Security games with ambiguous beliefs of agents

0Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Currently the Dempster- Shafer based algorithm and Uniform Random Probability based algorithm are the preferred methods of resolving security games, in which security forces are able to identify attackers and need only to determine their strategies. However this model is inefficient in situations where resources are limited and both the identity of the attackers and their strategies are ambiguous. The intent of this study is to find a more effective algorithm to guide the security forces in choosing which outside forces with which to cooperate given both ambiguities. We designed an experiment where security forces were compelled to engage with outside forces in order to maximize protection of their targets. We introduced two important notions: the behavior of each agent in target protection and the tolerance threshold in the target protection process. From these, we proposed an algorithm that was applied by each security force to determine the best outside force(s) with which to cooperate. Our results show that our proposed algorithm is safer than the Dempster- Shafer based and Uniform Random Probability based algorithm.

Cite

CITATION STYLE

APA

Khani, H., & Afsharchi, M. (2015). Security games with ambiguous beliefs of agents. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9387, pp. 585–593). Springer Verlag. https://doi.org/10.1007/978-3-319-25524-8_41

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free