Which Targets to Protect in Critical Infrastructures - A Game-Theoretic Solution From a Network Science Perspective
暂无分享,去创建一个
[1] Dan Kovenock,et al. Weakest‐link attacker‐defender games with multiple attack technologies , 2012 .
[2] Sarit Kraus,et al. Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games , 2008, AAMAS.
[3] Milind Tambe,et al. TRUSTS: Scheduling Randomized Patrols for Fare Inspection in Transit Systems , 2012, IAAI.
[4] C. F. Larry Heimann,et al. Simulation and Game-Theoretic Analysis of an Attacker-Defender Game , 2012, GameSec.
[5] C. E. Lemke,et al. Equilibrium Points of Bimatrix Games , 1964 .
[6] Jun Zhuang,et al. Modeling a Multitarget Attacker-Defender Game with Budget Constraints , 2017, Decis. Anal..
[7] Bo An,et al. PROTECT: a deployed game theoretic system to protect the ports of the United States , 2012, AAMAS.
[8] Milind Tambe,et al. Security and Game Theory: IRIS – A Tool for Strategic Security Allocation in Transportation Networks , 2011, AAMAS 2011.
[9] Sarit Kraus,et al. Using Game Theory for Los Angeles Airport Security , 2009, AI Mag..
[10] Quanyan Zhu,et al. Game-Theoretic Methods for Robustness, Security, and Resilience of Cyberphysical Control Systems: Games-in-Games Principle for Optimal Cross-Layer Resilient Control Systems , 2015, IEEE Control Systems.
[11] C. Papadimitriou. Algorithmic Game Theory: The Complexity of Finding Nash Equilibria , 2007 .
[12] V. Vazirani,et al. Algorithmic Game Theory: Basic Solution Concepts and Computational Issues , 2007 .
[13] S. Strogatz. Exploring complex networks , 2001, Nature.
[14] Sherali Zeadally,et al. Critical infrastructure protection: Requirements and challenges for the 21st century , 2015, Int. J. Crit. Infrastructure Prot..
[15] Manish Jain,et al. Computing optimal randomized resource allocations for massive security games , 2009, AAMAS 2009.
[16] Gerald G. Brown,et al. Defending Critical Infrastructure , 2006, Interfaces.
[17] Min Ouyang,et al. A mathematical framework to optimize resilience of interdependent critical infrastructure systems under spatially localized attacks , 2017, Eur. J. Oper. Res..
[18] V Latora,et al. Efficient behavior of small-world networks. , 2001, Physical review letters.
[19] Pedro Godinho,et al. A two-player competitive discrete location model with simultaneous decisions , 2010, Eur. J. Oper. Res..
[20] Yoav Shoham,et al. Simple search methods for finding a Nash equilibrium , 2004, Games Econ. Behav..
[21] Gerald G. Brown,et al. Solving Defender-Attacker-Defender Models for Infrastructure Defense , 2011, ICS 2011.
[22] Chi Zhang,et al. Critical infrastructure protection using secrecy - A discrete simultaneous game , 2015, Eur. J. Oper. Res..
[23] Jun Wu,et al. Attacker-defender game from a network science perspective. , 2018, Chaos.
[24] Gregory Levitin,et al. Optimal protection of general source-sink networks via evolutionary techniques , 2009, Reliab. Eng. Syst. Saf..
[25] David K. Y. Yau,et al. Defense of Cyber Infrastructures Against Cyber‐Physical Attacks Using Game‐Theoretic Models , 2016, Risk analysis : an official publication of the Society for Risk Analysis.