Modeling secrecy and deception in a multiple-period attacker-defender signaling game
From MaRDI portal
Publication:1046116
DOI10.1016/j.ejor.2009.07.028zbMath1177.91053OpenAlexW2009784329MaRDI QIDQ1046116
Jun Zhuang, Oguzhan Alagoz, Vicki M. Bier
Publication date: 21 December 2009
Published in: European Journal of Operational Research (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ejor.2009.07.028
game theorydynamic programmingsignaling gamemulti-period gamesecrecy and deceptiontruthful disclosure
Applications of game theory (91A80) Dynamic programming (90C39) Signaling and communication in game theory (91A28)
Related Items (47)
Hypergame theory: a model for conflict, misperception, and deception ⋮ Discrete game-theoretic analysis of defense in correlated cyber-physical systems ⋮ Tree-Based Structural Twin Support Tensor Clustering with Square Loss Function ⋮ Infrastructure security games ⋮ ACTIVE AND PASSIVE DEFENSE AGAINST MULTIPLE ATTACK FACILITIES ⋮ Modeling costly learning and counter-learning in a defender-attacker game with private defender information ⋮ Deception-Based Game Theoretical Approach to Mitigate DoS Attacks ⋮ Optimal resource distribution between protection and redundancy considering the time and uncertainties of attacks ⋮ On the value of exposure and secrecy of defense system: first-mover advantage vs. robustness ⋮ Optimal control of a terror queue ⋮ A game theoretic model for resource allocation among countermeasures with multiple attributes ⋮ Network Inspection for Detecting Strategic Attacks ⋮ Two-stage security screening strategies in the face of strategic applicants, congestions and screening errors ⋮ Defense and security planning under resource uncertainty and multi‐period commitments ⋮ Modeling bluffing behavior in signaling security games ⋮ A game‐theoretic approach for the location of terror response facilities with both disruption risk and hidden information ⋮ Military system of systems architecting with individual system contracts ⋮ A complete analysis on the risk of using quantal response: when attacker maliciously changes behavior under uncertainty ⋮ Cyber deterrence with imperfect attribution and unverifiable signaling ⋮ Balancing congestion and security in the presence of strategic applicants with private information ⋮ The risk of attacker behavioral learning: can attacker fool defender under uncertainty? ⋮ Casino rationale: countering attacker deception in zero-sum Stackelberg security games of bounded rationality ⋮ Resource Allocation for Homeland Defense: Dealing with the Team Effect ⋮ Two-Stage Invest–Defend Game: Balancing Strategic and Operational Decisions ⋮ Publicity vs. impact in nonprofit disclosures and donor preferences: a sequential game with one nonprofit organization and \(N\) donors ⋮ Systems under attack-survivability rather than reliability: concept, results, and applications ⋮ Defense and attack for interdependent systems ⋮ An approximate solution to rent-seeking contests with private information ⋮ Defense and attack of performance-sharing common bus systems ⋮ Multi-objective Stackelberg game model for water supply networks against interdictions with incomplete information ⋮ Risk evaluation and games in mine warfare considering shipcounter effects ⋮ Terrorists' eradication versus perpetual terror war ⋮ Defending against multiple different attackers ⋮ AI-based competition of autonomous vehicle fleets with application to fleet modularity ⋮ Revenge or continued attack and defense in defender-attacker conflicts ⋮ National security vs. human rights: a game theoretic analysis of the tension between these objectives ⋮ Critical infrastructure protection using secrecy -- a discrete simultaneous game ⋮ Governments' and Terrorists' Defense and Attack in a T-Period Game ⋮ Target-Hardening Decisions Based on Uncertain Multiattribute Terrorist Utility ⋮ Robust Adversarial Risk Analysis: A Level-k Approach ⋮ Modeling Credible Retaliation Threats in Deterring the Smuggling of Nuclear Weapons Using Partial Inspection—A Three-Stage Game ⋮ Information Security Investment When Hackers Disseminate Knowledge ⋮ Sequential Shortest Path Interdiction with Incomplete Information ⋮ An Adversarial Risk Analysis Framework for Batch Acceptance Problems ⋮ Sequential Shortest Path Interdiction with Incomplete Information and Limited Feedback ⋮ Value of information for a leader-follower partially observed Markov game ⋮ Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender-attacker game
Cites Work
- Unnamed Item
- Unnamed Item
- False targets efficiency in defense strategy
- Impact of demand correlation on the value of and incentives for information sharing in a supply chain
- The relevance of private information in mechanism design
- Contest success functions
- Manufacturer's revenue-sharing contract and retail competition
- Strategic defense and attack for series and parallel reliability systems
- Dynamic mechanism design with hidden income and hidden actions
- Strategic information sharing in a supply chain
- Information Sharing in a Supply Chain with Horizontal Competition
- Balancing Terrorism and Natural Disasters—Defensive Strategy with Endogenous Attacker Effort
- A Dynamic Principal-Agent Model with Hidden Information: Sequential Optimality Through Truthful State Revelation
- Allocation of Cost Savings in a Three-Level Supply Chain with Demand Information Sharing: A Cooperative-Game Approach
- A Two-Sided Optimization for Theater Ballistic Missile Defense
- Negative Dynamic Programming
- Dynamic games with hidden actions and hidden states
This page was built for publication: Modeling secrecy and deception in a multiple-period attacker-defender signaling game