A review of attacker-defender games: Current state and paths forward

K Hunt, J Zhuang - European Journal of Operational Research, 2024 - Elsevier
In this article, we review the literature which proposes attacker-defender games to protect
against strategic adversarial threats. More specifically, we follow the systematic literature …

Review of systems defense and attack models

KHG LEVITIN - International Journal of Performability Engineering, 2012 - ijpe-online.com
This review paper classifies 129 published papers according to the system structure,
defense measures, and attack tactics and circumstances. System structure is further divided …

Modeling secrecy and deception in a multiple-period attacker–defender signaling game

J Zhuang, VM Bier, O Alagoz - European Journal of Operational Research, 2010 - Elsevier
In this paper, we apply game theory to model strategies of secrecy and deception in a
multiple-period attacker–defender resource-allocation and signaling game with incomplete …

Adversarial risk analysis for counterterrorism modeling

J Rios, DR Insua - Risk Analysis: An International Journal, 2012 - Wiley Online Library
Recent large‐scale terrorist attacks have raised interest in models for resource allocation
against terrorist threats. The unifying theme in this area is the need to develop methods for …

Fifty years of operations research in defense

K Hausken - 2024 - uis.brage.unit.no
The OR (Operations Research) in defense literature is reviewed. Various OR methodologies
are outlined, eg decision theory, game theory, mergers of differential equations and game …

Defense of cyber infrastructures against cyber‐physical attacks using game‐theoretic models

NSV Rao, SW Poole, CYT Ma, F He, J Zhuang… - Risk …, 2016 - Wiley Online Library
The operation of cyber infrastructures relies on both cyber and physical components, which
are subject to incidental and intentional degradations of different kinds. Within the context of …

Publicity vs. impact in nonprofit disclosures and donor preferences: a sequential game with one nonprofit organization and N donors

J Zhuang, GD Saxton, H Wu - Annals of Operations Research, 2014 - Springer
Charitable giving is one of the essential tasks of a properly functioning civil society. This task
is greatly complicated by the lack of organizational transparency and by the information …

Robust allocation of a defensive budget considering an attacker's private information

ME Nikoofal, J Zhuang - Risk Analysis: An International Journal, 2012 - Wiley Online Library
Attackers' private information is one of the main issues in defensive resource allocation
games in homeland security. The outcome of a defense resource allocation decision …

A game-theoretic approach to modeling attacks and defenses of smart grids at three levels

XG Shan, J Zhuang - Reliability Engineering & System Safety, 2020 - Elsevier
As optimization, user capabilities, and data-taking abilities are incorporated into next-
generation power grids, or smart grids, they face cyber threats. The traditional electrical grid …

Deception-based game theoretical approach to mitigate DoS attacks

H Çeker, J Zhuang, S Upadhyaya, QD La… - Decision and Game …, 2016 - Springer
Abstract Denial of Service (DoS) attacks prevent legitimate users from accessing resources
by compromising availability of a system. Despite advanced prevention mechanisms, DoS …