{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:19:14Z","timestamp":1750306754626,"version":"3.41.0"},"reference-count":11,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2013,6,1]],"date-time":"2013-06-01T00:00:00Z","timestamp":1370044800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGecom Exch."],"published-print":{"date-parts":[[2013,6]]},"abstract":"<jats:p>We present two new critical domains where security games are applied to generate randomized patrol schedules. For each setting, we present the current research that we have produced. We then propose two new challenges to build accurate schedules that can be deployed effectively in the real world. The first is a planning challenge. Current schedules cannot handle interruptions. Thus, more expressive models, that allow for reasoning over stochastic actions, are needed. The second is a learning challenge. In several security domains, data can be used to extract information about both the environment and the attacker. This information can then be used to improve the defender's strategies.<\/jats:p>","DOI":"10.1145\/2509013.2509019","type":"journal-article","created":{"date-parts":[[2013,8,1]],"date-time":"2013-08-01T15:14:00Z","timestamp":1375370040000},"page":"38-41","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Planning and learning in security games"],"prefix":"10.1145","volume":"12","author":[{"given":"Francesco M.","family":"Delle Fave","sequence":"first","affiliation":[{"name":"University of Southern California"}]},{"given":"Yundi","family":"Qian","sequence":"additional","affiliation":[{"name":"University of Southern California"}]},{"given":"Albert X.","family":"Jiang","sequence":"additional","affiliation":[{"name":"University of Southern California"}]},{"given":"Matthew","family":"Brown","sequence":"additional","affiliation":[{"name":"University of Southern California"}]},{"given":"Milind","family":"Tambe","sequence":"additional","affiliation":[{"name":"University of Southern California"}]}],"member":"320","published-online":{"date-parts":[[2013,6]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134707.1134717"},{"volume-title":"International Conference on Autonomous Agents and Multiagent Systems (AAMAS).","author":"Jain M.","key":"e_1_2_1_2_1"},{"volume-title":"Int. Conf. on Autonomous Agents and Multiagent Systems.","author":"Jain M.","key":"e_1_2_1_3_1"},{"volume-title":"International Conference on Autonomous Agents and Multiagent Systems (AAMAS).","author":"Jiang A. X.","key":"e_1_2_1_4_1"},{"volume-title":"Conference on Artificial Intelligence (AAAI).","author":"Johnson M. P.","key":"e_1_2_1_5_1"},{"volume-title":"Conf. on Artificial Intelligence (AAAI).","author":"Nguyen T. H.","key":"e_1_2_1_6_1"},{"key":"e_1_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Tambe M. 2011. Security and Game Theory: Algorithms Deployed Systems Lessons Learned. Cambridge University Press.   Tambe M. 2011. Security and Game Theory: Algorithms Deployed Systems Lessons Learned . Cambridge University Press.","DOI":"10.1017\/CBO9780511973031"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/2283396.2283471"},{"volume-title":"Conference on Artificial Intelligence (AAAI).","author":"Yin Z.","key":"e_1_2_1_9_1"},{"volume-title":"Conference on Innovative Applications of Artificial Intelligence (IAAI).","author":"Yin Z.","key":"e_1_2_1_10_1"},{"volume-title":"International Conference on Autonomous Agents and Multiagent Systems (AAMAS).","author":"Yin Z.","key":"e_1_2_1_11_1"}],"container-title":["ACM SIGecom Exchanges"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2509013.2509019","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2509013.2509019","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:28:34Z","timestamp":1750231714000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2509013.2509019"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":11,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,6]]}},"alternative-id":["10.1145\/2509013.2509019"],"URL":"https:\/\/doi.org\/10.1145\/2509013.2509019","relation":{},"ISSN":["1551-9031"],"issn-type":[{"type":"electronic","value":"1551-9031"}],"subject":[],"published":{"date-parts":[[2013,6]]},"assertion":[{"value":"2013-06-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}