Game Theory for Security: Lessons learned from deployed applications

author: Milind Tambe, Computer Science Department, University of Southern California
author: Christopher Kiekintveld, Department of Computer Science, University of Texas at El Paso
published: Sept. 23, 2011,   recorded: July 2011,   views: 961
Categories

Slides

Related content

Report a problem or upload files

If you have found a problem with this lecture or would like to send us extra material, articles, exercises, etc., please use our ticket system to describe your request and upload the data.
Enter your e-mail into the 'Cc' field, and we will keep you updated with your request's status.
Lecture popularity: You need to login to cast your vote.
  Delicious Bibliography

 Watch videos:   (click on thumbnail to launch)

Watch Part 1
Part 1 1:04:16
!NOW PLAYING
Watch Part 2
Part 2 46:05
!NOW PLAYING

Description

Security at infrastructure of economic, political, or symbolic importance is a key concern around the world. Game theory is well-suited to adversarial reasoning for security resource allocation and scheduling problems, and allows us to generate security strategies that are unpredictable, but also based on the information about the relative risks of different kinds of attacks. Many new algorithms and modeling techniques have been developed to support recent real-world applications of game-theoretic analysis in security domains. For instance, the ARMOR system was the first to apply this framework, and has been deployed at the Los Angeles International Airport (LAX) since August 2007 to randomize checkpoints on the roadways entering the airport and canine patrol routes within the airport terminals. The IRIS tool was developed as a game-theoretic scheduler for randomized deployment of the Federal Air Marshals (FAMS). These applications are leading to use-inspired research in scaling up to very compels problems, handling significant adversarial uncertainty, dealing with bounded rationality of human adversaries, and other fundamental challenges.

This tutorial will cover: (i) background on game theory and basic adversarial reasoning techniques; (ii) overview of some fielded applications and a discussion of the key challenges; (iii) an in-depth discussion of the basic algorithmic approaches to solving these games and a brief overview of more advanced techniques and recent results; (iv) discussion of the challenge of modeling different types of uncertainty in security domains and solving the resulting game formulations; and (v) presentation of methods used in evaluation of this research.

See Also:

Download slides icon Download slides: uai2011_tambe_kiekintveld_game.pdf (5.3┬áMB)


Help icon Streaming Video Help

Link this page

Would you like to put a link to this lecture on your homepage?
Go ahead! Copy the HTML snippet !

Write your own review or comment:

make sure you have javascript enabled or clear this field: