Modeling secrecy and deception in a multiple-period attacker-defender signaling game

From MaRDI portal
Publication:1046116

DOI10.1016/j.ejor.2009.07.028zbMath1177.91053OpenAlexW2009784329MaRDI QIDQ1046116

Jun Zhuang, Oguzhan Alagoz, Vicki M. Bier

Publication date: 21 December 2009

Published in: European Journal of Operational Research (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1016/j.ejor.2009.07.028




Related Items (47)

Hypergame theory: a model for conflict, misperception, and deceptionDiscrete game-theoretic analysis of defense in correlated cyber-physical systemsTree-Based Structural Twin Support Tensor Clustering with Square Loss FunctionInfrastructure security gamesACTIVE AND PASSIVE DEFENSE AGAINST MULTIPLE ATTACK FACILITIESModeling costly learning and counter-learning in a defender-attacker game with private defender informationDeception-Based Game Theoretical Approach to Mitigate DoS AttacksOptimal resource distribution between protection and redundancy considering the time and uncertainties of attacksOn the value of exposure and secrecy of defense system: first-mover advantage vs. robustnessOptimal control of a terror queueA game theoretic model for resource allocation among countermeasures with multiple attributesNetwork Inspection for Detecting Strategic AttacksTwo-stage security screening strategies in the face of strategic applicants, congestions and screening errorsDefense and security planning under resource uncertainty and multi‐period commitmentsModeling bluffing behavior in signaling security gamesA game‐theoretic approach for the location of terror response facilities with both disruption risk and hidden informationMilitary system of systems architecting with individual system contractsA complete analysis on the risk of using quantal response: when attacker maliciously changes behavior under uncertaintyCyber deterrence with imperfect attribution and unverifiable signalingBalancing congestion and security in the presence of strategic applicants with private informationThe risk of attacker behavioral learning: can attacker fool defender under uncertainty?Casino rationale: countering attacker deception in zero-sum Stackelberg security games of bounded rationalityResource Allocation for Homeland Defense: Dealing with the Team EffectTwo-Stage Invest–Defend Game: Balancing Strategic and Operational DecisionsPublicity vs. impact in nonprofit disclosures and donor preferences: a sequential game with one nonprofit organization and \(N\) donorsSystems under attack-survivability rather than reliability: concept, results, and applicationsDefense and attack for interdependent systemsAn approximate solution to rent-seeking contests with private informationDefense and attack of performance-sharing common bus systemsMulti-objective Stackelberg game model for water supply networks against interdictions with incomplete informationRisk evaluation and games in mine warfare considering shipcounter effectsTerrorists' eradication versus perpetual terror warDefending against multiple different attackersAI-based competition of autonomous vehicle fleets with application to fleet modularityRevenge or continued attack and defense in defender-attacker conflictsNational security vs. human rights: a game theoretic analysis of the tension between these objectivesCritical infrastructure protection using secrecy -- a discrete simultaneous gameGovernments' and Terrorists' Defense and Attack in a T-Period GameTarget-Hardening Decisions Based on Uncertain Multiattribute Terrorist UtilityRobust Adversarial Risk Analysis: A Level-k ApproachModeling Credible Retaliation Threats in Deterring the Smuggling of Nuclear Weapons Using Partial Inspection—A Three-Stage GameInformation Security Investment When Hackers Disseminate KnowledgeSequential Shortest Path Interdiction with Incomplete InformationAn Adversarial Risk Analysis Framework for Batch Acceptance ProblemsSequential Shortest Path Interdiction with Incomplete Information and Limited FeedbackValue of information for a leader-follower partially observed Markov gameHybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender-attacker game



Cites Work


This page was built for publication: Modeling secrecy and deception in a multiple-period attacker-defender signaling game