Adversarial patrolling with spatially uncertain alarm signals

[1]  William L. Maxwell,et al.  Theory of scheduling , 1967 .

[2]  David S. Johnson,et al.  Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .

[3]  Martin W. P. Savelsbergh,et al.  Local search in routing problems with time windows , 1984 .

[4]  Mihalis Yannakakis,et al.  The Traveling Salesman Problem with Distances One and Two , 1993, Math. Oper. Res..

[5]  Adam Meyerson,et al.  Approximation algorithms for deadline-TSP and vehicle routing with time-windows , 2004, STOC '04.

[6]  B. Stengel,et al.  Leadership with commitment to mixed strategies , 2004 .

[7]  Guido Proietti,et al.  Reusing Optimal TSP Solutions for Locally Modified Input Instances , 2006, IFIP TCS.

[8]  Vincent Conitzer,et al.  Computing the optimal strategy to commit to , 2006, EC '06.

[9]  Juraj Hromkovic,et al.  The Parameterized Approximability of TSP with Deadlines , 2007, Theory of Computing Systems.

[10]  Sarit Kraus,et al.  Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS.

[11]  Yoav Shoham,et al.  Multiagent Systems - Algorithmic, Game-Theoretic, and Logical Foundations , 2009 .

[12]  Sarit Kraus,et al.  Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS 2008.

[13]  Nicola Basilico,et al.  Capturing augmented sensing capabilities and intrusion delay in patrolling-intrusion games , 2009, 2009 IEEE Symposium on Computational Intelligence and Games.

[14]  Manish Jain,et al.  Computing optimal randomized resource allocations for massive security games , 2009, AAMAS.

[15]  Nicola Basilico,et al.  Extending Algorithms for Mobile Robot Patrolling in the Presence of Adversaries to More Realistic Settings , 2009, 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology.

[16]  Noa Agmon On events in multi-robot patrol in adversarial environments , 2010, AAMAS.

[17]  Nicola Basilico,et al.  Asynchronous Multi-Robot Patrolling against Intrusions in Arbitrary Topologies , 2010, AAAI.

[18]  Vincent Conitzer,et al.  Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness , 2011, J. Artif. Intell. Res..

[19]  Milind Tambe,et al.  Security and Game Theory: IRIS – A Tool for Strategic Security Allocation in Transportation Networks , 2011, AAMAS 2011.

[20]  Bo An,et al.  Refinement of Strong Stackelberg Equilibria in Security Games , 2011, AAAI.

[21]  Manish Jain,et al.  Quality-bounded solutions for finite Bayesian Stackelberg games: scaling up , 2011, AAMAS.

[22]  M. Dufwenberg Game theory. , 2011, Wiley interdisciplinary reviews. Cognitive science.

[23]  Ian F. Akyildiz,et al.  BorderSense: Border patrol through advanced wireless sensor networks , 2011, Ad Hoc Networks.

[24]  Steve Alpern,et al.  Patrolling Games , 2011, Oper. Res..

[25]  Andreas Krause,et al.  Randomized Sensing in Adversarial Environments , 2011, IJCAI.

[26]  Sarit Kraus,et al.  Multi-Robot Adversarial Patrolling: Facing a Full-Knowledge Opponent , 2011, J. Artif. Intell. Res..

[27]  Antonio-Javier Garcia-Sanchez,et al.  Wireless sensor network deployment for integrating video-surveillance and data-monitoring in precision agriculture over distributed crops , 2011 .

[28]  Christine Julien,et al.  On coordination in practical multi-robot patrol , 2012, 2012 IEEE International Conference on Robotics and Automation.

[29]  Nicola Basilico,et al.  Patrolling security games: Definition and algorithms for solving large instances with single patroller and single intruder , 2012, Artif. Intell..

[30]  Bo An,et al.  An Overview of Recent Application Trends at the AAMAS Conference: Security, Sustainability and Safety , 2012, AI Mag..

[31]  Bo An,et al.  PROTECT - A Deployed Game Theoretic System for Strategic Security Allocation for the United States Coast Guard , 2012, AI Mag..

[32]  Bo An,et al.  An extended study on multi-objective security games , 2012, Autonomous Agents and Multi-Agent Systems.

[33]  Rong Yang,et al.  Scaling-up Security Games with Boundedly Rational Adversaries: A Cutting-plane Approach , 2013, IJCAI.

[34]  Nicholas R. Jennings,et al.  Introducing Alarms in Adversarial Patrolling Games , 2013 .

[35]  ByoungChul Ko,et al.  Spatiotemporal bag-of-features for early wildfire smoke detection , 2013, Image Vis. Comput..

[36]  Bo An,et al.  Security games with surveillance cost and optimal timing of attack execution , 2013, AAMAS.

[37]  Bo An,et al.  A Deployed Quantal Response-Based Patrol Planning System for the U.S. Coast Guard , 2013, Interfaces.

[38]  Rekha Jain,et al.  Wireless Sensor Network -A Survey , 2013 .

[39]  Amos Azaria,et al.  Analyzing the Effectiveness of Adversary Modeling in Security Games , 2013, AAAI.

[40]  Manish Jain,et al.  Efficiently Solving Joint Activity Based Security Games , 2013, IJCAI.

[41]  Stefano Carpin,et al.  Distributed Online Patrolling with Multi-agent Teams of Sentinels and Searchers , 2014, DARS.

[42]  Rong Yang,et al.  PAWS: adaptive game-theoretic patrolling for wildlife protection , 2014, AAMAS.

[43]  Nicola Basilico,et al.  Strategic guard placement for optimal response toalarms in security games , 2014, AAMAS.

[44]  Bruce Bueno de Mesquita,et al.  An Introduction to Game Theory , 2014 .

[45]  Milind Tambe,et al.  Game-Theoretic Security Patrolling with Dynamic Execution Uncertainty and a Case Study on a Real Transit System , 2014 .

[46]  Sarit Kraus,et al.  Multi-robot adversarial patrolling: facing coordinated attacks , 2014, AAMAS.

[47]  Milind Tambe,et al.  Game-Theoretic Target Selection in Contagion-Based Domains , 2014, Comput. J..

[48]  Bo An,et al.  Computing Solutions in Infinite-Horizon Discounted Adversarial Patrolling Games , 2014, ICAPS.

[49]  Rong Yang,et al.  Adaptive resource allocation for wildlife protection against illegal poachers , 2014, AAMAS.

[50]  Ariel D. Procaccia,et al.  Lazy Defenders Are Almost Optimal against Diligent Attackers , 2014, AAAI.

[51]  Bo An,et al.  Security Games with Protection Externalities , 2015, AAAI.

[52]  Nicola Basilico,et al.  Multi-resource defensive strategies for patrolling games with alarm systems , 2016, ArXiv.

[53]  Nicola Basilico,et al.  A Security Game Combining Patrolling and Alarm-Triggered Responses Under Spatial and Detection Uncertainties , 2016, AAAI.