Modeling costly learning and counter-learning in a defender-attacker game with private defender information
From MaRDI portal
Publication:314785
DOI10.1007/S10479-014-1722-3zbMath1345.91064OpenAlexW2168868668MaRDI QIDQ314785
Publication date: 16 September 2016
Published in: Annals of Operations Research (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10479-014-1722-3
game theorycostly learningcounter-learningdefender-attacker gamesvalue of imperfect informationvalue of perfect information
Applications of game theory (91A80) Rationality and learning in game theory (91A26) Mathematical sociology (including anthropology) (91D99)
Related Items (6)
A game theoretic model for resource allocation among countermeasures with multiple attributes ⋮ Two-stage security screening strategies in the face of strategic applicants, congestions and screening errors ⋮ Adversarial risk analysis under partial information ⋮ Espionage and the optimal standard of the customs-trade partnership against terrorism (C-TPAT) program in maritime security ⋮ Sequential Shortest Path Interdiction with Incomplete Information ⋮ Sequential Shortest Path Interdiction with Incomplete Information and Limited Feedback
Cites Work
- Unnamed Item
- Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender-attacker game
- Analytical method to identify the number of containers to inspect at U.S. ports to deter terrorist attacks
- Sequential, nonzero-sum ``Blotto: allocating defensive resources prior to attack
- Modeling secrecy and deception in a multiple-period attacker-defender signaling game
- The Colonel Blotto game
- Toward a Theory of Continuous Improvement and the Learning Curve
- Patrolling Games
- Balancing Terrorism and Natural Disasters—Defensive Strategy with Endogenous Attacker Effort
- Governments' and Terrorists' Defense and Attack in a T-Period Game
- Adversarial Risk Analysis
- Expert Elicitation of Adversary Preferences Using Ordinal Judgments
- A Two-Sided Optimization for Theater Ballistic Missile Defense
This page was built for publication: Modeling costly learning and counter-learning in a defender-attacker game with private defender information