Abstract
This work addresses a specific case of Goal Recognition (GR), where
a malicious actor (the attacker) seeks to reach and damage one of
several sensitive targets, while the observer (the defender) must
identify the attacker’s target and allocate limited resources to pro-
tect it. Focusing on real-world physical and cyber security scenarios,
the defender faces a trade-off between acting early, with limited in-
formation, or waiting for more data but risking insufficient time to
defend. Our contributions include introducing a game-theoretic for-
mulation of this instance of GR, which captures the time-sensitive
nature of these scenarios, and providing an efficient method to
compute Nash equilibria using the fictitious play learning scheme.
Experimental results confirm that our method equips the defend
a malicious actor (the attacker) seeks to reach and damage one of
several sensitive targets, while the observer (the defender) must
identify the attacker’s target and allocate limited resources to pro-
tect it. Focusing on real-world physical and cyber security scenarios,
the defender faces a trade-off between acting early, with limited in-
formation, or waiting for more data but risking insufficient time to
defend. Our contributions include introducing a game-theoretic for-
mulation of this instance of GR, which captures the time-sensitive
nature of these scenarios, and providing an efficient method to
compute Nash equilibria using the fictitious play learning scheme.
Experimental results confirm that our method equips the defend
| Original language | English |
|---|---|
| Title of host publication | 24th International Conference on Autonomous Agents and Multiagent Systems |
| Publication status | Published - 23 May 2025 |
Keywords
- obfuscation legibility pathfinding
Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver