenarios can be modeled mathematically using game theory, until recently this framework has been employed mainly for analysis of stylized models, yielding useful insights but not detailed solutions for specific security problems. Milind Tambe and his colleagues have demonstrated that game-theoretic reasoning can be deployed by real security organizations for practical, operational decision making. This collection of case studies and explanations of the algorithmic innovations that made them possible will be an invaluable resource for researchers as well as security professionals seeking to allocate security resources according to explicit threat models and strategic principles.' Michael P. Wellman, University of Michigan 'Connecting to deep scientific ideas, Professor Tambe and his team have impacted the way physical infrastructure is being safeguarded in the United States. This book is required reading for those interested in bridging the gap between theory and the real world.' Yoav Shoham, Stanford University


Best Sellers


Product Details
  • ISBN-13: 9780511973031
  • Publisher: Cambridge University Press
  • Publisher Imprint: Cambridge University Press (Virtual Publishing)
  • Language: English
  • ISBN-10: 0511973039
  • Publisher Date: 05 Jan 2012
  • Binding: Digital download and online
  • Sub Title: Algorithms, Deployed Systems, Lessons Learned


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Security and Game Theory: Algorithms, Deployed Systems, Lessons Learned
Cambridge University Press -
Security and Game Theory: Algorithms, Deployed Systems, Lessons Learned
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Security and Game Theory: Algorithms, Deployed Systems, Lessons Learned

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!