Security and Game Theory 2011
DOI: 10.1017/cbo9780511973031.009
|View full text |Cite
|
Sign up to set email alerts
|

Security Games with Arbitrary Schedules: A Branch-and-Price Approach

Abstract: Security games, and important class of Stackelberg games, are used in deployed decision-support tools in use by LAX police and the Federal Air Marshals Service. The algorithms used to solve these games find optimal randomized schedules to allocate security resources for infrastructure protection. Unfortunately, the state of the art algorithms either fail to scale or to provide a correct solution for large problems with arbitrary scheduling constraints. We introduce ASPEN, a branch-and-price approach that overc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
86
0

Year Published

2011
2011
2018
2018

Publication Types

Select...
5
3

Relationship

4
4

Authors

Journals

citations
Cited by 68 publications
(88 citation statements)
references
References 5 publications
0
86
0
Order By: Relevance
“…Problem (16) -(20) has a large number of variables since A is exponentially large. We solve (16) -(20) using a column generation method similar to the one introduced in [6]. We solve a restriction of Problem (16) -(20) with a subset of columns ⊂ A where a is now understood as a vector in a ∈ R |Â| , with a j = 0 for all j with A j / ∈Â.…”
Section: Column Generationmentioning
confidence: 99%
See 1 more Smart Citation
“…Problem (16) -(20) has a large number of variables since A is exponentially large. We solve (16) -(20) using a column generation method similar to the one introduced in [6]. We solve a restriction of Problem (16) -(20) with a subset of columns ⊂ A where a is now understood as a vector in a ∈ R |Â| , with a j = 0 for all j with A j / ∈Â.…”
Section: Column Generationmentioning
confidence: 99%
“…Specifically, we solve Problem (28) using the technique in [6], i.e. we use a maximum reward network flow problem (since Problem (28) is a maximization problem).…”
Section: Column Generationmentioning
confidence: 99%
“…At its backend, IRIS casts the problem it solves as a Stackelberg game and in particular as a security game with a special payoff structure. IRIS uses the Aspen algorithm [3], and is in use by FAMS since 2009.…”
Section: Securitymentioning
confidence: 99%
“…We provide new models and algorithms that compute optimal defender strategies for massive real-world security domains. In particular, we developed: (i) Aspen and Rugged, algorithms that compute the optimal defender strategy with a very large number of pure strategies for both the defender and the attacker [3,5]; (ii) a new hierarchical framework for Bayesian games that can scale-up to large number of attacker types and is applicable to all Stackelberg solvers [4]. Moreover, these algorithms have not only been experimentally validated, but Aspen has also been deployed in the real-world [6].…”
Section: Addressing the Scalability Challengementioning
confidence: 99%
“…The second issue is in efficiently solving the model we developed where, because we consider a national deployment, a specialpurpose solver may not be appropriate. In fact, previous solution techniques [8,9] for traditional security games are no longer directly applicable. The final issue is in knowledge acquisition for the many variables involved in TSA's security challenges.…”
Section: Introductionmentioning
confidence: 99%