首页概率论
0


安全博弈论:从部署的应用程序的经验教训

Game Theory for Security: Lessons learned from deployed applications
课程网址: http://videolectures.net/uai2011_tambe_kiekintveld_game/  
主讲教师: Christopher Kiekintveld, Milind Tambe
开课单位: 美国南加州大学
开课时间: 2011-09-23
课程语种: 英语
中文简介:
具有经济,政治或象征意义的基础设施的安全性是全世界关注的一个主要问题。博弈论非常适合安全资源分配和调度问题的对抗性推理,并且允许我们生成不可预测的安全策略,但也基于有关不同类型攻击的相对风险的信息。已经开发了许多新算法和建模技术来支持安全域中游戏理论分析的最新实际应用。例如,ARMOR系统是第一个应用该框架的系统,并且自2007年8月以来一直部署在洛杉矶国际机场(LAX),随机化进入机场的道路检查站和机场航站楼内的犬类巡逻路线。 IRIS工具是作为游戏理论调度程序开发的,用于随机部署联邦空中法警(FAMS)。这些应用程序正在导致使用灵感的研究,扩展到非常强制问题,处理重大的对抗性不确定性,处理人类对手的有限理性以及其他基本挑战。 本教程将包括:(i)博弈论背景和基本对抗推理技巧; (ii)对一些现场应用的概述和对主要挑战的讨论; (iii)深入讨论解决这些游戏的基本算法方法,以及更先进技术和最新结果的简要概述; (iv)讨论对安全领域中不同类型的不确定性进行建模并解决由此产生的游戏规则的挑战; (v)介绍用于评估本研究的方法。
课程简介: Security at infrastructure of economic, political, or symbolic importance is a key concern around the world. Game theory is well-suited to adversarial reasoning for security resource allocation and scheduling problems, and allows us to generate security strategies that are unpredictable, but also based on the information about the relative risks of different kinds of attacks. Many new algorithms and modeling techniques have been developed to support recent real-world applications of game-theoretic analysis in security domains. For instance, the ARMOR system was the first to apply this framework, and has been deployed at the Los Angeles International Airport (LAX) since August 2007 to randomize checkpoints on the roadways entering the airport and canine patrol routes within the airport terminals. The IRIS tool was developed as a game-theoretic scheduler for randomized deployment of the Federal Air Marshals (FAMS). These applications are leading to use-inspired research in scaling up to very compels problems, handling significant adversarial uncertainty, dealing with bounded rationality of human adversaries, and other fundamental challenges. This tutorial will cover: (i) background on game theory and basic adversarial reasoning techniques; (ii) overview of some fielded applications and a discussion of the key challenges; (iii) an in-depth discussion of the basic algorithmic approaches to solving these games and a brief overview of more advanced techniques and recent results; (iv) discussion of the challenge of modeling different types of uncertainty in security domains and solving the resulting game formulations; and (v) presentation of methods used in evaluation of this research.
关 键 词: 博弈论; 不确定性; 资源分配
课程来源: 视频讲座网
最后编审: 2020-06-06:张荧(课程编辑志愿者)
阅读次数: 40