A review of attacker-defender games: Current state and paths forward
In this article, we review the literature which proposes attacker-defender games to protect
against strategic adversarial threats. More specifically, we follow the systematic literature …
against strategic adversarial threats. More specifically, we follow the systematic literature …
Review of systems defense and attack models
KHG LEVITIN - International Journal of Performability Engineering, 2012 - ijpe-online.com
This review paper classifies 129 published papers according to the system structure,
defense measures, and attack tactics and circumstances. System structure is further divided …
defense measures, and attack tactics and circumstances. System structure is further divided …
Cybersecurity investments in the supply chain: Coordination and a strategic attacker
Cybersecurity poses a difficult challenge to supply chains, as a firm may be affected by an
attack on another firm in the supply chain. For example, a retailer's consumer data might be …
attack on another firm in the supply chain. For example, a retailer's consumer data might be …
Terrorist attacks and oil prices: A time-varying causal relationship analysis
Y Song, B Chen, N Hou, Y Yang - Energy, 2022 - Elsevier
This study investigates the time-varying interaction between terrorist attacks and oil prices
using a bootstrap full-sample causality test and sub-sample rolling window estimations. The …
using a bootstrap full-sample causality test and sub-sample rolling window estimations. The …
Fifty years of operations research in defense
K Hausken - 2024 - uis.brage.unit.no
The OR (Operations Research) in defense literature is reviewed. Various OR methodologies
are outlined, eg decision theory, game theory, mergers of differential equations and game …
are outlined, eg decision theory, game theory, mergers of differential equations and game …
Sequential shortest path interdiction with incomplete information
We study sequential interdiction when the interdictor has incomplete initial information about
the network and the evader has complete knowledge of the network, including its structure …
the network and the evader has complete knowledge of the network, including its structure …
A game-theoretic approach to modeling attacks and defenses of smart grids at three levels
As optimization, user capabilities, and data-taking abilities are incorporated into next-
generation power grids, or smart grids, they face cyber threats. The traditional electrical grid …
generation power grids, or smart grids, they face cyber threats. The traditional electrical grid …
[HTML][HTML] 50 years of Operations Research in Defense–a European Perspective
K Hausken - European Journal of Operational Research, 2024 - Elsevier
Abstract The OR (Operations Research) in defense literature is reviewed. Various OR
methodologies are outlined, eg decision theory, game theory, mergers of differential …
methodologies are outlined, eg decision theory, game theory, mergers of differential …
Cost of equity in homeland security resource allocation in the face of a strategic attacker
Hundreds of billions of dollars have been spent in homeland security since September 11,
2001. Many mathematical models have been developed to study strategic interactions …
2001. Many mathematical models have been developed to study strategic interactions …
Protecting critical infrastructures against intentional attacks: A two-stage game with incomplete information
It is now paramount to protect critical infrastructures because of their significance for
economic development and social well-being of modern societies. One of the main threats to …
economic development and social well-being of modern societies. One of the main threats to …