Analyzing the Effectiveness of Adversary Modeling in Security Games