{"id":"https://openalex.org/W1963993304","doi":"https://doi.org/10.1109/allerton.2012.6483443","title":"Game theory for security: Key algorithmic principles, deployed systems, lessons learned","display_name":"Game theory for security: Key algorithmic principles, deployed systems, lessons learned","publication_year":2012,"publication_date":"2012-10-01","ids":{"openalex":"https://openalex.org/W1963993304","doi":"https://doi.org/10.1109/allerton.2012.6483443","mag":"1963993304"},"language":"en","primary_location":{"id":"doi:10.1109/allerton.2012.6483443","is_oa":false,"landing_page_url":"https://doi.org/10.1109/allerton.2012.6483443","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5000327528","display_name":"Milind Tambe","orcid":"https://orcid.org/0000-0003-3296-3672"},"institutions":[{"id":"https://openalex.org/I1174212","display_name":"University of Southern California","ror":"https://ror.org/03taz7m60","country_code":"US","type":"education","lineage":["https://openalex.org/I1174212"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Milind Tambe","raw_affiliation_strings":["University of Southern California, Los Angeles, CA, USA","Univ. of Southern California, Los Angeles, CA 90089, USA"],"affiliations":[{"raw_affiliation_string":"University of Southern California, Los Angeles, CA, USA","institution_ids":["https://openalex.org/I1174212"]},{"raw_affiliation_string":"Univ. of Southern California, Los Angeles, CA 90089, USA","institution_ids":["https://openalex.org/I1174212"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044987162","display_name":"Manish Jain","orcid":"https://orcid.org/0000-0002-3535-0030"},"institutions":[{"id":"https://openalex.org/I1174212","display_name":"University of Southern California","ror":"https://ror.org/03taz7m60","country_code":"US","type":"education","lineage":["https://openalex.org/I1174212"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Manish Jain","raw_affiliation_strings":["University of Southern California, Los Angeles, CA, USA","Univ. of Southern California, Los Angeles, CA 90089, USA"],"affiliations":[{"raw_affiliation_string":"University of Southern California, Los Angeles, CA, USA","institution_ids":["https://openalex.org/I1174212"]},{"raw_affiliation_string":"Univ. of Southern California, Los Angeles, CA 90089, USA","institution_ids":["https://openalex.org/I1174212"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068919916","display_name":"James Pita","orcid":null},"institutions":[{"id":"https://openalex.org/I1174212","display_name":"University of Southern California","ror":"https://ror.org/03taz7m60","country_code":"US","type":"education","lineage":["https://openalex.org/I1174212"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"James Adam Pita","raw_affiliation_strings":["University of Southern California, Los Angeles, CA, USA","Univ. of Southern California, Los Angeles, CA 90089, USA"],"affiliations":[{"raw_affiliation_string":"University of Southern California, Los Angeles, CA, USA","institution_ids":["https://openalex.org/I1174212"]},{"raw_affiliation_string":"Univ. of Southern California, Los Angeles, CA 90089, USA","institution_ids":["https://openalex.org/I1174212"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103591438","display_name":"Albert Xin Jiang","orcid":null},"institutions":[{"id":"https://openalex.org/I1174212","display_name":"University of Southern California","ror":"https://ror.org/03taz7m60","country_code":"US","type":"education","lineage":["https://openalex.org/I1174212"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Albert Xin Jiang","raw_affiliation_strings":["University of Southern California, Los Angeles, CA, USA","Univ. of Southern California, Los Angeles, CA 90089, USA"],"affiliations":[{"raw_affiliation_string":"University of Southern California, Los Angeles, CA, USA","institution_ids":["https://openalex.org/I1174212"]},{"raw_affiliation_string":"Univ. of Southern California, Los Angeles, CA 90089, USA","institution_ids":["https://openalex.org/I1174212"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5000327528"],"corresponding_institution_ids":["https://openalex.org/I1174212"],"apc_list":null,"apc_paid":null,"fwci":10.2448,"has_fulltext":false,"cited_by_count":38,"citation_normalized_percentile":{"value":0.97953414,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1822","last_page":"1829"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11807","display_name":"Infrastructure Resilience and Vulnerability Analysis","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11807","display_name":"Infrastructure Resilience and Vulnerability Analysis","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9905999898910522,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7374944686889648},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6228398084640503},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5878945589065552},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.5621039867401123},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.5503933429718018},{"id":"https://openalex.org/keywords/stackelberg-competition","display_name":"Stackelberg competition","score":0.510408341884613},{"id":"https://openalex.org/keywords/predictability","display_name":"Predictability","score":0.4991133213043213},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.45285066962242126},{"id":"https://openalex.org/keywords/security-through-obscurity","display_name":"Security through obscurity","score":0.44810691475868225},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.42363569140434265},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.30726081132888794},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.307092547416687},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.14371603727340698},{"id":"https://openalex.org/keywords/economics","display_name":"Economics","score":0.08003982901573181},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.07750636339187622}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7374944686889648},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6228398084640503},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5878945589065552},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.5621039867401123},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.5503933429718018},{"id":"https://openalex.org/C199510392","wikidata":"https://www.wikidata.org/wiki/Q1184602","display_name":"Stackelberg competition","level":2,"score":0.510408341884613},{"id":"https://openalex.org/C197640229","wikidata":"https://www.wikidata.org/wiki/Q2534066","display_name":"Predictability","level":2,"score":0.4991133213043213},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.45285066962242126},{"id":"https://openalex.org/C114869243","wikidata":"https://www.wikidata.org/wiki/Q133735","display_name":"Security through obscurity","level":5,"score":0.44810691475868225},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.42363569140434265},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.30726081132888794},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.307092547416687},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.14371603727340698},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.08003982901573181},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.07750636339187622},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C144237770","wikidata":"https://www.wikidata.org/wiki/Q747534","display_name":"Mathematical economics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/allerton.2012.6483443","is_oa":false,"landing_page_url":"https://doi.org/10.1109/allerton.2012.6483443","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":55,"referenced_works":["https://openalex.org/W25032824","https://openalex.org/W34952362","https://openalex.org/W49431805","https://openalex.org/W62682045","https://openalex.org/W69361866","https://openalex.org/W138212348","https://openalex.org/W1533392841","https://openalex.org/W1592657892","https://openalex.org/W1597982198","https://openalex.org/W1601460292","https://openalex.org/W1643208677","https://openalex.org/W1664863697","https://openalex.org/W1762430620","https://openalex.org/W1968909445","https://openalex.org/W1971309210","https://openalex.org/W1977562524","https://openalex.org/W2000822214","https://openalex.org/W2070924607","https://openalex.org/W2071639381","https://openalex.org/W2098696428","https://openalex.org/W2099746148","https://openalex.org/W2103446323","https://openalex.org/W2107381919","https://openalex.org/W2109100253","https://openalex.org/W2110504778","https://openalex.org/W2111995023","https://openalex.org/W2129749009","https://openalex.org/W2133469585","https://openalex.org/W2136087829","https://openalex.org/W2144975751","https://openalex.org/W2148534455","https://openalex.org/W2161161075","https://openalex.org/W2162089947","https://openalex.org/W2164945937","https://openalex.org/W2165702433","https://openalex.org/W2185022076","https://openalex.org/W2186819766","https://openalex.org/W2264897026","https://openalex.org/W2469736176","https://openalex.org/W2752384799","https://openalex.org/W3011865677","https://openalex.org/W3136977693","https://openalex.org/W3139108896","https://openalex.org/W4211043782","https://openalex.org/W4295847151","https://openalex.org/W4366084930","https://openalex.org/W6601986030","https://openalex.org/W6602491251","https://openalex.org/W6635813883","https://openalex.org/W6637043351","https://openalex.org/W6675345730","https://openalex.org/W6684107065","https://openalex.org/W6684153292","https://openalex.org/W6686252246","https://openalex.org/W6687252794"],"related_works":["https://openalex.org/W2165898552","https://openalex.org/W2353811196","https://openalex.org/W2336014427","https://openalex.org/W2397931496","https://openalex.org/W2353177111","https://openalex.org/W2030343105","https://openalex.org/W2372674753","https://openalex.org/W833563683","https://openalex.org/W88610236","https://openalex.org/W2290724697"],"abstract_inverted_index":{"Security":[0],"is":[1],"a":[2,70],"critical":[3],"concern":[4],"around":[5],"the":[6,40,43,46,67,101,109],"world.":[7],"In":[8],"many":[9],"security":[10,13,17,47,63,90,119],"domains,":[11],"limited":[12,24],"resources":[14,25],"prevent":[15],"full":[16],"coverage":[18],"at":[19],"all":[20],"times;":[21],"instead,":[22],"these":[23,114],"must":[26],"be":[27],"scheduled,":[28],"avoiding":[29],"schedule":[30],"predictability,":[31],"while":[32],"simultaneously":[33],"taking":[34],"into":[35],"account":[36],"different":[37],"target":[38],"priorities,":[39],"responses":[41],"of":[42,105,132],"adversaries":[44],"to":[45,96,121],"posture":[48],"and":[49,135],"potential":[50],"uncertainty":[51],"over":[52,83],"adversary":[53],"types.":[54],"Computational":[55],"game":[56],"theory":[57],"can":[58],"help":[59],"design":[60],"such":[61],"unpredictable":[62],"schedules.":[64],"Indeed,":[65],"casting":[66],"problem":[68],"as":[69],"Bayesian":[71],"Stackelberg":[72],"game,":[73],"we":[74],"have":[75],"developed":[76],"new":[77],"algorithms":[78],"that":[79],"are":[80,94],"now":[81],"deployed":[82],"multiple":[84,87],"years":[85],"in":[86,100],"applications":[88,93,115],"for":[89],"scheduling.":[91],"These":[92],"leading":[95],"real-world":[97],"use-inspired":[98],"research":[99,103,110],"emerging":[102],"area":[104],"\u201csecurity":[106],"games\u201d":[107],"specifically,":[108],"challenges":[111],"posed":[112],"by":[113],"include":[116],"scaling":[117],"up":[118],"games":[120],"large-scale":[122],"problems,":[123],"handling":[124],"significant":[125],"adversarial":[126],"uncertainty,":[127],"dealing":[128],"with":[129],"bounded":[130],"rationality":[131],"human":[133],"adversaries,":[134],"other":[136],"interdisciplinary":[137],"challenges.":[138]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":8},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":9},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
