Protecting critical infrastructures against intentional attacks: a two-stage game with incomplete information
暂无分享,去创建一个
[1] R. Kevin Wood,et al. The multi-terminal maximum-flow network-interdiction problem , 2011, Eur. J. Oper. Res..
[2] Gregory Levitin,et al. Minmax defense strategy for complex multi-state systems , 2009, Reliab. Eng. Syst. Saf..
[3] Kwang-Jae Kim,et al. Optimizing multi-response surface problems: How to use multi-objective optimization techniques , 2005 .
[4] Kjell Hausken,et al. Strategic Defense and Attack of Complex Networks , 2007, WEIS.
[5] Jacques Periaux,et al. Combining game theory and genetic algorithms with application to DDM-nozzle optimization problems , 2001 .
[6] David W. Coit,et al. Multi-objective optimization using genetic algorithms: A tutorial , 2006, Reliab. Eng. Syst. Saf..
[7] Claudio M. Rocco Sanseverino,et al. Stochastic network interdiction optimization via capacitated network reliability modeling and probabilistic solution discovery , 2009, Reliab. Eng. Syst. Saf..
[8] Beom Jun Kim,et al. Attack vulnerability of complex networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.
[9] Jun Zhuang,et al. Modeling Arbitrary Layers of Continuous‐Level Defenses in Facing with Strategic Attackers , 2011, Risk analysis : an official publication of the Society for Risk Analysis.
[10] Claudio M. Rocco Sanseverino,et al. A bi-objective approach for shortest-path network interdiction , 2010, Comput. Ind. Eng..
[11] Bob Duckett. Concise Oxford English Dictionary (11th edition) , 2005 .
[12] Claudio M. Rocco Sanseverino,et al. Assessing the Vulnerability of a Power System Through a Multiple Objective Contingency Screening Approach , 2011, IEEE Transactions on Reliability.
[13] Oguzhan Alagöz,et al. Modeling secrecy and deception in a multiple-period attacker-defender signaling game , 2010, Eur. J. Oper. Res..
[14] John A. Major. Advanced Techniques for Modeling Terrorism Risk , 2002 .
[15] George W Bush,et al. The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets , 2003 .
[16] R. Kevin Wood,et al. Deterministic network interdiction , 1993 .
[17] J. C. Smith,et al. Algorithms for discrete and continuous multicommodity flow network interdiction problems , 2007 .
[18] Vicki M. Bier,et al. Subsidies in Interdependent Security With Heterogeneous Discount Rates , 2007 .
[19] Gregory Levitin,et al. Optimal protection of general source-sink networks via evolutionary techniques , 2009, Reliab. Eng. Syst. Saf..
[20] Jun Zhuang,et al. Robust Allocation of a Defensive Budget Considering an Attacker's Private Information , 2012, Risk analysis : an official publication of the Society for Risk Analysis.
[21] Claudio M. Rocco Sanseverino,et al. Deterministic network interdiction optimization via an evolutionary approach , 2009, Reliab. Eng. Syst. Saf..
[22] N. Assimakopoulos,et al. A network interdiction model for hospital infection control. , 1987, Computers in biology and medicine.
[23] Gregory Levitin,et al. Redundancy vs. Protection in Defending Parallel Systems Against Unintentional and Intentional Impacts , 2009, IEEE Transactions on Reliability.
[24] Kjell Hausken,et al. Governments' and Terrorists' Defense and Attack in a T-Period Game , 2011, Decis. Anal..
[25] Claudio M. Rocco Sanseverino,et al. Bi and tri-objective optimization in the deterministic network interdiction problem , 2010, Reliab. Eng. Syst. Saf..
[26] George E. Apostolakis,et al. Identification of critical locations across multiple infrastructures for terrorist actions , 2007, Reliab. Eng. Syst. Saf..
[27] David Michaud,et al. Methodology for Ranking the Elements of Water-Supply Networks , 2006 .
[28] M. Naceur Azaiez,et al. Optimal resource allocation for security in reliability systems , 2007, Eur. J. Oper. Res..
[29] Kjell Hausken,et al. Protecting complex infrastructures against multiple strategic attackers , 2011, Int. J. Syst. Sci..
[30] Claudio M. Rocco Sanseverino,et al. A holistic method for reliability performance assessment and critical components detection in complex networks , 2011 .
[31] Jose Emmanuel Ramirez-Marquez,et al. Port-of-entry safety via the reliability optimization of container inspection strategy through an evolutionary approach , 2008, Reliab. Eng. Syst. Saf..
[32] Jose Emmanuel Ramirez-Marquez,et al. Evolutionary optimization technique for multi-state two-terminal reliability allocation in multi-objective problems , 2010 .
[33] C. Papadimitriou. Algorithmic Game Theory: The Complexity of Finding Nash Equilibria , 2007 .
[34] Barry M. Horowitz,et al. Modeling interdependent infrastructures for sustainable counterterrorism , 2004 .
[35] Philip S. Bud Whiteman. Improving Single Strike Effectiveness for Network Interdiction , 1999 .
[36] Heidi A. Taboada,et al. Multi-objective scheduling problems: Determination of pruned Pareto sets , 2008 .
[37] Chi Zhang and José Emmanuel Ramirez-Marquez. Approximation of Minimal Cut Sets for a Flow Network via Evolutionary Optimization and Data Mining Techniques , 2011 .
[38] Vicki M. Bier,et al. Protection of simple series and parallel systems with components of different values , 2005, Reliab. Eng. Syst. Saf..
[39] Kjell Hausken. Defense and attack of complex and dependent systems , 2010, Reliab. Eng. Syst. Saf..
[40] Slavko Krajcar,et al. Integrated approach to energy security and critical infrastructure in Croatia , 2009, 2009 6th International Conference on the European Energy Market.
[41] Avinash Agrawal,et al. A Survey of Network Reliability and Domination Theory , 1984, Oper. Res..
[42] M. Naceur Azaiez,et al. Why Both Game Theory and Reliability Theory Are Important in Defending Infrastructure against Intelligent Attacks , 2009 .
[43] Johannes O. Royset,et al. Solving the Bi-Objective Maximum-Flow Network-Interdiction Problem , 2007, INFORMS J. Comput..
[44] Claudio M. Rocco Sanseverino,et al. All-terminal network reliability optimization via probabilistic solution discovery , 2008, Reliab. Eng. Syst. Saf..
[45] Albert Jones,et al. Toward modeling and simulation of critical national infrastructure interdependencies , 2005 .
[46] Gregory Levitin,et al. Influence of attacker's target recognition ability on defense strategy in homogeneous parallel systems , 2010, Reliab. Eng. Syst. Saf..
[47] Thomas Krieger,et al. On Pareto equilibria in vector-valued extensive form games , 2003, Math. Methods Oper. Res..
[48] M. Naceur Azaiez,et al. Game Theoretic Risk Analysis of Security Threats , 2009 .
[49] Jun Zhuang,et al. Modelling ‘contracts’ between a terrorist group and a government in a sequential game , 2012, J. Oper. Res. Soc..
[50] Gerald G. Brown,et al. Defending Critical Infrastructure , 2006, Interfaces.