Skip to main content Accessibility help
×
Hostname: page-component-78c5997874-fbnjt Total loading time: 0 Render date: 2024-11-15T02:13:20.909Z Has data issue: false hasContentIssue false

24 - Methods for Addressing the Unpredictable Real-World Element in Security

Published online by Cambridge University Press:  13 December 2017

Ali E. Abbas
Affiliation:
University of Southern California
Milind Tambe
Affiliation:
University of Southern California
Detlof von Winterfeldt
Affiliation:
University of Southern California
Get access

Summary

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2017

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Abrahms, M. (2008). What terrorists really want: Terrorist motives and counterterrorism strategy. International Security, 32(4), 78105.Google Scholar
Aghassi, M., & Bertsimas, D. (2006). Robust game theory. Mathematical Programming, 107(1), 231273.CrossRefGoogle Scholar
Akaike, H. (1974). A new look at the statistical model identification. Automatic Control, IEEE Transactions on, 19(6), 716–723.CrossRefGoogle Scholar
Allison, G., & Zelikow, P. (1999). Essence of decision: Explaining the Cuban Missile Crisis, 2nd Edition. New York: Longman.Google Scholar
Baron, J. (2008). Thinking and deciding. New York: Cambridge University Press.Google Scholar
Brown, M., Haskell, W. B., & Tambe, M. (2014). Addressing scalability and robustness in security games with multiple boundedly rational adversaries. In International Conference on Decision and Game Theory for Security (pp. 23–42). New York: Springer International Publishing.Google Scholar
Brunswik, E. (1952). The conceptual framework of psychology. Psychological Bulletin, 49(6), 654–656.CrossRefGoogle Scholar
Burnham, K. P., & Anderson, D. R. (2003). Model selection and multimodel inference:A practical information-theoretic approach. Springer Science & Business Media.Google Scholar
Camerer, C. (2003). Behavioral game theory: Experiments in strategic interaction. Princeton, NJ: Princeton University Press.Google Scholar
Conitzer, V., & Sandholm, T. (2006). Computing the optimal strategy to commit to. In ACM EC, 82–90.Google Scholar
Fox, C. R., & Clemen, R. T. (2005). Subjective probability assessment in decision analysis: Partition dependence and bias toward the ignorance prior. Management Science, 51(9), 14171432.CrossRefGoogle Scholar
Fox, C. R., & Rottenstreich, Y. (2003). Partition priming in judgement under uncertainty. Psychological Science, 14, 195200.CrossRefGoogle ScholarPubMed
Gill, P., & Young, J. K. (2011). Comparing role-specific terrorist profiles. http://dx.doi.org/10.2139/ssrn.1782008.Google Scholar
Hammond, K. R. (1955). Probabilistic functioning and the clinical method. Psychological Review, 62(4), 255–262.Google Scholar
Jain, M., Pita, J., Tsai, J., Kiekintveld, C., Rathi, S., Ordóñez, F., & Tambe, M. (2010). Software assistants for patrol planning at LAX and Federal Air Marshals Service. In Interfaces, 40(4), 267–290.CrossRefGoogle Scholar
Kahneman, D., Slovic, P., & Tversky, A. (Editors) (1982). Judgment under uncertainty: Heuristics and biases. New York: Cambridge University Press.CrossRefGoogle Scholar
Kahneman, D., & Tversky, A. (1972). Subjective probability: A judgement of representativeness. Cognitive Psychology, 3, 430454.Google Scholar
Keeney, R. L., & Raiffa, H. (1976). Decisions with multiple objectives: Preferences and value trade-offs. New York: John Wiley & Sons, Inc.Google Scholar
Keeney, G. L., & von Winterfeldt, D. (2010). Identifying and structuring the objectives of terrorists. Risk Analysis, 30(12), 18031816.Google Scholar
Lemieux, A. (2014). Situational prevention of poaching. In Crime Science Series. New York: Routledge.Google Scholar
Luce, R. D. (1959). Individual choice behavior. New York: John Wiley & Sons, Inc.Google Scholar
McCubbins, M. D., Turner, M. B., & Weller, N. (2012). The theory of minds within the theory of games. In Proceedings of the 2012 International Conference on Artificial Intelligence.Google Scholar
McFadden, D. L. (1976). Quantal choice analysis: A survey. Annals of Economic and Social Measurement, 5(4), 363–390.Google Scholar
McFadden, D. (2001). Economic choices. American Economic Review, 91(3), 351–378.CrossRefGoogle Scholar
McKelvey, R., & Palfrey, T. (1995). Quantal response equilibria for normal form games. Games and Economic Behavior, 10(1), 638.Google Scholar
Montibeller, G., & von Winterfeldt, D. (2015). Cognitive and motivational biases in decision and risk analysis. Risk Analysis, 35(7), 1230–1251.Google Scholar
Nickerson, R. S. (1998). Confirmation bias: A ubiquitous phenomenon in many guises. Review of General Psychology, 2(2), 175220.CrossRefGoogle Scholar
Nilim, A., & Ghaoui, L. E. (2005). Robust control in Markov decision problems with uncertain transition matrices. Operations Research, 53(5), 780798.Google Scholar
Nguyen, T. H., Yang, R., Azaria, A., Kraus, S., & Tambe, M. (2013). Analyzing the effectiveness of adversary modeling in security games. In Conference on Artificial Intelligence.CrossRefGoogle Scholar
Nudelman, E., Wortman, J., Shoham, Y., & Leyton-Brown, K. (2004). Run the gamut: A comprehensive approach to evaluating game-theoretic algorithms. In Proceedings of the 3rd International Conference on Autonomous Agents and Multiagent Systems (pp. 880887).Google Scholar
Paruchuri, P., Pearce, J. P., Marecki, J., Tambe, M., Ordonez, F., & Kraus, S. (2008). Playing games with security: An efficient exact algorithm for Bayesian Stackelberg games. In Proceedings of the 7th International Conference on Autonomous Agents and Multiagent Systems.Google Scholar
Phillips, L. D., & Edwards, W. (1966). Conservatism in a simple probability inference task. Journal of Experimental Psychology, 72(3), 346354.Google Scholar
Phillips, L. D., Hays, W. L., & Edwards, W. (1966). Conservatism in complex probabilistic inference. IEEE Transactions on Human Factors in Electronics, 7(1), 718.Google Scholar
Pita, J. Jain, M., Ordóñez, F., Tambe, M., Kraus, S., & Magori-Cohen, R. (2009). Effective solutions for real-world Stackelberg games: When agents must deal with real-world uncertainties. In Proceedings of the 8th International Conference on Autonomous Agents and Multiagent Systems.Google Scholar
Pita, J., Jain, M., Tambe, M., Ordóñez, F., & Kraus, S. (2010). Robust solutions to Stackelberg games: Addressing bounded rationality and limited observations in real-world cognition. Artificial Intelligence Journal, 174(15), 11421171.Google Scholar
Pita, J., Jain, J., Western, C., Portway, C., Tambe, M., Ordóñez, F., Kraus, S., & Paruchuri, P. (2008). Deployed ARMOR protection: The application of a game theoretic model for security at the Los Angeles International Airport. In Proceedings of the 7th International Conference on Autonomous Agents and Multiagent Systems.Google Scholar
Pita, J., John, R., Maheswaran, R., Tambe, M., & Kraus, S. (2012). A robust approach to addressing real-world adversaries in security games. In Proceedings of the 20th European Conference on Artificial Intelligence.Google Scholar
Pogrebin, M. R. (2012). About criminals: A View of the offenders’ world. Thousand Oaks, Ca.: SAGE.Google Scholar
Richardson, L. (2006). What terrorist want: Understanding the enemy, containing the threat. New York: Random House.Google Scholar
Rosoff, H., & John, R. (2009). Decision analysis by proxy for the rational terrorist. In Proceedings of the Workshop on Quantitative Risk Analysis for Security Applications, 2532.Google Scholar
Scholz, F. (1985). Maximum likelihood estimation. Encyclopedia of Statistical Sciences.Google Scholar
See, K. E., Fox, C. R., & Rottenstreich, Y. (2006). Between ignorance and truth: Partition dependence and learning in judgment under uncertainty. Journal of Experimental Psychology: Learning, Memory, and Cognition, 32, 13851402.Google ScholarPubMed
Selten, R. (1988). Evolutionary stability in extensive two-person fames – Correction and further development. Mathematical Social Sciences, 16, 223266.Google Scholar
Shieh, E., An, B., Yang, R., Tambe, M., Baldwin, C., DiRenzo, J., Maule, B., & Meyer, G. (2012). PROTECT: A deployed game theoretic system to protect the ports of the United States. In Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems.Google Scholar
Simon, H. (1956). Rational choice and the structure of the environment. Psychological Review, 63(2), 129138.Google Scholar
Tambe, M. (2011). Security and game theory: algorithms, deployed systems, lessons learned. New York: Cambridge University Press.Google Scholar
Tversky, A., & Kahneman, D. (1974). Judgment under uncertainty: Heuristics and biases. Science, 185, 11241131.Google Scholar
Tversky, A., & Koehler, D. (1994). Support theory: A Nonextensional representation of subjective probability. Psychological Review, 101(4), 547567.Google Scholar
von Stengel, B., & Zamir, S. (2004). Leadership with commitment to mixed strategies. In CDAM Research Report LSE-CDAM-2004-01. London School of Economics.Google Scholar
von Winterfeldt, D., & Edwards, W. (1986). Decision analysis and behavioral research. New York: Cambridge University Press.Google Scholar
Wilcox, R. (2002). Applying contemporary statistical techniques. Academic Press.Google Scholar
Yang, R., Ford, B., Tambe, M., & Lemieux, A. (2014). Adaptive resource allocation for wildlife protection against illegal poachers. In Proceedings of the 13th International Conference on Autonomous Agents and Multiagent Systems.Google Scholar
Yang, R., Kiekintveld, C., Ordóñez, F., Tambe, M., & John, R. (2011). Improving resource allocation strategy against real-world adversaries in security games. In Proceedings of the 20th International Joint Conference on Artificial Intelligence (pp. 458464).Google Scholar
Yang, R., Kiekintveld, C., Ordóñez, F., Tambe, M., & John, R. (2012). Improving resource allocation strategies against human adversaries in security games: An extended study. Artificial Intelligence, 195, 440–469.Google Scholar
Yin, Z., Jain, M., Tambe, M., & Ordóñez, F. (2011). Risk-averse strategies for security games with execution and observational uncertainty. In Proceedings of the 25th AAAI Conference on Artificial Intelligence.Google Scholar
Yin, Z., & Tambe, M. (2012). A Unified Method for Handling Discrete and Continuous Uncertainty in Bayesian Stackelberg Games. In Autonomous Agents and Multiagent Systems.Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×