2016
DOI: 10.1007/978-3-319-46840-2_2
|View full text |Cite
|
Sign up to set email alerts
|

Abstraction Methods for Solving Graph-Based Security Games

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 21 publications
0
7
0
Order By: Relevance
“…(Kiekintveld et al 2009;Schlenker et al 2016); or game abstraction -e.g. (Wang et al 2018;Basak et al 2016). Utilization of these techniques requires tailoring a solution method to characteristic game proper-ties, what leads to a highly efficient, though game-dedicated algorithm.…”
Section: Related Workmentioning
confidence: 99%
“…(Kiekintveld et al 2009;Schlenker et al 2016); or game abstraction -e.g. (Wang et al 2018;Basak et al 2016). Utilization of these techniques requires tailoring a solution method to characteristic game proper-ties, what leads to a highly efficient, though game-dedicated algorithm.…”
Section: Related Workmentioning
confidence: 99%
“…Kiekintveld et al (2009); Schlenker et al (2016); or game abstraction -e.g. Wang et al (2018); Basak et al (2016). Utilization of these techniques requires tailoring a solution method to characteristic game properties, what leads to a highly efficient, though game-dedicated algorithm.…”
Section: Related Workmentioning
confidence: 99%
“…Instead of using the double oracle algorithm, there are several works which focus on using abstraction techniques to reduce the strategy space size in structured security game [67][68][69]. Typically, abstraction techniques exploit action space similarity to build a simpler problem and solve it.…”
Section: Stackelberg Security Game On Structured Domainsmentioning
confidence: 99%
“…The abstraction can be lossy or lossless depending on the problem. For example, Basak et al build a small graph with only key nodes on the original graph to compute the defender's patrol strategy on the small graph and then mapping the solution, i.e., paths from key nodes, to the original by selecting the shortest path between key nodes on the original graph [68].…”
Section: Stackelberg Security Game On Structured Domainsmentioning
confidence: 99%
See 1 more Smart Citation