Stackelberg game in critical infrastructures from a network science perspective
暂无分享,去创建一个
[1] Xiaojun Shan,et al. Subsidizing to disrupt a terrorism supply chain—a four-player game , 2014, J. Oper. Res. Soc..
[2] Jun Wu,et al. Attacker-defender game from a network science perspective. , 2018, Chaos.
[3] Jose Emmanuel Ramirez-Marquez,et al. Protecting critical infrastructures against intentional attacks: a two-stage game with incomplete information , 2013 .
[4] Albert-László Barabási,et al. Error and attack tolerance of complex networks , 2000, Nature.
[5] Sarit Kraus,et al. Using Game Theory for Los Angeles Airport Security , 2009, AI Mag..
[6] Gerald G. Brown,et al. How Probabilistic Risk Assessment Can Mislead Terrorism Risk Analysts , 2011, Risk analysis : an official publication of the Society for Risk Analysis.
[7] Dan Kovenock,et al. Weakest‐link attacker‐defender games with multiple attack technologies , 2012 .
[8] Milind Tambe,et al. Security and Game Theory: IRIS – A Tool for Strategic Security Allocation in Transportation Networks , 2011, AAMAS 2011.
[9] David K. Y. Yau,et al. Defense Strategies for Asymmetric Networked Systems with Discrete Components , 2018, Sensors.
[10] Bo An,et al. PROTECT: An Application of Computational Game Theory for the Security of the Ports of the United States , 2012, AAAI.
[11] Jing Zhang,et al. Stochastic shortest path network interdiction with a case study of Arizona-Mexico border , 2017, Reliab. Eng. Syst. Saf..
[12] Milind Tambe,et al. TRUSTS: Scheduling Randomized Patrols for Fare Inspection in Transit Systems , 2012, IAAI.
[13] C. F. Larry Heimann,et al. Simulation and Game-Theoretic Analysis of an Attacker-Defender Game , 2012, GameSec.
[14] John A. Sokolowski,et al. Probabilistic Risk Analysis and Terrorism Risk , 2010, Risk analysis : an official publication of the Society for Risk Analysis.
[15] Richard L. Church,et al. A bilevel mixed-integer program for critical infrastructure protection planning , 2008, Comput. Oper. Res..
[16] Claudio M. Rocco Sanseverino,et al. A holistic method for reliability performance assessment and critical components detection in complex networks , 2011 .
[17] Jun Zhuang,et al. Modeling a Multitarget Attacker-Defender Game with Budget Constraints , 2017, Decis. Anal..
[18] Qing Li,et al. Locating and protecting facilities from intentional attacks using secrecy , 2018, Reliab. Eng. Syst. Saf..
[19] Sarit Kraus,et al. Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games , 2008, AAMAS.
[20] Chi Zhang,et al. Critical infrastructure protection using secrecy - A discrete simultaneous game , 2015, Eur. J. Oper. Res..
[21] Sarit Kraus,et al. An efficient heuristic approach for security against multiple adversaries , 2007, AAMAS '07.
[22] Min Ouyang,et al. An integrated tri-level model for enhancing the resilience of facilities against intentional attacks , 2019, Ann. Oper. Res..
[23] J. Salmeron,et al. Worst-Case Interdiction Analysis of Large-Scale Electric Power Grids , 2009, IEEE Transactions on Power Systems.
[24] Quanyan Zhu,et al. Game-Theoretic Methods for Robustness, Security, and Resilience of Cyberphysical Control Systems: Games-in-Games Principle for Optimal Cross-Layer Resilient Control Systems , 2015, IEEE Control Systems.
[25] Jun Zhuang,et al. Modelling ‘contracts’ between a terrorist group and a government in a sequential game , 2012, J. Oper. Res. Soc..
[26] Manish Jain,et al. Computing optimal randomized resource allocations for massive security games , 2009, AAMAS 2009.
[27] Gerald G. Brown,et al. Defending Critical Infrastructure , 2006, Interfaces.
[28] Min Ouyang,et al. Mitigating electric power system vulnerability to worst-case spatially localized attacks , 2017, Reliab. Eng. Syst. Saf..
[29] Min Ouyang,et al. A mathematical framework to optimize resilience of interdependent critical infrastructure systems under spatially localized attacks , 2017, Eur. J. Oper. Res..
[30] Vineet M. Payyappalli,et al. Deterrence and Risk Preferences in Sequential Attacker–Defender Games with Continuous Efforts , 2017, Risk analysis : an official publication of the Society for Risk Analysis.
[31] David K. Y. Yau,et al. Defense of Cyber Infrastructures Against Cyber‐Physical Attacks Using Game‐Theoretic Models , 2016, Risk analysis : an official publication of the Society for Risk Analysis.
[32] T. Başar,et al. Dynamic Noncooperative Game Theory , 1982 .
[33] Gerald G. Brown,et al. Solving Defender-Attacker-Defender Models for Infrastructure Defense , 2011, ICS 2011.
[34] Vicki M. Bier,et al. Balancing Terrorism and Natural Disasters - Defensive Strategy with Endogenous Attacker Effort , 2007, Oper. Res..