A review of attacker-defender games: Current state and paths forward

K Hunt, J Zhuang - European Journal of Operational Research, 2024 - Elsevier
In this article, we review the literature which proposes attacker-defender games to protect
against strategic adversarial threats. More specifically, we follow the systematic literature …

Review of systems defense and attack models

KHG LEVITIN - International Journal of Performability Engineering, 2012 - ijpe-online.com
This review paper classifies 129 published papers according to the system structure,
defense measures, and attack tactics and circumstances. System structure is further divided …

Decision-theoretic and game-theoretic approaches to IT security investment

H Cavusoglu, S Raghunathan… - Journal of Management …, 2008 - Taylor & Francis
Firms have been increasing their information technology (IT) security budgets significantly to
deal with increased security threats. An examination of current practices reveals that …

Modeling secrecy and deception in a multiple-period attacker–defender signaling game

J Zhuang, VM Bier, O Alagoz - European Journal of Operational Research, 2010 - Elsevier
In this paper, we apply game theory to model strategies of secrecy and deception in a
multiple-period attacker–defender resource-allocation and signaling game with incomplete …

[HTML][HTML] Fifty years of operations research in defense

K Hausken - European Journal of Operational Research, 2024 - Elsevier
Abstract The OR (Operations Research) in defense literature is reviewed. Various OR
methodologies are outlined, eg decision theory, game theory, mergers of differential …

Optimal allocation of protective resources in shortest-path networks

P Cappanera, MP Scaparra - Transportation Science, 2011 - pubsonline.informs.org
This article introduces a game-theoretic approach for allocating protection resources among
the components of a network so as to maximize its robustness to external disruptions …

Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game

X Shan, J Zhuang - European Journal of Operational Research, 2013 - Elsevier
Many models have been developed to study homeland security games between
governments (defender) and terrorists (attacker, adversary, enemy), with the limiting …

An experimental investigation of Colonel Blotto games

SM Chowdhury, D Kovenock, RM Sheremeta - Economic Theory, 2013 - Springer
This article examines behavior in the two-player, constant-sum Colonel Blotto game with
asymmetric resources in which players maximize the expected number of battlefields won …

Countering terrorist propaganda: Competitive resource allocation to communities

X Chen, Y Dong, J Zhuang - IISE Transactions, 2025 - Taylor & Francis
Increased terrorist propaganda has caused greater violence worldwide. Communities are
efficient channels through which terrorist organizations can access target audiences; thus …

Quantifying the resilience of community structures in networks

JE Ramirez-Marquez, CM Rocco, K Barker… - Reliability Engineering & …, 2018 - Elsevier
Many networks contain community structures, or collections of densely connected nodes
with sparse connections to other dense groups in the network. Communities may coalesce …