【24h】

Security Games for Controlling Contagion

机译:控制传染的安全游戏

获取原文

摘要

Many strategic actions carry a 'contagious' component beyond the immediate locale of the effort itself. Viral marketing and peacekeeping operations have both been observed to have a spreading effect. In this work, we use counterinsurgency as our illustrative domain. Defined as the effort to block the spread of support for an insurgency, such operations lack the manpower to defend the entire population and must focus on the opinions of a subset of local leaders. As past researchers of security resource allocation have done, we propose using game theory to develop such policies and model the interconnected network of leaders as a graph. Unlike this past work in security games, actions in these domains possess a probabilistic, non-local impact. To address this new class of security games, we combine recent research in influence blocking maximization with a double oracle approach and create novel heuristic oracles to generate mixed strategies for a real-world leadership network from Afghanistan, synthetic leadership networks, and a real social network. We find that leadership networks that exhibit highly interconnected clusters can be solved equally well by our heuristic methods, but our more sophisticated heuristics outperform simpler ones in less interconnected social networks.
机译:许多战略行动所具有的“传染性”成分超出了其本身的直接作用范围。病毒式营销和维持和平行动都被发现具有传播作用。在这项工作中,我们将平叛性作为说明性领域。这种行动被定义为阻止对叛乱分子的支持扩散的努力,缺乏捍卫整个人民的人力,必须集中于一部分地方领导人的​​意见。正如过去安全资源分配的研究人员所做的那样,我们建议使用博弈论来制定此类策略,并以图形方式对领导者的互连网络进行建模。与过去在安全游戏中的工作不同,在这些领域中的动作具有概率性的,非本地性的影响。为了解决这类新的安全游戏,我们将近期在影响力最大化方面的研究与双重预言相结合,并创建了新颖的启发式预言机,以生成来自阿富汗的现实世界的领导网络,综合领导网络和真实的社交网络的混合策略。 。我们发现,可以通过我们的启发式方法同样很好地解决展现高度相互联系的集群的领导力网络,但是在联系较少的社交网络中,我们更复杂的启发式方法要优于简单的启发式方法。

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号