Optimal allocation of defensive resources to defend urban power networks against different types of attackers

[1]  Fei Xue,et al.  Structural vulnerability of power systems: A topological approach , 2011 .

[2]  Quan Long,et al.  Uncertainty Analysis in Software Reliability Modeling by Bayesian Analysis with Maximum-Entropy Principle , 2007, IEEE Transactions on Software Engineering.

[3]  R. Powell Defending against Terrorist Attacks with Limited Resources , 2007, American Political Science Review.

[4]  Chang Liu,et al.  Generalized physical layer channel model for relay- based super dense networks , 2015 .

[5]  Uriel G. Rothblum,et al.  Nature plays with dice - terrorists do not: Allocating resources to counter strategic versus probabilistic risks , 2009, Eur. J. Oper. Res..

[6]  Mahdi Pourakbari-Kasmaei,et al.  Optimal power flow problem considering multiple-fuel options and disjoint operating zones: A solver-friendly MINLP model , 2019 .

[7]  Richard White,et al.  A computational asset vulnerability model for the strategic protection of the critical infrastructure , 2014, Int. J. Crit. Infrastructure Prot..

[8]  Jing Zhang,et al.  The role of risk preferences in a multi-target defender-attacker resource allocation game , 2018, Reliab. Eng. Syst. Saf..

[9]  Jr. Louis Anthony Cox,et al.  Game Theory and Risk Analysis , 2009 .

[10]  Henry H. Willis Guiding Resource Allocations Based on Terrorism Risk , 2007, Risk analysis : an official publication of the Society for Risk Analysis.

[11]  Lingfeng Wang,et al.  A game-theoretic study of load redistribution attack and defense in power systems , 2017 .

[12]  Shi-Woei Lin,et al.  Should the Model for Risk‐Informed Regulation be Game Theory Rather than Decision Theory? , 2013, Risk analysis : an official publication of the Society for Risk Analysis.

[13]  Kjell Hausken,et al.  Defending against multiple different attackers , 2011, Eur. J. Oper. Res..

[14]  Genserik Reniers,et al.  A Game-Theoretical Model to Improve Process Plant Protection from Terrorist Attacks. , 2016, Risk analysis : an official publication of the Society for Risk Analysis.

[15]  Wenjun Ma,et al.  Ambiguous Bayesian Games , 2014, Int. J. Intell. Syst..

[16]  Kjell Hausken,et al.  Protecting complex infrastructures against multiple strategic attackers , 2011, Int. J. Syst. Sci..

[17]  Zhilong Chen,et al.  Using game theory to optimize allocation of defensive resources to protect multiple chemical facilities in a city against terrorist attacks , 2016 .

[18]  Zhiheng Xu,et al.  A Study on a Sequential One-Defender-N-Attacker Game. , 2019, Risk analysis : an official publication of the Society for Risk Analysis.

[19]  Gerald G. Brown,et al.  How Probabilistic Risk Assessment Can Mislead Terrorism Risk Analysts , 2011, Risk analysis : an official publication of the Society for Risk Analysis.

[20]  Jose M. Yusta,et al.  Using interconnected risk maps to assess the threats faced by electricity infrastructures , 2013, Int. J. Crit. Infrastructure Prot..

[21]  Kenneth Sörensen,et al.  MISTRAL: A game-theoretical model to allocate security measures in a multi-modal chemical transportation network with adaptive adversaries , 2015, Reliab. Eng. Syst. Saf..

[22]  Jose Emmanuel Ramirez-Marquez,et al.  Protecting critical infrastructures against intentional attacks: a two-stage game with incomplete information , 2013 .

[23]  Chen Wang,et al.  Quantifying Adversary Capabilities to Inform Defensive Resource Allocation , 2016, Risk analysis : an official publication of the Society for Risk Analysis.

[24]  David K. Y. Yau,et al.  Defense of Cyber Infrastructures Against Cyber‐Physical Attacks Using Game‐Theoretic Models , 2016, Risk analysis : an official publication of the Society for Risk Analysis.

[25]  Jing Zhang,et al.  Modeling a multi-target attacker-defender game with multiple attack types , 2019, Reliab. Eng. Syst. Saf..

[26]  Xiaojun Shan,et al.  Modeling cumulative defensive resource allocation against a strategic attacker in a multi-period multi-target sequential game , 2017, Reliab. Eng. Syst. Saf..

[27]  Mohammad Amin Latify,et al.  Vulnerability Analysis of Power Systems Under Physical Deliberate Attacks Considering Geographic-Cyber Interdependence of the Power System and Communication Network , 2018, IEEE Systems Journal.

[28]  David A. Moore Security Risk Assessment Methodology for the petroleum and petrochemical industries , 2013 .

[29]  Jing Zhang,et al.  Modeling multi-target defender-attacker games with quantal response attack strategies , 2021, Reliab. Eng. Syst. Saf..

[30]  Xiaojun Shan,et al.  Subsidizing to disrupt a terrorism supply chain—a four-player game , 2014, J. Oper. Res. Soc..

[31]  Jun Zhuang,et al.  Modeling Resources Allocation in Attacker-Defender Games with "Warm Up" CSF. , 2016, Risk analysis : an official publication of the Society for Risk Analysis.

[32]  R. Selten,et al.  A Generalized Nash Solution for Two-Person Bargaining Games with Incomplete Information , 1972 .

[33]  Sarit Kraus,et al.  Bayesian stackelberg games and their application for security at Los Angeles international airport , 2008, SECO.

[34]  Ciwei Gao,et al.  Risk Assessment of Malicious Attacks Against Power Systems , 2009, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[35]  Larry Samuelson,et al.  Choosing What to Protect: Strategic Defensive Allocation Against an Unknown Attacker , 2005 .

[36]  Jun Zhuang,et al.  Modeling a Multitarget Attacker-Defender Game with Budget Constraints , 2017, Decis. Anal..

[37]  Louis Anthony Tony Cox,et al.  Some Limitations of “Risk = Threat × Vulnerability × Consequence” for Risk Analysis of Terrorist Attacks , 2008 .

[38]  Melike Erol-Kantarci,et al.  A risk optimization model for enhanced power grid resilience against physical attacks , 2017 .

[39]  Xiao Guo,et al.  HiQoS: An SDN-based multipath QoS solution , 2015 .

[40]  Ricard V. Solé,et al.  Topological Vulnerability of the European Power Grid under Errors and Attacks , 2007, Int. J. Bifurc. Chaos.

[41]  Erik Jenelius,et al.  Critical infrastructure protection under imperfect attacker perception , 2010, Int. J. Crit. Infrastructure Prot..