Skip to main content Accessibility help
×
Home
  • Print publication year: 2017
  • Online publication date: December 2017

24 - Methods for Addressing the Unpredictable Real-World Element in Security

Abrahms, M. (2008). What terrorists really want: Terrorist motives and counterterrorism strategy. International Security, 32(4), 78105.
Aghassi, M., & Bertsimas, D. (2006). Robust game theory. Mathematical Programming, 107(1), 231273.
Akaike, H. (1974). A new look at the statistical model identification. Automatic Control, IEEE Transactions on, 19(6), 716–723.
Allison, G., & Zelikow, P. (1999). Essence of decision: Explaining the Cuban Missile Crisis, 2nd Edition. New York: Longman.
Baron, J. (2008). Thinking and deciding. New York: Cambridge University Press.
Brown, M., Haskell, W. B., & Tambe, M. (2014). Addressing scalability and robustness in security games with multiple boundedly rational adversaries. In International Conference on Decision and Game Theory for Security (pp. 23–42). New York: Springer International Publishing.
Brunswik, E. (1952). The conceptual framework of psychology. Psychological Bulletin, 49(6), 654–656.
Burnham, K. P., & Anderson, D. R. (2003). Model selection and multimodel inference:A practical information-theoretic approach. Springer Science & Business Media.
Camerer, C. (2003). Behavioral game theory: Experiments in strategic interaction. Princeton, NJ: Princeton University Press.
Conitzer, V., & Sandholm, T. (2006). Computing the optimal strategy to commit to. In ACM EC, 82–90.
Fox, C. R., & Clemen, R. T. (2005). Subjective probability assessment in decision analysis: Partition dependence and bias toward the ignorance prior. Management Science, 51(9), 14171432.
Fox, C. R., & Rottenstreich, Y. (2003). Partition priming in judgement under uncertainty. Psychological Science, 14, 195200.
Gill, P., & Young, J. K. (2011). Comparing role-specific terrorist profiles. http://dx.doi.org/10.2139/ssrn.1782008.
Hammond, K. R. (1955). Probabilistic functioning and the clinical method. Psychological Review, 62(4), 255–262.
Jain, M., Pita, J., Tsai, J., Kiekintveld, C., Rathi, S., Ordóñez, F., & Tambe, M. (2010). Software assistants for patrol planning at LAX and Federal Air Marshals Service. In Interfaces, 40(4), 267–290.
Kahneman, D., Slovic, P., & Tversky, A. (Editors) (1982). Judgment under uncertainty: Heuristics and biases. New York: Cambridge University Press.
Kahneman, D., & Tversky, A. (1972). Subjective probability: A judgement of representativeness. Cognitive Psychology, 3, 430454.
Keeney, R. L., & Raiffa, H. (1976). Decisions with multiple objectives: Preferences and value trade-offs. New York: John Wiley & Sons, Inc.
Keeney, G. L., & von Winterfeldt, D. (2010). Identifying and structuring the objectives of terrorists. Risk Analysis, 30(12), 18031816.
Lemieux, A. (2014). Situational prevention of poaching. In Crime Science Series. New York: Routledge.
Luce, R. D. (1959). Individual choice behavior. New York: John Wiley & Sons, Inc.
McCubbins, M. D., Turner, M. B., & Weller, N. (2012). The theory of minds within the theory of games. In Proceedings of the 2012 International Conference on Artificial Intelligence.
McFadden, D. L. (1976). Quantal choice analysis: A survey. Annals of Economic and Social Measurement, 5(4), 363–390.
McFadden, D. (2001). Economic choices. American Economic Review, 91(3), 351–378.
McKelvey, R., & Palfrey, T. (1995). Quantal response equilibria for normal form games. Games and Economic Behavior, 10(1), 638.
Montibeller, G., & von Winterfeldt, D. (2015). Cognitive and motivational biases in decision and risk analysis. Risk Analysis, 35(7), 1230–1251.
Nickerson, R. S. (1998). Confirmation bias: A ubiquitous phenomenon in many guises. Review of General Psychology, 2(2), 175220.
Nilim, A., & Ghaoui, L. E. (2005). Robust control in Markov decision problems with uncertain transition matrices. Operations Research, 53(5), 780798.
Nguyen, T. H., Yang, R., Azaria, A., Kraus, S., & Tambe, M. (2013). Analyzing the effectiveness of adversary modeling in security games. In Conference on Artificial Intelligence.
Nudelman, E., Wortman, J., Shoham, Y., & Leyton-Brown, K. (2004). Run the gamut: A comprehensive approach to evaluating game-theoretic algorithms. In Proceedings of the 3rd International Conference on Autonomous Agents and Multiagent Systems (pp. 880887).
Paruchuri, P., Pearce, J. P., Marecki, J., Tambe, M., Ordonez, F., & Kraus, S. (2008). Playing games with security: An efficient exact algorithm for Bayesian Stackelberg games. In Proceedings of the 7th International Conference on Autonomous Agents and Multiagent Systems.
Phillips, L. D., & Edwards, W. (1966). Conservatism in a simple probability inference task. Journal of Experimental Psychology, 72(3), 346354.
Phillips, L. D., Hays, W. L., & Edwards, W. (1966). Conservatism in complex probabilistic inference. IEEE Transactions on Human Factors in Electronics, 7(1), 718.
Pita, J. Jain, M., Ordóñez, F., Tambe, M., Kraus, S., & Magori-Cohen, R. (2009). Effective solutions for real-world Stackelberg games: When agents must deal with real-world uncertainties. In Proceedings of the 8th International Conference on Autonomous Agents and Multiagent Systems.
Pita, J., Jain, M., Tambe, M., Ordóñez, F., & Kraus, S. (2010). Robust solutions to Stackelberg games: Addressing bounded rationality and limited observations in real-world cognition. Artificial Intelligence Journal, 174(15), 11421171.
Pita, J., Jain, J., Western, C., Portway, C., Tambe, M., Ordóñez, F., Kraus, S., & Paruchuri, P. (2008). Deployed ARMOR protection: The application of a game theoretic model for security at the Los Angeles International Airport. In Proceedings of the 7th International Conference on Autonomous Agents and Multiagent Systems.
Pita, J., John, R., Maheswaran, R., Tambe, M., & Kraus, S. (2012). A robust approach to addressing real-world adversaries in security games. In Proceedings of the 20th European Conference on Artificial Intelligence.
Pogrebin, M. R. (2012). About criminals: A View of the offenders’ world. Thousand Oaks, Ca.: SAGE.
Richardson, L. (2006). What terrorist want: Understanding the enemy, containing the threat. New York: Random House.
Rosoff, H., & John, R. (2009). Decision analysis by proxy for the rational terrorist. In Proceedings of the Workshop on Quantitative Risk Analysis for Security Applications, 2532.
Scholz, F. (1985). Maximum likelihood estimation. Encyclopedia of Statistical Sciences.
See, K. E., Fox, C. R., & Rottenstreich, Y. (2006). Between ignorance and truth: Partition dependence and learning in judgment under uncertainty. Journal of Experimental Psychology: Learning, Memory, and Cognition, 32, 13851402.
Selten, R. (1988). Evolutionary stability in extensive two-person fames – Correction and further development. Mathematical Social Sciences, 16, 223266.
Shieh, E., An, B., Yang, R., Tambe, M., Baldwin, C., DiRenzo, J., Maule, B., & Meyer, G. (2012). PROTECT: A deployed game theoretic system to protect the ports of the United States. In Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems.
Simon, H. (1956). Rational choice and the structure of the environment. Psychological Review, 63(2), 129138.
Tambe, M. (2011). Security and game theory: algorithms, deployed systems, lessons learned. New York: Cambridge University Press.
Tversky, A., & Kahneman, D. (1974). Judgment under uncertainty: Heuristics and biases. Science, 185, 11241131.
Tversky, A., & Koehler, D. (1994). Support theory: A Nonextensional representation of subjective probability. Psychological Review, 101(4), 547567.
von Stengel, B., & Zamir, S. (2004). Leadership with commitment to mixed strategies. In CDAM Research Report LSE-CDAM-2004-01. London School of Economics.
von Winterfeldt, D., & Edwards, W. (1986). Decision analysis and behavioral research. New York: Cambridge University Press.
Wilcox, R. (2002). Applying contemporary statistical techniques. Academic Press.
Yang, R., Ford, B., Tambe, M., & Lemieux, A. (2014). Adaptive resource allocation for wildlife protection against illegal poachers. In Proceedings of the 13th International Conference on Autonomous Agents and Multiagent Systems.
Yang, R., Kiekintveld, C., Ordóñez, F., Tambe, M., & John, R. (2011). Improving resource allocation strategy against real-world adversaries in security games. In Proceedings of the 20th International Joint Conference on Artificial Intelligence (pp. 458464).
Yang, R., Kiekintveld, C., Ordóñez, F., Tambe, M., & John, R. (2012). Improving resource allocation strategies against human adversaries in security games: An extended study. Artificial Intelligence, 195, 440–469.
Yin, Z., Jain, M., Tambe, M., & Ordóñez, F. (2011). Risk-averse strategies for security games with execution and observational uncertainty. In Proceedings of the 25th AAAI Conference on Artificial Intelligence.
Yin, Z., & Tambe, M. (2012). A Unified Method for Handling Discrete and Continuous Uncertainty in Bayesian Stackelberg Games. In Autonomous Agents and Multiagent Systems.