TY - GEN
T1 - Know Your Adversary
T2 - 38th Annual Meeting of the Cognitive Science Society: Recognizing and Representing Events, CogSci 2016
AU - Abbasi, Yasaman D.
AU - Ben-Asher, Noam
AU - Gonzalez, Cleotilde
AU - Kar, Debarun
AU - Morrison, Don
AU - Sintov, Nicole
AU - Tambe, Milind
N1 - Publisher Copyright:
© 2016 Proceedings of the 38th Annual Meeting of the Cognitive Science Society, CogSci 2016. All rights reserved.
PY - 2016/1/1
Y1 - 2016/1/1
N2 - Given the global challenges of security, both in physical and cyber worlds, security agencies must optimize the use of their limited resources. To that end, many security agencies have begun to use "security game" algorithms, which optimally plan defender allocations, using models of adversary behavior that have originated in behavioral game theory. To advance our understanding of adversary behavior, this paper presents results from a study involving an opportunistic crime security game (OSG), where human participants play as opportunistic adversaries against an algorithm that optimizes defender allocations. In contrast with previous work which often assumes homogeneous adversarial behavior, our work demonstrates that participants are naturally grouped into multiple distinct categories that share similar behaviors. We capture the observed adversarial behaviors in a set of diverse models from different research traditions, behavioral game theory, and Cognitive Science, illustrating the need for heterogeneity in adversarial models.
AB - Given the global challenges of security, both in physical and cyber worlds, security agencies must optimize the use of their limited resources. To that end, many security agencies have begun to use "security game" algorithms, which optimally plan defender allocations, using models of adversary behavior that have originated in behavioral game theory. To advance our understanding of adversary behavior, this paper presents results from a study involving an opportunistic crime security game (OSG), where human participants play as opportunistic adversaries against an algorithm that optimizes defender allocations. In contrast with previous work which often assumes homogeneous adversarial behavior, our work demonstrates that participants are naturally grouped into multiple distinct categories that share similar behaviors. We capture the observed adversarial behaviors in a set of diverse models from different research traditions, behavioral game theory, and Cognitive Science, illustrating the need for heterogeneity in adversarial models.
KW - Cognitive Models
KW - Heterogonous Adversaries
KW - Human Behavioral Modeling
KW - Opportunistic Security Game
UR - http://www.scopus.com/inward/record.url?scp=85037100575&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:85037100575
T3 - Proceedings of the 38th Annual Meeting of the Cognitive Science Society, CogSci 2016
SP - 1391
EP - 1396
BT - Proceedings of the 38th Annual Meeting of the Cognitive Science Society, CogSci 2016
A2 - Papafragou, Anna
A2 - Grodner, Daniel
A2 - Mirman, Daniel
A2 - Trueswell, John C.
PB - The Cognitive Science Society
Y2 - 10 August 2016 through 13 August 2016
ER -