A Security Game Model for Environment Protection in the Presence of an Alarm System

被引:2
|
作者
Basilico, Nicola [1 ]
De Nittis, Giuseppe [2 ]
Gatti, Nicola [2 ]
机构
[1] Univ Milan, Dept Comp Sci, Milan, Italy
[2] Politecn Milan, Dipartimento Elettron Informaz & Bioingn, I-20133 Milan, Italy
关键词
D O I
10.1007/978-3-319-25594-1_11
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We propose, to the best of our knowledge, the first Security Game where a Defender is supported by a spatially uncertain alarm system which non-deterministically generates signals once a target is under attack. Spatial uncertainty is common when securing large environments, e.g., for wildlife protection. We show that finding the equilibrium for this game is FNP-hard even in the zero-sum case and we provide both an exact algorithm and a heuristic algorithm to deal with it. Without false positives and missed detections, the best patrolling strategy reduces to stay in a place, wait for a signal, and respond to it at best. This strategy is optimal even with non-negligible missed detection rates.
引用
收藏
页码:192 / 207
页数:16
相关论文
共 50 条
  • [41] Representation in Agriculture and Environment: Food Security, Conservation, and Protection
    Simonelli, Jeanne
    Paladino, Stephanie
    CULTURE AGRICULTURE FOOD AND ENVIRONMENT, 2015, 37 (02) : 51 - 52
  • [42] A Security Game Combining Patrolling and Alarm-Triggered Responses Under Spatial and Detection Uncertainties
    Basilico, Nicola
    De Nittis, Giuseppe
    Gatti, Nicola
    THIRTIETH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2016, : 397 - 403
  • [43] THE REGIME OF STRAITS: SAFETY, SECURITY AND PROTECTION OF THE MARINE ENVIRONMENT
    Oral, Nilufer
    REGIONS, INSTITUTIONS, AND LAW OF THE SEA: STUDIES IN OCEAN GOVERNANCE, 2013, : 161 - 184
  • [44] The Analysis of University Network Information Security System Based on Level Protection Model
    Xian Weiquan
    Wang Houkui
    He Haoyi
    Zheng Donghong
    PROCEEDINGS OF THE 2012 EIGHTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2012), 2012, : 609 - 614
  • [45] Improving Reliability and Security of System Protection
    Turner, Steve
    2015 68TH ANNUAL CONFERENCE FOR PROTECTIVE RELAY ENGINEERS, 2015, : 629 - 640
  • [46] A MODEL FOR SECURITY AND PROTECTION IN PERSISTENT SYSTEMS
    KEEDY, JL
    MICROPROCESSORS AND MICROSYSTEMS, 1993, 17 (03) : 139 - 146
  • [47] Protection System for Network Boundary Security
    Huang, Xiaobo
    Zhang, Mingxue
    Wang, Xiaoyan
    PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 6, 2010, : 620 - 623
  • [48] SECURITY ANALYSIS FOR ONLINE BANKING SYSTEM USING HIERARCHICAL STOCHASTIC GAME NETS MODEL
    Wang, Yuanzhuo
    Lin, Chuang
    Meng, Kun
    Yang, Hongkun
    Lv, Junjie
    GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 1181 - 1186
  • [49] A generic intrusion detection game model in IT security
    Kantzavelou, Ioanna
    Katsikas, Sokratis
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2008, 5185 : 151 - +
  • [50] Security analysis of Game Changer Password System
    Brumen, Bostjan
    INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2019, 126 : 44 - 52