Optimal allocation of defensive resources to defend urban power networks against different types of attackers
暂无分享,去创建一个
Zhilong Chen | Xiaochao Su | Ning Zhang | Lin Han | Yipeng Wu | Xudong Zhao | Xudong Zhao | Zhilong Chen | Xiaochao Su | Yipeng Wu | Lin Han | Ning Zhang
[1] Fei Xue,et al. Structural vulnerability of power systems: A topological approach , 2011 .
[2] Quan Long,et al. Uncertainty Analysis in Software Reliability Modeling by Bayesian Analysis with Maximum-Entropy Principle , 2007, IEEE Transactions on Software Engineering.
[3] R. Powell. Defending against Terrorist Attacks with Limited Resources , 2007, American Political Science Review.
[4] Chang Liu,et al. Generalized physical layer channel model for relay- based super dense networks , 2015 .
[5] Uriel G. Rothblum,et al. Nature plays with dice - terrorists do not: Allocating resources to counter strategic versus probabilistic risks , 2009, Eur. J. Oper. Res..
[6] Mahdi Pourakbari-Kasmaei,et al. Optimal power flow problem considering multiple-fuel options and disjoint operating zones: A solver-friendly MINLP model , 2019 .
[7] Richard White,et al. A computational asset vulnerability model for the strategic protection of the critical infrastructure , 2014, Int. J. Crit. Infrastructure Prot..
[8] Jing Zhang,et al. The role of risk preferences in a multi-target defender-attacker resource allocation game , 2018, Reliab. Eng. Syst. Saf..
[9] Jr. Louis Anthony Cox,et al. Game Theory and Risk Analysis , 2009 .
[10] Henry H. Willis. Guiding Resource Allocations Based on Terrorism Risk , 2007, Risk analysis : an official publication of the Society for Risk Analysis.
[11] Lingfeng Wang,et al. A game-theoretic study of load redistribution attack and defense in power systems , 2017 .
[12] Shi-Woei Lin,et al. Should the Model for Risk‐Informed Regulation be Game Theory Rather than Decision Theory? , 2013, Risk analysis : an official publication of the Society for Risk Analysis.
[13] Kjell Hausken,et al. Defending against multiple different attackers , 2011, Eur. J. Oper. Res..
[14] Genserik Reniers,et al. A Game-Theoretical Model to Improve Process Plant Protection from Terrorist Attacks. , 2016, Risk analysis : an official publication of the Society for Risk Analysis.
[15] Wenjun Ma,et al. Ambiguous Bayesian Games , 2014, Int. J. Intell. Syst..
[16] Kjell Hausken,et al. Protecting complex infrastructures against multiple strategic attackers , 2011, Int. J. Syst. Sci..
[17] Zhilong Chen,et al. Using game theory to optimize allocation of defensive resources to protect multiple chemical facilities in a city against terrorist attacks , 2016 .
[18] Zhiheng Xu,et al. A Study on a Sequential One-Defender-N-Attacker Game. , 2019, Risk analysis : an official publication of the Society for Risk Analysis.
[19] Gerald G. Brown,et al. How Probabilistic Risk Assessment Can Mislead Terrorism Risk Analysts , 2011, Risk analysis : an official publication of the Society for Risk Analysis.
[20] Jose M. Yusta,et al. Using interconnected risk maps to assess the threats faced by electricity infrastructures , 2013, Int. J. Crit. Infrastructure Prot..
[21] Kenneth Sörensen,et al. MISTRAL: A game-theoretical model to allocate security measures in a multi-modal chemical transportation network with adaptive adversaries , 2015, Reliab. Eng. Syst. Saf..
[22] Jose Emmanuel Ramirez-Marquez,et al. Protecting critical infrastructures against intentional attacks: a two-stage game with incomplete information , 2013 .
[23] Chen Wang,et al. Quantifying Adversary Capabilities to Inform Defensive Resource Allocation , 2016, Risk analysis : an official publication of the Society for Risk Analysis.
[24] David K. Y. Yau,et al. Defense of Cyber Infrastructures Against Cyber‐Physical Attacks Using Game‐Theoretic Models , 2016, Risk analysis : an official publication of the Society for Risk Analysis.
[25] Jing Zhang,et al. Modeling a multi-target attacker-defender game with multiple attack types , 2019, Reliab. Eng. Syst. Saf..
[26] Xiaojun Shan,et al. Modeling cumulative defensive resource allocation against a strategic attacker in a multi-period multi-target sequential game , 2017, Reliab. Eng. Syst. Saf..
[27] Mohammad Amin Latify,et al. Vulnerability Analysis of Power Systems Under Physical Deliberate Attacks Considering Geographic-Cyber Interdependence of the Power System and Communication Network , 2018, IEEE Systems Journal.
[28] David A. Moore. Security Risk Assessment Methodology for the petroleum and petrochemical industries , 2013 .
[29] Jing Zhang,et al. Modeling multi-target defender-attacker games with quantal response attack strategies , 2021, Reliab. Eng. Syst. Saf..
[30] Xiaojun Shan,et al. Subsidizing to disrupt a terrorism supply chain—a four-player game , 2014, J. Oper. Res. Soc..
[31] Jun Zhuang,et al. Modeling Resources Allocation in Attacker-Defender Games with "Warm Up" CSF. , 2016, Risk analysis : an official publication of the Society for Risk Analysis.
[32] R. Selten,et al. A Generalized Nash Solution for Two-Person Bargaining Games with Incomplete Information , 1972 .
[33] Sarit Kraus,et al. Bayesian stackelberg games and their application for security at Los Angeles international airport , 2008, SECO.
[34] Ciwei Gao,et al. Risk Assessment of Malicious Attacks Against Power Systems , 2009, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[35] Larry Samuelson,et al. Choosing What to Protect: Strategic Defensive Allocation Against an Unknown Attacker , 2005 .
[36] Jun Zhuang,et al. Modeling a Multitarget Attacker-Defender Game with Budget Constraints , 2017, Decis. Anal..
[37] Louis Anthony Tony Cox,et al. Some Limitations of “Risk = Threat × Vulnerability × Consequence” for Risk Analysis of Terrorist Attacks , 2008 .
[38] Melike Erol-Kantarci,et al. A risk optimization model for enhanced power grid resilience against physical attacks , 2017 .
[39] Xiao Guo,et al. HiQoS: An SDN-based multipath QoS solution , 2015 .
[40] Ricard V. Solé,et al. Topological Vulnerability of the European Power Grid under Errors and Attacks , 2007, Int. J. Bifurc. Chaos.
[41] Erik Jenelius,et al. Critical infrastructure protection under imperfect attacker perception , 2010, Int. J. Crit. Infrastructure Prot..