Access the full text.
Sign up today, get DeepDyve free for 14 days.
T. Nguyen, F. Fave, Debarun Kar, A. Lakshminarayanan, A. Yadav, Milind Tambe, Noam Agmon, A. Plumptre, M. Driciru, F. Wanyama, A. Rwetsiba (2015)
Making the Most of Our Regrets: Regret-Based Solutions to Handle Payoff Uncertainty and Elicitation in Green Security Games
Fei Fang, A. Jiang, Milind Tambe (2013)
Optimal patrol strategy for protecting moving targets with multiple mobile resources
Debarun Kar, Fei Fang, F. Fave, Nicole Sintov, Milind Tambe (2015)
"A Game of Thrones": When Human Behavior Models Compete in Repeated Stackelberg Security Games
T. Nguyen, Rong Yang, A. Azaria, Sarit Kraus, Milind Tambe (2013)
Analyzing the Effectiveness of Adversary Modeling in Security GamesProceedings of the AAAI Conference on Artificial Intelligence
Nika Haghtalab, Fei Fang, T. Nguyen, Arunesh Sinha, A. Procaccia, Milind Tambe (2016)
Three Strategies to Success: Learning Adversary Models in Security Games
Fei Fang, P. Stone, Milind Tambe (2015)
When Security Games Go Green: Designing Defender Strategies to Prevent Poaching and Illegal Fishing
Rong Yang, Benjamin Ford, Milind Tambe, A. Lemieux (2014)
Adaptive resource allocation for wildlife protection against illegal poachers
Fei Fang, T. Nguyen, R. Pickles, Wai Lam, G. Clements, Bo An, Amandeep Singh, Milind Tambe, A. Lemieux (2016)
Deploying PAWS: Field Optimization of the Protection Assistant for Wildlife Security
Yundi Qian, Chao Zhang, B. Krishnamachari, Milind Tambe (2016)
Restless Poachers: Handling Exploration-Exploitation Tradeoffs in Security Domains
T. Nguyen, Arunesh Sinha, Shahrzad Gholami, A. Plumptre, L. Joppa, Milind Tambe, M. Driciru, F. Wanyama, A. Rwetsiba, Rob Critchlow, C. Beale (2016)
CAPTURE: A New Predictive Anti-Poaching Tool for Wildlife Protection
W. Haskell, Debarun Kar, Fei Fang, Milind Tambe, Sam Cheung, Elizabeth Denicola (2014)
Robust Protection of Fisheries with COmPASS
Rong Yang, F. Ordóñez, Milind Tambe (2012)
Computing optimal strategy against quantal response in security games
Fei Fang, A. Jiang, Milind Tambe (2013)
Protecting Moving Targets with Multiple Mobile ResourcesJ. Artif. Intell. Res., 48
J. Pita, Manish Jain, J. Marecki, F. Ordóñez, Christopher Portway, Milind Tambe, Craig Western, P. Paruchuri, Sarit Kraus (2008)
Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport
Arunesh Sinha, Debarun Kar, Milind Tambe (2015)
Learning Adversary Behavior in Security Games: A PAC Model PerspectiveArXiv, abs/1511.00043
S. McCarthy, Milind Tambe, Christopher Kiekintveld, Meredith Gore, Alexander Killion (2016)
Preventing Illegal Logging: Simultaneous Optimization of Resource Teams and Tactics for Security
Milind Tambe (2011)
Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned
Bo An, J. Pita, E. Shieh, Milind Tambe, Christopher Kiekintveld, J. Marecki (2011)
GUARDS and PROTECT: next generation applications of security gamesSIGecom Exch., 10
J. Pita, R. John, R. Maheswaran, Milind Tambe, Rong Yang, Sarit Kraus (2012)
A robust approach to addressing human adversaries in security games
Green Security Games: Apply Game Theory to Addressing Green Security Challenges FEI FANG University of Southern California and THANH H. NGUYEN University of Southern California In the past decade, game-theoretic applications have been successfully deployed in the real world to address security resource allocation challenges. Inspired by the success, researchers have begun focusing on applying game theory to green security domains such as protection of forests, fish, and wildlife, forming a stream of research on Green Security Games (GSGs). We provide an overview of recent advances in GSGs and list the challenges that remained open for future study. Categories and Subject Descriptors: I.2.11 [Distributed Artificial Intelligence]: Multiagent systems-- General Terms: Security, Human factors, Algorithms Additional Key Words and Phrases: Security, Game Theory, Conservation, Computational Sustainability 1. INTRODUCTION Green security domains, including protecting the forest from illegal logging, protecting endangered wildlife from poaching, and protecting fish stocks from illegal fishing, are critical domains for environmental sustainability. For example, poaching has led to the population drop of tigers and other key species, presenting a significant threat to the whole ecosystem. Illegal logging is a major problem for many developing countries, with severe economic and environmental impacts. In these domains, law
ACM SIGecom Exchanges – Association for Computing Machinery
Published: Sep 6, 2016
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.