Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A review of attacker-defender games: Current state and paths forward
In this article, we review the literature which proposes attacker-defender games to protect
against strategic adversarial threats. More specifically, we follow the systematic literature …
against strategic adversarial threats. More specifically, we follow the systematic literature …
Review of systems defense and attack models
KHG LEVITIN - International Journal of Performability Engineering, 2012 - ijpe-online.com
This review paper classifies 129 published papers according to the system structure,
defense measures, and attack tactics and circumstances. System structure is further divided …
defense measures, and attack tactics and circumstances. System structure is further divided …
Decision-theoretic and game-theoretic approaches to IT security investment
Firms have been increasing their information technology (IT) security budgets significantly to
deal with increased security threats. An examination of current practices reveals that …
deal with increased security threats. An examination of current practices reveals that …
Modeling secrecy and deception in a multiple-period attacker–defender signaling game
In this paper, we apply game theory to model strategies of secrecy and deception in a
multiple-period attacker–defender resource-allocation and signaling game with incomplete …
multiple-period attacker–defender resource-allocation and signaling game with incomplete …
[HTML][HTML] Fifty years of operations research in defense
K Hausken - European Journal of Operational Research, 2024 - Elsevier
Abstract The OR (Operations Research) in defense literature is reviewed. Various OR
methodologies are outlined, eg decision theory, game theory, mergers of differential …
methodologies are outlined, eg decision theory, game theory, mergers of differential …
Optimal allocation of protective resources in shortest-path networks
This article introduces a game-theoretic approach for allocating protection resources among
the components of a network so as to maximize its robustness to external disruptions …
the components of a network so as to maximize its robustness to external disruptions …
Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game
Many models have been developed to study homeland security games between
governments (defender) and terrorists (attacker, adversary, enemy), with the limiting …
governments (defender) and terrorists (attacker, adversary, enemy), with the limiting …
An experimental investigation of Colonel Blotto games
This article examines behavior in the two-player, constant-sum Colonel Blotto game with
asymmetric resources in which players maximize the expected number of battlefields won …
asymmetric resources in which players maximize the expected number of battlefields won …
Countering terrorist propaganda: Competitive resource allocation to communities
Increased terrorist propaganda has caused greater violence worldwide. Communities are
efficient channels through which terrorist organizations can access target audiences; thus …
efficient channels through which terrorist organizations can access target audiences; thus …
Quantifying the resilience of community structures in networks
Many networks contain community structures, or collections of densely connected nodes
with sparse connections to other dense groups in the network. Communities may coalesce …
with sparse connections to other dense groups in the network. Communities may coalesce …