A review of attacker-defender games: Current state and paths forward

K Hunt, J Zhuang - European Journal of Operational Research, 2024 - Elsevier
In this article, we review the literature which proposes attacker-defender games to protect
against strategic adversarial threats. More specifically, we follow the systematic literature …

Review of systems defense and attack models

KHG LEVITIN - International Journal of Performability Engineering, 2012 - ijpe-online.com
This review paper classifies 129 published papers according to the system structure,
defense measures, and attack tactics and circumstances. System structure is further divided …

Cybersecurity investments in the supply chain: Coordination and a strategic attacker

J Simon, A Omar - European Journal of Operational Research, 2020 - Elsevier
Cybersecurity poses a difficult challenge to supply chains, as a firm may be affected by an
attack on another firm in the supply chain. For example, a retailer's consumer data might be …

Terrorist attacks and oil prices: A time-varying causal relationship analysis

Y Song, B Chen, N Hou, Y Yang - Energy, 2022 - Elsevier
This study investigates the time-varying interaction between terrorist attacks and oil prices
using a bootstrap full-sample causality test and sub-sample rolling window estimations. The …

Fifty years of operations research in defense

K Hausken - 2024 - uis.brage.unit.no
The OR (Operations Research) in defense literature is reviewed. Various OR methodologies
are outlined, eg decision theory, game theory, mergers of differential equations and game …

Sequential shortest path interdiction with incomplete information

JS Borrero, OA Prokopyev, D Sauré - Decision Analysis, 2016 - pubsonline.informs.org
We study sequential interdiction when the interdictor has incomplete initial information about
the network and the evader has complete knowledge of the network, including its structure …

A game-theoretic approach to modeling attacks and defenses of smart grids at three levels

XG Shan, J Zhuang - Reliability Engineering & System Safety, 2020 - Elsevier
As optimization, user capabilities, and data-taking abilities are incorporated into next-
generation power grids, or smart grids, they face cyber threats. The traditional electrical grid …

[HTML][HTML] 50 years of Operations Research in Defense–a European Perspective

K Hausken - European Journal of Operational Research, 2024 - Elsevier
Abstract The OR (Operations Research) in defense literature is reviewed. Various OR
methodologies are outlined, eg decision theory, game theory, mergers of differential …

Cost of equity in homeland security resource allocation in the face of a strategic attacker

X Shan, J Zhuang - Risk Analysis, 2013 - Wiley Online Library
Hundreds of billions of dollars have been spent in homeland security since September 11,
2001. Many mathematical models have been developed to study strategic interactions …

Protecting critical infrastructures against intentional attacks: A two-stage game with incomplete information

C Zhang, JE Ramirez-Marquez - Iie Transactions, 2013 - Taylor & Francis
It is now paramount to protect critical infrastructures because of their significance for
economic development and social well-being of modern societies. One of the main threats to …