publication . Article . 2017

Computing Optimal Mixed Strategies for Terrorist Plot Detection Games with the Consideration of Information Leakage

MingChu Li; Zekun Yang; Kun Lu; Cheng Guo;
Open Access English
  • Published: 01 Jan 2017 Journal: ITM Web of Conferences (issn: 2271-2097, Copyright policy)
  • Publisher: EDP Sciences
Abstract
The terrorist’s coordinated attack is becoming an increasing threat to western countries. By monitoring potential terrorists, security agencies are able to detect and destroy terrorist plots at their planning stage. Therefore, an optimal monitoring strategy for the domestic security agency becomes necessary. However, previous study about monitoring strategy generation fails to consider the information leakage, due to hackers and insider threat. Such leakage events may lead to failure of watching potential terrorists and destroying the plot, and cause a huge risk to public security. This paper makes two major contributions. Firstly, we develop a new Stackelberg g...
Subjects
free text keywords: Information technology, T58.5-58.64, Plot (narrative), Hacker, Leakage (electronics), Insider threat, Computer security, computer.software_genre, computer, Information leakage, Public security, Engineering, business.industry, business, Stackelberg competition, Terrorism
Related Organizations
Powered by OpenAIRE Open Research Graph
Any information missing or wrong?Report an Issue
publication . Article . 2017

Computing Optimal Mixed Strategies for Terrorist Plot Detection Games with the Consideration of Information Leakage

MingChu Li; Zekun Yang; Kun Lu; Cheng Guo;