A review of attacker-defender games: Current state and paths forward
In this article, we review the literature which proposes attacker-defender games to protect
against strategic adversarial threats. More specifically, we follow the systematic literature …
against strategic adversarial threats. More specifically, we follow the systematic literature …
Review of systems defense and attack models
KHG LEVITIN - International Journal of Performability Engineering, 2012 - ijpe-online.com
This review paper classifies 129 published papers according to the system structure,
defense measures, and attack tactics and circumstances. System structure is further divided …
defense measures, and attack tactics and circumstances. System structure is further divided …
Modeling secrecy and deception in a multiple-period attacker–defender signaling game
In this paper, we apply game theory to model strategies of secrecy and deception in a
multiple-period attacker–defender resource-allocation and signaling game with incomplete …
multiple-period attacker–defender resource-allocation and signaling game with incomplete …
Adversarial risk analysis for counterterrorism modeling
Recent large‐scale terrorist attacks have raised interest in models for resource allocation
against terrorist threats. The unifying theme in this area is the need to develop methods for …
against terrorist threats. The unifying theme in this area is the need to develop methods for …
Fifty years of operations research in defense
K Hausken - 2024 - uis.brage.unit.no
The OR (Operations Research) in defense literature is reviewed. Various OR methodologies
are outlined, eg decision theory, game theory, mergers of differential equations and game …
are outlined, eg decision theory, game theory, mergers of differential equations and game …
Defense of cyber infrastructures against cyber‐physical attacks using game‐theoretic models
The operation of cyber infrastructures relies on both cyber and physical components, which
are subject to incidental and intentional degradations of different kinds. Within the context of …
are subject to incidental and intentional degradations of different kinds. Within the context of …
Publicity vs. impact in nonprofit disclosures and donor preferences: a sequential game with one nonprofit organization and N donors
Charitable giving is one of the essential tasks of a properly functioning civil society. This task
is greatly complicated by the lack of organizational transparency and by the information …
is greatly complicated by the lack of organizational transparency and by the information …
Robust allocation of a defensive budget considering an attacker's private information
Attackers' private information is one of the main issues in defensive resource allocation
games in homeland security. The outcome of a defense resource allocation decision …
games in homeland security. The outcome of a defense resource allocation decision …
A game-theoretic approach to modeling attacks and defenses of smart grids at three levels
As optimization, user capabilities, and data-taking abilities are incorporated into next-
generation power grids, or smart grids, they face cyber threats. The traditional electrical grid …
generation power grids, or smart grids, they face cyber threats. The traditional electrical grid …
Deception-based game theoretical approach to mitigate DoS attacks
Abstract Denial of Service (DoS) attacks prevent legitimate users from accessing resources
by compromising availability of a system. Despite advanced prevention mechanisms, DoS …
by compromising availability of a system. Despite advanced prevention mechanisms, DoS …