Skip to main content

Approximation algorithm for security games with costly resources

Publication ,  Conference
Bhattacharya, S; Conitzer, V; Munagala, K
Published in: Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics
January 1, 2011

In recent years, algorithms for computing game-theoretic solutions have been developed for real-world security domains. These games are between a defender, who must allocate her resources to defend potential targets, and an attacker, who chooses a target to attack. Existing work has assumed the set of defender's resources to be fixed. This assumption precludes the effective use of approximation algorithms, since a slight change in the defender's allocation strategy can result in a massive change in her utility. In contrast, we consider a model where resources are obtained at a cost, initiating the study of the following optimization problem: Minimize the total cost of the purchased resources, given that every target has to be defended with at least a certain probability. We give an efficient logarithmic approximation algorithm for this problem. © 2011 Springer-Verlag Berlin Heidelberg.

Duke Scholars

Published In

Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics

DOI

EISSN

1611-3349

ISSN

0302-9743

Publication Date

January 1, 2011

Volume

7090 LNCS

Start / End Page

13 / 24

Related Subject Headings

  • Artificial Intelligence & Image Processing
  • 46 Information and computing sciences
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Bhattacharya, S., Conitzer, V., & Munagala, K. (2011). Approximation algorithm for security games with costly resources. In Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics (Vol. 7090 LNCS, pp. 13–24). https://doi.org/10.1007/978-3-642-25510-6_2
Bhattacharya, S., V. Conitzer, and K. Munagala. “Approximation algorithm for security games with costly resources.” In Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, 7090 LNCS:13–24, 2011. https://doi.org/10.1007/978-3-642-25510-6_2.
Bhattacharya S, Conitzer V, Munagala K. Approximation algorithm for security games with costly resources. In: Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics. 2011. p. 13–24.
Bhattacharya, S., et al. “Approximation algorithm for security games with costly resources.” Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, vol. 7090 LNCS, 2011, pp. 13–24. Scopus, doi:10.1007/978-3-642-25510-6_2.
Bhattacharya S, Conitzer V, Munagala K. Approximation algorithm for security games with costly resources. Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics. 2011. p. 13–24.

Published In

Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics

DOI

EISSN

1611-3349

ISSN

0302-9743

Publication Date

January 1, 2011

Volume

7090 LNCS

Start / End Page

13 / 24

Related Subject Headings

  • Artificial Intelligence & Image Processing
  • 46 Information and computing sciences