在完美公式中玩斯泰克尔伯格安全游戏

IF 6.7 2区 管理学 Q1 MANAGEMENT Omega-international Journal of Management Science Pub Date : 2024-03-02 DOI:10.1016/j.omega.2024.103068
Pamela Bustamante-Faúndez , Víctor Bucarey L. , Martine Labbé , Vladimir Marianov , Fernando Ordoñez
{"title":"在完美公式中玩斯泰克尔伯格安全游戏","authors":"Pamela Bustamante-Faúndez ,&nbsp;Víctor Bucarey L. ,&nbsp;Martine Labbé ,&nbsp;Vladimir Marianov ,&nbsp;Fernando Ordoñez","doi":"10.1016/j.omega.2024.103068","DOIUrl":null,"url":null,"abstract":"<div><p>Protecting critical infrastructure from intentional damage requires foreseeing the strategies of possible attackers. We formulate this problem as a Stackelberg Security Game. A <em>defender</em> must decide which specific targets to protect with limited resources, thus maximizing their expected utility (e.g., minimizing damage value) and considering that a second player (or players), called an <em>attacker</em>, responds in the best possible way.</p><p>Since Stackelberg Security Games are generally NP-hard, the main challenge in finding optimal strategies in real applications is to develop efficient methodologies for large instances.</p><p>We propose a general methodology to find a Strong Stackelberg Equilibrium for Stackelberg Security Games, exploiting the structure in the defender’s strategy set. This methodology consists of two steps. First, we formulate the problem by using variables representing the probability of defending each target. The formulation must be either a polynomial-size MILP and/or an MILP with an exponential number of constraints that are separable in polynomial time through branch-and-cut. In the second step, we recover the mixed strategies in the original space efficiently (in polynomial time) by using column generation. We apply this methodology to various security applications studied in the last decade. We generalize known examples and propose new examples. Finally, we provide an extensive computational study of the various formulations based on marginal probabilities.</p></div>","PeriodicalId":19529,"journal":{"name":"Omega-international Journal of Management Science","volume":null,"pages":null},"PeriodicalIF":6.7000,"publicationDate":"2024-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Playing Stackelberg Security Games in perfect formulations\",\"authors\":\"Pamela Bustamante-Faúndez ,&nbsp;Víctor Bucarey L. ,&nbsp;Martine Labbé ,&nbsp;Vladimir Marianov ,&nbsp;Fernando Ordoñez\",\"doi\":\"10.1016/j.omega.2024.103068\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>Protecting critical infrastructure from intentional damage requires foreseeing the strategies of possible attackers. We formulate this problem as a Stackelberg Security Game. A <em>defender</em> must decide which specific targets to protect with limited resources, thus maximizing their expected utility (e.g., minimizing damage value) and considering that a second player (or players), called an <em>attacker</em>, responds in the best possible way.</p><p>Since Stackelberg Security Games are generally NP-hard, the main challenge in finding optimal strategies in real applications is to develop efficient methodologies for large instances.</p><p>We propose a general methodology to find a Strong Stackelberg Equilibrium for Stackelberg Security Games, exploiting the structure in the defender’s strategy set. This methodology consists of two steps. First, we formulate the problem by using variables representing the probability of defending each target. The formulation must be either a polynomial-size MILP and/or an MILP with an exponential number of constraints that are separable in polynomial time through branch-and-cut. In the second step, we recover the mixed strategies in the original space efficiently (in polynomial time) by using column generation. We apply this methodology to various security applications studied in the last decade. We generalize known examples and propose new examples. Finally, we provide an extensive computational study of the various formulations based on marginal probabilities.</p></div>\",\"PeriodicalId\":19529,\"journal\":{\"name\":\"Omega-international Journal of Management Science\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":6.7000,\"publicationDate\":\"2024-03-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Omega-international Journal of Management Science\",\"FirstCategoryId\":\"91\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0305048324000355\",\"RegionNum\":2,\"RegionCategory\":\"管理学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"MANAGEMENT\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Omega-international Journal of Management Science","FirstCategoryId":"91","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0305048324000355","RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"MANAGEMENT","Score":null,"Total":0}
引用次数: 0

摘要

要保护关键基础设施免遭蓄意破坏,就必须预见到可能的攻击者的策略。我们将这一问题表述为 "堆栈伯格安全博弈"。防御者必须决定用有限的资源保护哪些特定目标,从而使其预期效用最大化(例如,使损害值最小化),并考虑到第二个玩家(或多个玩家),即攻击者、由于 Stackelberg 安全博弈通常是 NP 难的,因此在实际应用中寻找最优策略的主要挑战是为大型实例开发有效的方法。我们提出了一种通用方法,利用防御者策略集的结构,为 Stackelberg 安全博弈寻找强 Stackelberg 均衡。该方法包括两个步骤。首先,我们使用代表防御每个目标概率的变量来表述问题。该表述必须是多项式大小的 MILP 和/或具有指数数量约束条件的 MILP,这些约束条件可通过分支切割法在多项式时间内分离。第二步,我们利用列生成技术在原始空间中高效地(多项式时间内)恢复混合策略。我们将这一方法应用于过去十年中研究的各种安全应用。我们归纳了已知的例子,并提出了新的例子。最后,我们对各种基于边际概率的公式进行了广泛的计算研究。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Playing Stackelberg Security Games in perfect formulations

Protecting critical infrastructure from intentional damage requires foreseeing the strategies of possible attackers. We formulate this problem as a Stackelberg Security Game. A defender must decide which specific targets to protect with limited resources, thus maximizing their expected utility (e.g., minimizing damage value) and considering that a second player (or players), called an attacker, responds in the best possible way.

Since Stackelberg Security Games are generally NP-hard, the main challenge in finding optimal strategies in real applications is to develop efficient methodologies for large instances.

We propose a general methodology to find a Strong Stackelberg Equilibrium for Stackelberg Security Games, exploiting the structure in the defender’s strategy set. This methodology consists of two steps. First, we formulate the problem by using variables representing the probability of defending each target. The formulation must be either a polynomial-size MILP and/or an MILP with an exponential number of constraints that are separable in polynomial time through branch-and-cut. In the second step, we recover the mixed strategies in the original space efficiently (in polynomial time) by using column generation. We apply this methodology to various security applications studied in the last decade. We generalize known examples and propose new examples. Finally, we provide an extensive computational study of the various formulations based on marginal probabilities.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Omega-international Journal of Management Science
Omega-international Journal of Management Science 管理科学-运筹学与管理科学
CiteScore
13.80
自引率
11.60%
发文量
130
审稿时长
56 days
期刊介绍: Omega reports on developments in management, including the latest research results and applications. Original contributions and review articles describe the state of the art in specific fields or functions of management, while there are shorter critical assessments of particular management techniques. Other features of the journal are the "Memoranda" section for short communications and "Feedback", a correspondence column. Omega is both stimulating reading and an important source for practising managers, specialists in management services, operational research workers and management scientists, management consultants, academics, students and research personnel throughout the world. The material published is of high quality and relevance, written in a manner which makes it accessible to all of this wide-ranging readership. Preference will be given to papers with implications to the practice of management. Submissions of purely theoretical papers are discouraged. The review of material for publication in the journal reflects this aim.
期刊最新文献
Editorial Board Unravelling the carbon emissions compliance in sustainable supply chains: The impacts of carbon audit cooperation How groups manage conflict when using model-driven decision support: An epistemic motivation lens Data-driven prioritization strategies for inventory rebalancing in bike-sharing systems Capacitated Mobile Facility Location Problem with Mobile Demand: Efficient relief aid provision to en route refugees
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1