{"@context":"http://iiif.io/api/presentation/2/context.json","@id":"https://repo.library.stonybrook.edu/cantaloupe/iiif/2/manifest.json","@type":"sc:Manifest","label":"Game-Theoretic Models for Interdependent Security: Modeling, Computing, and Learning","metadata":[{"label":"dc.description.sponsorship","value":"This work is sponsored by the Stony Brook University Graduate School in compliance with the requirements for completion of degree."},{"label":"dc.format","value":"Monograph"},{"label":"dc.format.medium","value":"Electronic Resource"},{"label":"dc.identifier.uri","value":"http://hdl.handle.net/11401/77272"},{"label":"dc.language.iso","value":"en_US"},{"label":"dc.publisher","value":"The Graduate School, Stony Brook University: Stony Brook, NY."},{"label":"dcterms.abstract","value":"Due to an increase number of attacks by hackers and terrorists, there has been quite a bit of recent research activity in the general area of game-theoretic models for terrorism settings that aim to understand the behavior of the attackers and the attackers' targets. My thesis is centered on introducing, studying, and applying several game-theoretic models to security. In particular, my doctoral thesis consists of the following components: (1) designing increasingly more realistic variants of defense games; (2) studying computational questions in defense games such as equilibria computation and computational implications of equilibria characterizations, (3) designing efficient algorithms and effective heuristics for defense problems; and (4) designing and applying new machine learning techniques to estimate game model parameters from behavioral data. Our computational models build on top of interdependent security (IDS) games, a model introduced by economists and risk-assessment experts Kunreuther and Heal to study investment decisions of strategic agents when facing direct and transfer risk exposure from other agents in the system. We first introduce generalized IDS (alpha-IDS) games, a model that extends IDS games where full investment can reduce transfer risk. In particular, alpha is a vector of probabilities, one for each agent, specifying the probability that the transfer risk will not be protected by the investment. In other words, agent i's investment can reduce indirect risk by probability (1-alpha_i). We then extend from alpha-IDS games and introduce interdependent defense (IDD) games, a computational-game-theoretic framework for settings of interdependent security to study scenarios of multiple-defenders vs. a single-attacker in a network. For the variants of defense games we introduced, we study some computational aspects of computing Nash equilibria in those games. Finally, we investigate the problem of learning the games form observed behavioral data. For this problem, we introduce a machine-learning generative model to learn the parameters of the games. As an application, we apply the learning model and use machine-learning techniques to estimate the parameters and structure of alpha-IDS games using the vaccination data from the Centers for Disease Control and Prevention (CDC) in the United States."},{"label":"dcterms.available","value":"2017-09-20T16:52:19Z"},{"label":"dcterms.contributor","value":"Chen, Jing"},{"label":"dcterms.creator","value":"Chan, Hau"},{"label":"dcterms.dateAccepted","value":"2017-09-20T16:52:19Z"},{"label":"dcterms.dateSubmitted","value":"2017-09-20T16:52:19Z"},{"label":"dcterms.description","value":"Department of Computer Science."},{"label":"dcterms.extent","value":"154 pg."},{"label":"dcterms.format","value":"Monograph"},{"label":"dcterms.identifier","value":"http://hdl.handle.net/11401/77272"},{"label":"dcterms.issued","value":"2015-12-01"},{"label":"dcterms.language","value":"en_US"},{"label":"dcterms.provenance","value":"Made available in DSpace on 2017-09-20T16:52:19Z (GMT). No. of bitstreams: 1\nChan_grad.sunysb_0771E_12547.pdf: 6940668 bytes, checksum: cf97682f01fc09e0a0c127d335761ed0 (MD5)\n Previous issue date: 1"},{"label":"dcterms.publisher","value":"The Graduate School, Stony Brook University: Stony Brook, NY."},{"label":"dcterms.subject","value":"Computer science"},{"label":"dcterms.title","value":"Game-Theoretic Models for Interdependent Security: Modeling, Computing, and Learning"},{"label":"dcterms.type","value":"Dissertation"},{"label":"dc.type","value":"Dissertation"}],"description":"This manifest was generated dynamically","viewingDirection":"left-to-right","sequences":[{"@type":"sc:Sequence","canvases":[{"@id":"https://repo.library.stonybrook.edu/cantaloupe/iiif/2/canvas/page-1.json","@type":"sc:Canvas","label":"Page 1","height":1650,"width":1275,"images":[{"@type":"oa:Annotation","motivation":"sc:painting","resource":{"@id":"https://repo.library.stonybrook.edu/cantaloupe/iiif/2/16%2F15%2F85%2F161585781844074094434883179295627314227/full/full/0/default.jpg","@type":"dctypes:Image","format":"image/jpeg","height":1650,"width":1275,"service":{"@context":"http://iiif.io/api/image/2/context.json","@id":"https://repo.library.stonybrook.edu/cantaloupe/iiif/2/16%2F15%2F85%2F161585781844074094434883179295627314227","profile":"http://iiif.io/api/image/2/level2.json"}},"on":"https://repo.library.stonybrook.edu/cantaloupe/iiif/2/canvas/page-1.json"}]}]}]}