Synchronization in Security Games

Stefan Rass, Sandra König

Research output: Chapter in Book/Report/Conference proceedingConference proceedingspeer-review

Abstract

Security games often assume a fixed pattern in which players become active, like leader-follower alternation in Stackelberg games or simultaneous moves in Nash games. Stackelberg games are of particular popularity as models for security since they well describe adversaries that adapt to the defender's actions. Games in extensive or normal form herein induce a fixed sequence of when players become active. But why would a player in a security game wait for the opponent's move and not just take further actions to cause more damage or gain more? This work studies generalized interaction patterns motivated from the security context, in which each player can take actions as often as it likes, and receives a payoff from the game upon every activity. The practical scenario motivating this study is an adversary who does not wait for the defender to take action, but rather makes the most of the periods during which the defender is idle. This can mean to learn as possible about the victim system while the defender is not present, or to cause as much damage as possible before the defender can strike back.
Original languageEnglish
Title of host publicationDecision and Game Theory for Security - 13th International Conference, GameSec 2022, Proceedings
EditorsFei Fang, Haifeng Xu, Yezekael Hayel
Place of PublicationCham
PublisherSpringer International Publishing
Pages129 - 148
Number of pages20
ISBN (Print)9783031263682
DOIs
Publication statusPublished - Oct 2023

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume13727 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Fields of science

  • 101017 Game theory
  • 101028 Mathematical modelling
  • 102 Computer Sciences
  • 102016 IT security

JKU Focus areas

  • Digital Transformation
  • Sustainable Development: Responsible Technologies and Management

Cite this