Learning in non-cooperative configurable markov decision processes

G Ramponi, AM Metelli, A Concetti… - Advances in Neural …, 2021 - proceedings.neurips.cc
Abstract The Configurable Markov Decision Process framework includes two entities: a
Reinforcement Learning agent and a configurator that can modify some environmental …

Playing Stackelberg Security Games in perfect formulations

P Bustamante-Faúndez, V Bucarey, M Labbé… - Omega, 2024 - Elsevier
Protecting critical infrastructure from intentional damage requires foreseeing the strategies of
possible attackers. We formulate this problem as a Stackelberg Security Game. A defender …

Cyber camouflage games for strategic deception

O Thakoor, M Tambe, P Vayanos, H Xu… - Decision and Game …, 2019 - Springer
The rapid increase in cybercrime, causing a reported annual economic loss of $600 billion
(Lewis 2018), has prompted a critical need for effective cyber defense. Strategic criminals …

Exploiting bounded rationality in risk-based cyber camouflage games

O Thakoor, S Jabbari, P Aggarwal, C Gonzalez… - Decision and Game …, 2020 - Springer
Recent works have growingly shown that Cyber deception can effectively impede the
reconnaissance efforts of intelligent cyber attackers. Recently proposed models to optimize …

[HTML][HTML] Defense coordination in security games: Equilibrium analysis and mechanism design

J Gan, E Elkind, S Kraus, M Wooldridge - Artificial Intelligence, 2022 - Elsevier
Real-world security scenarios sometimes involve multiple defenders: security agencies of
two or more countries might patrol the same border areas, and domestic security agencies …

Computing the optimal distributionally-robust strategy to commit to

SM Ananthanarayanan, C Kroer - arXiv preprint arXiv:2209.07647, 2022 - arxiv.org
The Stackelberg game model, where a leader commits to a strategy and the follower best
responds, has found widespread application, particularly to security problems. In the security …

On security games with additive utility

H Emadi, S Bhattacharya - IFAC-PapersOnLine, 2019 - Elsevier
In this work, we investigate a security game between an attacker and a defender. We
formulate a zero-sum game in which the payoff matrix has a special structure which results …

Targets in Reinforcement Learning to solve Stackelberg Security Games

S Bandyopadhyay, C Zhu, P Daniel, J Morrison… - arXiv preprint arXiv …, 2022 - arxiv.org
Reinforcement Learning (RL) algorithms have been successfully applied to real world
situations like illegal smuggling, poaching, deforestation, climate change, airport security …

Zero-determinant strategy in stochastic Stackelberg asymmetric security game

Z Cheng, G Chen, Y Hong - Scientific Reports, 2023 - nature.com
In a stochastic Stackelberg asymmetric security game, the strong Stackelberg equilibrium
(SSE) strategy is a popular option for the defender to get the highest utility against an …

Playing Stackelberg Security Games in Perfect Formulations

P Bustamante, V Bucarey, M Labbé, V Marianov… - 2024 - hal.science
Protecting critical infrastructure from intentional damage requires foreseeing the strategies of
possible attackers. The problem faced by the defender of such infrastructure can be …