Paper
18 June 2012 Exploiting exploration strategies in repeated normal form security games
James Thomas House, George Cybenko
Author Affiliations +
Abstract
We describe a method for the estimation of an opponent's utility matrix in a finite repeated game, given that he selects his actions by a known deterministic algorithm with some unknown parameters. We also investigate the prediction, based on the utility matrix estimate, of this opponent's future actions, and a simple method by which the opponent can counter these efforts. These are posed as a feasibility problem and a convex optimization problem, respectively. Simulation results are also presented.
© (2012) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
James Thomas House and George Cybenko "Exploiting exploration strategies in repeated normal form security games", Proc. SPIE 8359, Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense XI, 835907 (18 June 2012); https://doi.org/10.1117/12.924760
Lens.org Logo
CITATIONS
Cited by 1 scholarly publication.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Error analysis

Convex optimization

Statistical analysis

Switches

Homeland security

Information security

Matrices

Back to Top