Summary
PAWS is a first deployed “green security game” applica-
tion to optimize human patrol resources to combat poaching.
We provided key research advances to enable this deploy-
ment; this has provided a practical benefit to patrol planners
and patrollers. The deployment of PAWS patrols will con-
tinue at the site in Malaysia. Panthera has seen the utility
of PAWS, and we are taking steps to expand PAWS to its
other sites. This future expansion and maintenance of PAWS
will be taken over by ARMORWAY (ARMORWAY 2015),
a “security games” company (starting in Spring 2016); AR-
MORWAY has significant experience in supporting security-
games-based software deployments.
Acknowledgement
This research was supported by MURI Grant W911NF-11-
1-0332. And thanks to our partners in the field who made
these tests possible.
References
ARMORWAY. 2015. http://armorway.com/.
Botea, A.; M
¨
uller, M.; and Schaeffer, J. 2004. Near op-
timal hierarchical path-finding. Journal of Game Develop-
ment 1:7–28.
Chapron, G.; Miquelle, D. G.; Lambert, A.; Goodrich, J. M.;
Legendre, S.; and Clobert, J. 2008. The impact on tigers of
poaching versus prey depletion. Journal of Applied Ecology
45:16671674.
Fang, F.; Jiang, A. X.; and Tambe, M. 2013. Optimal patrol
strategy for protecting moving targets with multiple mobile
resources. In AAMAS.
Fang, F.; Stone, P.; and Tambe, M. 2015. When security
games go green: Designing defender strategies to prevent
poaching and illegal fishing. In International Joint Confer-
ence on Artificial Intelligence (IJCAI).
Hamisi, M. 2008. Identification and mapping risk areas for
zebra poaching: A case of Tarangire National Park, Tanza-
nia. Ph.D. Dissertation, Thesis, ITC.
Haskell, W. B.; Kar, D.; Fang, F.; Tambe, M.; Cheung, S.;
and Denicola, L. E. 2014. Robust protection of fsheries
with COmPASS. In IAAI.
IUCN. 2015. IUCN red list of threatened species. version
2015.2. http://www.iucnredlist.org.
Johnson, M. P.; Fang, F.; and Tambe, M. 2012. Patrol strate-
gies to maximize pristine forest area. In AAAI.
Kar, D.; Fang, F.; Fave, F. D.; Sintov, N.; and Tambe, M.
2015. A Game of Thrones: When human behavior models
compete in repeated Stackelberg security games. In AAMAS
2015.
Korzhyk, D.; Conitzer, V.; and Parr, R. 2010. Complex-
ity of computing optimal Stackelberg strategies in security
resource allocation games. In AAAI, 805–810.
Langmuir, E. 1995. Mountaincraft and Leadership: A
Handbook for Mountaineers and Hillwalking Leaders in the
British Isles. Mountain Leader Training Board.
Lemieux, A. M., ed. 2014. Situational Prevention of Poach-
ing. Crime Science Series. Routledge.
Nguyen, T. H.; Yang, R.; Azaria, A.; Kraus, S.; and Tambe,
M. 2013. Analyzing the effectiveness of adversary modeling
in security games. In AAAI.
Nguyen, T. H.; Yadav, A.; An, B.; Tambe, M.; and Boutilier,
C. 2014. Regret-based optimization and preference elici-
tation for Stackelberg security games with uncertainty. In
AAAI.
Nguyen, T. H.; Fave, F. M. D.; Kar, D.; Lakshminarayanan,
A. S.; Yadav, A.; Tambe, M.; Agmon, N.; Plumptre, A. J.;
Driciru, M.; Wanyama, F.; and Rwetsiba, A. 2015. Mak-
ing the most of our regrets: Regret-based solutions to handle
payoff uncertainty and elicitation in green security games.
In Conference on Decision and Game Theory for Security.
Phillips, S. J.; Anderson, R. P.; and Schapire, R. E. 2006.
Maximum entropy modeling of species geographic distribu-
tions. Ecological Modelling 190(3-4):231–259.
Pita, J.; Jain, M.; Marecki, J.; Ord
´
o
˜
nez, F.; Portway, C.;
Tambe, M.; Western, C.; Paruchuri, P.; and Kraus, S. 2008a.
Deployed ARMOR protection: the application of a game
theoretic model for security at the Los Angeles International
Airport. In Proceedings of the 7th International Joint Con-
ference on Autonomous Agents and Multiagent Systems: In-
dustrial Track, AAMAS ’08, 125–132.
Pita, J.; Jain, M.; Western, C.; Portway, C.; Tambe, M.; Or-
donez, F.; Kraus, S.; and Paruchuri, P. 2008b. Deployed AR-
MOR protection: The application of a game theroetic model
for security at the Los Angeles International Airport. In AA-
MAS.
Plummer, M. 2003. JAGS: A program for analysis of
Bayesian graphical models using Gibbs sampling.
Qian, Y.; Haskell, W. B.; Jiang, A. X.; and Tambe, M. 2014.
Online planning for optimal protector strategies in resource
conservation games. In AAMAS.
Sanderson, E.; Forrest, J.; Loucks, C.; Ginsberg, J.; Din-
erstein, E.; Seidensticker, J.; Leimgruber, P.; Songer, M.;
Heydlauff, A.; OBrien, T.; Bryja, G.; Klenzendorf, S.; and
Wikramanayake, E. 2006. Setting priorities for the conser-
vation and recovery of wild tigers: 2005-2015. the techni-
cal assessment. Technical report, WCS, WWF, Smithsonian,
and NFWF-STF, New York Washington, D.C.
Shieh, E.; An, B.; Yang, R.; Tambe, M.; Baldwin, C.; Di-
Renzo, J.; Maule, B.; and Meyer, G. 2012. PROTECT:
A deployed game theoretic system to protect the ports of
the United States. In Proceedings of the 11th International
Conference on Autonomous Agents and Multiagent Systems
- Volume 1, AAMAS ’12, 13–20.
SMART. 2013. The spatial monitoring and reporting tool
(SMART). http://www.smartconservationsoftware.org/.
Stokes, E. J. 2010. Improving effectiveness of protection ef-
forts in tiger source sites: developing a framework for law
enforcement monitoring using mist. Integrative Zoology
5(4):363–377.
Tambe, M. 2011. Security and Game Theory: Algorithms,