Результаты исследований: Научные публикации в периодических изданиях › статья
A Searcher Versus Hider Game With Incomplete Information About Search Resources. / Garnaev, A.; Fokkink, R.
в: Asia-Pacific Journal of Operational Research, Том 30, № 2, 2013, стр. 1-15.Результаты исследований: Научные публикации в периодических изданиях › статья
}
TY - JOUR
T1 - A Searcher Versus Hider Game With Incomplete Information About Search Resources
AU - Garnaev, A.
AU - Fokkink, R.
PY - 2013
Y1 - 2013
N2 - We introduce a search game in which a hider has partial information about a searcher's resource. The hider can be a terrorist trying to hide and the searcher can be special forces trying to catch him. The terrorist does not know the number of forces involved in the search but just its distribution. We model this situation by a noncooperative game. In a related setup, which is motivated by wireless networks applications, the terrorist inserts a malicious node in a network, reducing network connectivity and thereby undermining its security. Meanwhile, the network operator applies appropriate measures to detect malicious nodes and maintain network performance. We investigate how the information about the total search resources that are available to the hider can influence the behavior of both players. For the case, where the distribution has two mass points, we prove that the game has a unique equilibrium and moreover, we describe explicitly this equilibrium, its structure and some other properties.
AB - We introduce a search game in which a hider has partial information about a searcher's resource. The hider can be a terrorist trying to hide and the searcher can be special forces trying to catch him. The terrorist does not know the number of forces involved in the search but just its distribution. We model this situation by a noncooperative game. In a related setup, which is motivated by wireless networks applications, the terrorist inserts a malicious node in a network, reducing network connectivity and thereby undermining its security. Meanwhile, the network operator applies appropriate measures to detect malicious nodes and maintain network performance. We investigate how the information about the total search resources that are available to the hider can influence the behavior of both players. For the case, where the distribution has two mass points, we prove that the game has a unique equilibrium and moreover, we describe explicitly this equilibrium, its structure and some other properties.
U2 - 10.1142/S0217595912500522
DO - 10.1142/S0217595912500522
M3 - Article
VL - 30
SP - 1
EP - 15
JO - Asia-Pacific Journal of Operational Research
JF - Asia-Pacific Journal of Operational Research
SN - 0217-5959
IS - 2
ER -
ID: 5773444