Security and game theory :: algorithms, deployed systems, lessons learned /
"Global threats of terrorism, drug-smuggling and other crimes have led to a significant increase in research on game theory for security. Game theory provides a sound mathematical approach to deploy limited security resources to maximize their effectiveness. A typical approach is to randomize s...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York :
Cambridge University Press,
2012.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "Global threats of terrorism, drug-smuggling and other crimes have led to a significant increase in research on game theory for security. Game theory provides a sound mathematical approach to deploy limited security resources to maximize their effectiveness. A typical approach is to randomize security schedules to avoid predictability, with the randomization using artificial intelligence techniques to take into account the importance of different targets and potential adversary reactions. This book distills the forefront of this research to provide the first and only study of long-term deployed applications of game theory for security for key organizations such as the Los Angeles International Airport police and the US Federal Air Marshals Service. The author and his research group draw from their extensive experience working with security officials to intelligently allocate limited security resources to protect targets, outlining the applications of these algorithms in research and the real world"-- |
Beschreibung: | 1 online resource (xiv, 319 pages :) |
Bibliographie: | Includes bibliographical references (pages 297-310) and index. |
ISBN: | 9781139206600 1139206605 9780511973031 0511973039 9781139205023 1139205021 1316090442 9781316090442 1280484640 9781280484643 9786613579621 6613579629 1139205811 9781139205818 1139203622 9781139203623 1139202219 9781139202213 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn776163672 | ||
003 | OCoLC | ||
005 | 20240705115654.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 120213s2012 nyua ob 001 0 eng d | ||
040 | |a N$T |b eng |e rda |e pn |c N$T |d UIU |d YDXCP |d OCLCQ |d OCLCF |d OCLCQ |d GZN |d HEBIS |d OCLCO |d OCLCA |d UAB |d OCLCQ |d OCLCA |d INT |d OCLCQ |d UKAHL |d OL$ |d OCLCQ |d MM9 |d VLY |d OCLCQ |d OCLCO |d SFB |d OCLCQ |d OCLCO |d OCLCL |d OCLCQ |d OCLCO | ||
019 | |a 1162084433 |a 1171379106 |a 1241836204 | ||
020 | |a 9781139206600 |q (electronic bk.) | ||
020 | |a 1139206605 |q (electronic bk.) | ||
020 | |a 9780511973031 |q (electronic bk.) | ||
020 | |a 0511973039 |q (electronic bk.) | ||
020 | |a 9781139205023 |q (electronic bk.) | ||
020 | |a 1139205021 |q (electronic bk.) | ||
020 | |a 1316090442 | ||
020 | |a 9781316090442 | ||
020 | |a 1280484640 | ||
020 | |a 9781280484643 | ||
020 | |a 9786613579621 | ||
020 | |a 6613579629 | ||
020 | |a 1139205811 | ||
020 | |a 9781139205818 | ||
020 | |a 1139203622 | ||
020 | |a 9781139203623 | ||
020 | |a 1139202219 | ||
020 | |a 9781139202213 | ||
020 | |z 9781107096424 | ||
020 | |z 1107096421 | ||
035 | |a (OCoLC)776163672 |z (OCoLC)1162084433 |z (OCoLC)1171379106 |z (OCoLC)1241836204 | ||
050 | 4 | |a QA76.9.M35 |b T36 2012eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 23 | |
084 | |a COM053000 |2 bisacsh | ||
049 | |a MAIN | ||
100 | 1 | |a Tambe, Milind, |d 1965- |1 https://id.oclc.org/worldcat/entity/E39PBJvXk8rxWBKKqW8FgxXjmd | |
245 | 1 | 0 | |a Security and game theory : |b algorithms, deployed systems, lessons learned / |c Milind Tambe. |
264 | 1 | |a New York : |b Cambridge University Press, |c 2012. | |
300 | |a 1 online resource (xiv, 319 pages :) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
504 | |a Includes bibliographical references (pages 297-310) and index. | ||
505 | 0 | 0 | |g 1. |t Introduction and overview of security games / |r Milind Tambe and Maish Jain -- |g Part I. |t Security Experts' Perspective: |g 2. |t LAX: terror target: the history, the reason, the countermeasure / |r Erroll Southers; |g 3. |t Maritime transportation system security and the use of game theory: a perfect match to address operational and tactical concerns / |r Joe DiRenzo III, Ben Maule, Erik Jensen and Fred Bertsch IV -- |g Part II. |t Deployed Applications: g4. Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport / |r James Pita [and others]; |g 5. |t IRIS: a tool for strategic security allocation in transportation networks / |r Jason Tsai [and others]; |g 6. |t GUARDS: game theoretic security allocation on a national scale / |r James Pita [and others] -- |g Part III. |t Efficient Algorithms for Massive Security Games: |g 7. |t Coordinating randomized policies for increasing security of agent systems / |r Praveen Paruchuri [and others]; |g 8. |t Computing optimal randomized resource allocations for massive security games / |r Christopher Kiekintveld [and others]; |g 9. |t Security games with arbitrary schedules: a branch-and-price approach / |r Manish Jain [and others] -- |g Part IV. |t Future Research: |g 10. |t Effective solutions for real-world Stackelberg games: when agents must deal with human uncertainties / |r James Pita; |g 11. |t Approximation methods for infinite Bayesian Stackelberg games: modeling distributional payoff uncertainty / |r Christopher Kiekintveld, Janusz Marecki and Milind Tambe; |g 12. Stackelberg versus Nash in security games: interchangeability, equivalence, and uniqueness / |r Zhengyu Yin [and others]; |g 13. |t Evaluating deployed decision-support systems for security: challenges, arguments, and approaches / |r Matthew E. Taylor, Christopher Kiekintveld and Milind Tambe. |
520 | |a "Global threats of terrorism, drug-smuggling and other crimes have led to a significant increase in research on game theory for security. Game theory provides a sound mathematical approach to deploy limited security resources to maximize their effectiveness. A typical approach is to randomize security schedules to avoid predictability, with the randomization using artificial intelligence techniques to take into account the importance of different targets and potential adversary reactions. This book distills the forefront of this research to provide the first and only study of long-term deployed applications of game theory for security for key organizations such as the Los Angeles International Airport police and the US Federal Air Marshals Service. The author and his research group draw from their extensive experience working with security officials to intelligently allocate limited security resources to protect targets, outlining the applications of these algorithms in research and the real world"-- |c Provided by publisher | ||
588 | 0 | |a Print version record. | |
546 | |a English. | ||
650 | 0 | |a Computer security. | |
650 | 0 | |a Game theory. |0 http://id.loc.gov/authorities/subjects/sh85052941 | |
650 | 0 | |a Security, International |x Mathematical models. | |
650 | 2 | |a Computer Security |0 https://id.nlm.nih.gov/mesh/D016494 | |
650 | 2 | |a Game Theory |0 https://id.nlm.nih.gov/mesh/D005716 | |
650 | 6 | |a Sécurité informatique. | |
650 | 6 | |a Théorie des jeux. | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Game theory |2 fast | |
650 | 7 | |a Security, International |x Mathematical models |2 fast | |
650 | 7 | |a Spieltheorie |2 gnd |0 http://d-nb.info/gnd/4056243-8 | |
650 | 7 | |a Computersicherheit |2 gnd | |
650 | 7 | |a Mathematisches Modell |2 gnd |0 http://d-nb.info/gnd/4114528-8 | |
650 | 7 | |a Terrorismus |2 gnd |0 http://d-nb.info/gnd/4059534-1 | |
650 | 7 | |a Sicherheit |2 gnd |0 http://d-nb.info/gnd/4054790-5 | |
758 | |i has work: |a Security and game theory (Text) |1 https://id.oclc.org/worldcat/entity/E39PCFDyX3BRFwH66Q8HHpCvVy |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Tambe, Milind, 1965- |t Security and game theory. |d New York : Cambridge University Press, 2012 |z 9781107096424 |w (DLC) 2011038733 |w (OCoLC)751798356 |
856 | 1 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=414519 |3 Volltext | |
856 | 1 | |l CBO01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=414519 |3 Volltext | |
938 | |a Askews and Holts Library Services |b ASKH |n AH21302475 | ||
938 | |a Askews and Holts Library Services |b ASKH |n AH26478988 | ||
938 | |a EBSCOhost |b EBSC |n 414519 | ||
938 | |a YBP Library Services |b YANK |n 7480657 | ||
938 | |a YBP Library Services |b YANK |n 7462621 | ||
938 | |a YBP Library Services |b YANK |n 7349768 | ||
938 | |a YBP Library Services |b YANK |n 7429386 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn776163672 |
---|---|
_version_ | 1813903427517808640 |
adam_text | |
any_adam_object | |
author | Tambe, Milind, 1965- |
author_additional | Milind Tambe and Maish Jain -- Erroll Southers; Joe DiRenzo III, Ben Maule, Erik Jensen and Fred Bertsch IV -- James Pita [and others]; Jason Tsai [and others]; James Pita [and others] -- Praveen Paruchuri [and others]; Christopher Kiekintveld [and others]; Manish Jain [and others] -- James Pita; Christopher Kiekintveld, Janusz Marecki and Milind Tambe; Zhengyu Yin [and others]; Matthew E. Taylor, Christopher Kiekintveld and Milind Tambe. |
author_facet | Tambe, Milind, 1965- |
author_role | |
author_sort | Tambe, Milind, 1965- |
author_variant | m t mt |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.M35 T36 2012eb |
callnumber-search | QA76.9.M35 T36 2012eb |
callnumber-sort | QA 276.9 M35 T36 42012EB |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Introduction and overview of security games / Security Experts' Perspective: LAX: terror target: the history, the reason, the countermeasure / Maritime transportation system security and the use of game theory: a perfect match to address operational and tactical concerns / Deployed Applications: g4. Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport / IRIS: a tool for strategic security allocation in transportation networks / GUARDS: game theoretic security allocation on a national scale / Efficient Algorithms for Massive Security Games: Coordinating randomized policies for increasing security of agent systems / Computing optimal randomized resource allocations for massive security games / Security games with arbitrary schedules: a branch-and-price approach / Future Research: Effective solutions for real-world Stackelberg games: when agents must deal with human uncertainties / Approximation methods for infinite Bayesian Stackelberg games: modeling distributional payoff uncertainty / Evaluating deployed decision-support systems for security: challenges, arguments, and approaches / |
ctrlnum | (OCoLC)776163672 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06825cam a2200949 i 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn776163672</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20240705115654.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">120213s2012 nyua ob 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">UIU</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">GZN</subfield><subfield code="d">HEBIS</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCA</subfield><subfield code="d">UAB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCA</subfield><subfield code="d">INT</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UKAHL</subfield><subfield code="d">OL$</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">MM9</subfield><subfield code="d">VLY</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">SFB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">1162084433</subfield><subfield code="a">1171379106</subfield><subfield code="a">1241836204</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781139206600</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1139206605</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780511973031</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0511973039</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781139205023</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1139205021</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1316090442</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781316090442</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1280484640</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781280484643</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786613579621</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6613579629</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1139205811</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781139205818</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1139203622</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781139203623</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1139202219</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781139202213</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781107096424</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1107096421</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)776163672</subfield><subfield code="z">(OCoLC)1162084433</subfield><subfield code="z">(OCoLC)1171379106</subfield><subfield code="z">(OCoLC)1241836204</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.M35</subfield><subfield code="b">T36 2012eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">COM053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Tambe, Milind,</subfield><subfield code="d">1965-</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PBJvXk8rxWBKKqW8FgxXjmd</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security and game theory :</subfield><subfield code="b">algorithms, deployed systems, lessons learned /</subfield><subfield code="c">Milind Tambe.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York :</subfield><subfield code="b">Cambridge University Press,</subfield><subfield code="c">2012.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xiv, 319 pages :)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (pages 297-310) and index.</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="g">1.</subfield><subfield code="t">Introduction and overview of security games /</subfield><subfield code="r">Milind Tambe and Maish Jain --</subfield><subfield code="g">Part I.</subfield><subfield code="t">Security Experts' Perspective:</subfield><subfield code="g">2.</subfield><subfield code="t">LAX: terror target: the history, the reason, the countermeasure /</subfield><subfield code="r">Erroll Southers;</subfield><subfield code="g">3.</subfield><subfield code="t">Maritime transportation system security and the use of game theory: a perfect match to address operational and tactical concerns /</subfield><subfield code="r">Joe DiRenzo III, Ben Maule, Erik Jensen and Fred Bertsch IV --</subfield><subfield code="g">Part II.</subfield><subfield code="t">Deployed Applications: g4. Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport /</subfield><subfield code="r">James Pita [and others];</subfield><subfield code="g">5.</subfield><subfield code="t">IRIS: a tool for strategic security allocation in transportation networks /</subfield><subfield code="r">Jason Tsai [and others];</subfield><subfield code="g">6.</subfield><subfield code="t">GUARDS: game theoretic security allocation on a national scale /</subfield><subfield code="r">James Pita [and others] --</subfield><subfield code="g">Part III.</subfield><subfield code="t">Efficient Algorithms for Massive Security Games:</subfield><subfield code="g">7.</subfield><subfield code="t">Coordinating randomized policies for increasing security of agent systems /</subfield><subfield code="r">Praveen Paruchuri [and others];</subfield><subfield code="g">8.</subfield><subfield code="t">Computing optimal randomized resource allocations for massive security games /</subfield><subfield code="r">Christopher Kiekintveld [and others];</subfield><subfield code="g">9.</subfield><subfield code="t">Security games with arbitrary schedules: a branch-and-price approach /</subfield><subfield code="r">Manish Jain [and others] --</subfield><subfield code="g">Part IV.</subfield><subfield code="t">Future Research:</subfield><subfield code="g">10.</subfield><subfield code="t">Effective solutions for real-world Stackelberg games: when agents must deal with human uncertainties /</subfield><subfield code="r">James Pita;</subfield><subfield code="g">11.</subfield><subfield code="t">Approximation methods for infinite Bayesian Stackelberg games: modeling distributional payoff uncertainty /</subfield><subfield code="r">Christopher Kiekintveld, Janusz Marecki and Milind Tambe;</subfield><subfield code="g">12. Stackelberg versus Nash in security games: interchangeability, equivalence, and uniqueness /</subfield><subfield code="r">Zhengyu Yin [and others];</subfield><subfield code="g">13.</subfield><subfield code="t">Evaluating deployed decision-support systems for security: challenges, arguments, and approaches /</subfield><subfield code="r">Matthew E. Taylor, Christopher Kiekintveld and Milind Tambe.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Global threats of terrorism, drug-smuggling and other crimes have led to a significant increase in research on game theory for security. Game theory provides a sound mathematical approach to deploy limited security resources to maximize their effectiveness. A typical approach is to randomize security schedules to avoid predictability, with the randomization using artificial intelligence techniques to take into account the importance of different targets and potential adversary reactions. This book distills the forefront of this research to provide the first and only study of long-term deployed applications of game theory for security for key organizations such as the Los Angeles International Airport police and the US Federal Air Marshals Service. The author and his research group draw from their extensive experience working with security officials to intelligently allocate limited security resources to protect targets, outlining the applications of these algorithms in research and the real world"--</subfield><subfield code="c">Provided by publisher</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Game theory.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85052941</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Security, International</subfield><subfield code="x">Mathematical models.</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D016494</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Game Theory</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D005716</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Théorie des jeux.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Game theory</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Security, International</subfield><subfield code="x">Mathematical models</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Spieltheorie</subfield><subfield code="2">gnd</subfield><subfield code="0">http://d-nb.info/gnd/4056243-8</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="2">gnd</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Mathematisches Modell</subfield><subfield code="2">gnd</subfield><subfield code="0">http://d-nb.info/gnd/4114528-8</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Terrorismus</subfield><subfield code="2">gnd</subfield><subfield code="0">http://d-nb.info/gnd/4059534-1</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Sicherheit</subfield><subfield code="2">gnd</subfield><subfield code="0">http://d-nb.info/gnd/4054790-5</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Security and game theory (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCFDyX3BRFwH66Q8HHpCvVy</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Tambe, Milind, 1965-</subfield><subfield code="t">Security and game theory.</subfield><subfield code="d">New York : Cambridge University Press, 2012</subfield><subfield code="z">9781107096424</subfield><subfield code="w">(DLC) 2011038733</subfield><subfield code="w">(OCoLC)751798356</subfield></datafield><datafield tag="856" ind1="1" ind2=" "><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=414519</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="1" ind2=" "><subfield code="l">CBO01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=414519</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH21302475</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH26478988</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">414519</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">7480657</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">7462621</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">7349768</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">7429386</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn776163672 |
illustrated | Illustrated |
indexdate | 2024-10-25T16:18:31Z |
institution | BVB |
isbn | 9781139206600 1139206605 9780511973031 0511973039 9781139205023 1139205021 1316090442 9781316090442 1280484640 9781280484643 9786613579621 6613579629 1139205811 9781139205818 1139203622 9781139203623 1139202219 9781139202213 |
language | English |
oclc_num | 776163672 |
open_access_boolean | |
owner | MAIN |
owner_facet | MAIN |
physical | 1 online resource (xiv, 319 pages :) |
psigel | ZDB-4-EBA |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Cambridge University Press, |
record_format | marc |
spelling | Tambe, Milind, 1965- https://id.oclc.org/worldcat/entity/E39PBJvXk8rxWBKKqW8FgxXjmd Security and game theory : algorithms, deployed systems, lessons learned / Milind Tambe. New York : Cambridge University Press, 2012. 1 online resource (xiv, 319 pages :) text txt rdacontent computer c rdamedia online resource cr rdacarrier Includes bibliographical references (pages 297-310) and index. 1. Introduction and overview of security games / Milind Tambe and Maish Jain -- Part I. Security Experts' Perspective: 2. LAX: terror target: the history, the reason, the countermeasure / Erroll Southers; 3. Maritime transportation system security and the use of game theory: a perfect match to address operational and tactical concerns / Joe DiRenzo III, Ben Maule, Erik Jensen and Fred Bertsch IV -- Part II. Deployed Applications: g4. Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport / James Pita [and others]; 5. IRIS: a tool for strategic security allocation in transportation networks / Jason Tsai [and others]; 6. GUARDS: game theoretic security allocation on a national scale / James Pita [and others] -- Part III. Efficient Algorithms for Massive Security Games: 7. Coordinating randomized policies for increasing security of agent systems / Praveen Paruchuri [and others]; 8. Computing optimal randomized resource allocations for massive security games / Christopher Kiekintveld [and others]; 9. Security games with arbitrary schedules: a branch-and-price approach / Manish Jain [and others] -- Part IV. Future Research: 10. Effective solutions for real-world Stackelberg games: when agents must deal with human uncertainties / James Pita; 11. Approximation methods for infinite Bayesian Stackelberg games: modeling distributional payoff uncertainty / Christopher Kiekintveld, Janusz Marecki and Milind Tambe; 12. Stackelberg versus Nash in security games: interchangeability, equivalence, and uniqueness / Zhengyu Yin [and others]; 13. Evaluating deployed decision-support systems for security: challenges, arguments, and approaches / Matthew E. Taylor, Christopher Kiekintveld and Milind Tambe. "Global threats of terrorism, drug-smuggling and other crimes have led to a significant increase in research on game theory for security. Game theory provides a sound mathematical approach to deploy limited security resources to maximize their effectiveness. A typical approach is to randomize security schedules to avoid predictability, with the randomization using artificial intelligence techniques to take into account the importance of different targets and potential adversary reactions. This book distills the forefront of this research to provide the first and only study of long-term deployed applications of game theory for security for key organizations such as the Los Angeles International Airport police and the US Federal Air Marshals Service. The author and his research group draw from their extensive experience working with security officials to intelligently allocate limited security resources to protect targets, outlining the applications of these algorithms in research and the real world"-- Provided by publisher Print version record. English. Computer security. Game theory. http://id.loc.gov/authorities/subjects/sh85052941 Security, International Mathematical models. Computer Security https://id.nlm.nih.gov/mesh/D016494 Game Theory https://id.nlm.nih.gov/mesh/D005716 Sécurité informatique. Théorie des jeux. COMPUTERS Security General. bisacsh COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh Computer security fast Game theory fast Security, International Mathematical models fast Spieltheorie gnd http://d-nb.info/gnd/4056243-8 Computersicherheit gnd Mathematisches Modell gnd http://d-nb.info/gnd/4114528-8 Terrorismus gnd http://d-nb.info/gnd/4059534-1 Sicherheit gnd http://d-nb.info/gnd/4054790-5 has work: Security and game theory (Text) https://id.oclc.org/worldcat/entity/E39PCFDyX3BRFwH66Q8HHpCvVy https://id.oclc.org/worldcat/ontology/hasWork Print version: Tambe, Milind, 1965- Security and game theory. New York : Cambridge University Press, 2012 9781107096424 (DLC) 2011038733 (OCoLC)751798356 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=414519 Volltext CBO01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=414519 Volltext |
spellingShingle | Tambe, Milind, 1965- Security and game theory : algorithms, deployed systems, lessons learned / Introduction and overview of security games / Security Experts' Perspective: LAX: terror target: the history, the reason, the countermeasure / Maritime transportation system security and the use of game theory: a perfect match to address operational and tactical concerns / Deployed Applications: g4. Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport / IRIS: a tool for strategic security allocation in transportation networks / GUARDS: game theoretic security allocation on a national scale / Efficient Algorithms for Massive Security Games: Coordinating randomized policies for increasing security of agent systems / Computing optimal randomized resource allocations for massive security games / Security games with arbitrary schedules: a branch-and-price approach / Future Research: Effective solutions for real-world Stackelberg games: when agents must deal with human uncertainties / Approximation methods for infinite Bayesian Stackelberg games: modeling distributional payoff uncertainty / Evaluating deployed decision-support systems for security: challenges, arguments, and approaches / Computer security. Game theory. http://id.loc.gov/authorities/subjects/sh85052941 Security, International Mathematical models. Computer Security https://id.nlm.nih.gov/mesh/D016494 Game Theory https://id.nlm.nih.gov/mesh/D005716 Sécurité informatique. Théorie des jeux. COMPUTERS Security General. bisacsh COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh Computer security fast Game theory fast Security, International Mathematical models fast Spieltheorie gnd http://d-nb.info/gnd/4056243-8 Computersicherheit gnd Mathematisches Modell gnd http://d-nb.info/gnd/4114528-8 Terrorismus gnd http://d-nb.info/gnd/4059534-1 Sicherheit gnd http://d-nb.info/gnd/4054790-5 |
subject_GND | http://id.loc.gov/authorities/subjects/sh85052941 https://id.nlm.nih.gov/mesh/D016494 https://id.nlm.nih.gov/mesh/D005716 http://d-nb.info/gnd/4056243-8 http://d-nb.info/gnd/4114528-8 http://d-nb.info/gnd/4059534-1 http://d-nb.info/gnd/4054790-5 |
title | Security and game theory : algorithms, deployed systems, lessons learned / |
title_alt | Introduction and overview of security games / Security Experts' Perspective: LAX: terror target: the history, the reason, the countermeasure / Maritime transportation system security and the use of game theory: a perfect match to address operational and tactical concerns / Deployed Applications: g4. Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport / IRIS: a tool for strategic security allocation in transportation networks / GUARDS: game theoretic security allocation on a national scale / Efficient Algorithms for Massive Security Games: Coordinating randomized policies for increasing security of agent systems / Computing optimal randomized resource allocations for massive security games / Security games with arbitrary schedules: a branch-and-price approach / Future Research: Effective solutions for real-world Stackelberg games: when agents must deal with human uncertainties / Approximation methods for infinite Bayesian Stackelberg games: modeling distributional payoff uncertainty / Evaluating deployed decision-support systems for security: challenges, arguments, and approaches / |
title_auth | Security and game theory : algorithms, deployed systems, lessons learned / |
title_exact_search | Security and game theory : algorithms, deployed systems, lessons learned / |
title_full | Security and game theory : algorithms, deployed systems, lessons learned / Milind Tambe. |
title_fullStr | Security and game theory : algorithms, deployed systems, lessons learned / Milind Tambe. |
title_full_unstemmed | Security and game theory : algorithms, deployed systems, lessons learned / Milind Tambe. |
title_short | Security and game theory : |
title_sort | security and game theory algorithms deployed systems lessons learned |
title_sub | algorithms, deployed systems, lessons learned / |
topic | Computer security. Game theory. http://id.loc.gov/authorities/subjects/sh85052941 Security, International Mathematical models. Computer Security https://id.nlm.nih.gov/mesh/D016494 Game Theory https://id.nlm.nih.gov/mesh/D005716 Sécurité informatique. Théorie des jeux. COMPUTERS Security General. bisacsh COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh Computer security fast Game theory fast Security, International Mathematical models fast Spieltheorie gnd http://d-nb.info/gnd/4056243-8 Computersicherheit gnd Mathematisches Modell gnd http://d-nb.info/gnd/4114528-8 Terrorismus gnd http://d-nb.info/gnd/4059534-1 Sicherheit gnd http://d-nb.info/gnd/4054790-5 |
topic_facet | Computer security. Game theory. Security, International Mathematical models. Computer Security Game Theory Sécurité informatique. Théorie des jeux. COMPUTERS Security General. COMPUTERS Internet Security. COMPUTERS Networking Security. Computer security Game theory Security, International Mathematical models Spieltheorie Computersicherheit Mathematisches Modell Terrorismus Sicherheit |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=414519 |
work_keys_str_mv | AT tambemilind securityandgametheoryalgorithmsdeployedsystemslessonslearned |