The Casino and the OODA Loop
- 734 Downloads
Security protocols are almost always part of an iterated game, but existing abstractions don’t model this behavior. Models for such systems have been developed in other contexts, and we propose the use of one, John Boyd’s Observe-Orient-Decide-Act (OODA) Loop, as appropriate for the security context.
Unable to display preview. Download preview PDF.
- 1.Boyd, J.: Boyd bibliography, http://danford.net/boyd/
- 2.Cellini: The Card Counter’s Guide to Casino Surveillance. Huntington Press Pub. (2003)Google Scholar
- 3.Boss, A.Z.D.: Casino Security and Gaming Surveillance. Auerback Publications (2010)Google Scholar
- 4.Forte, S.L.: Casino Game Protection: A Comprehensive Guide. SLF Publishing LLC (2004)Google Scholar
- 5.Powell, L.F.G., Tyska, L.: Casino Surveillance and Security: 150 Things You Should Know. Asis International (2003)Google Scholar