A review of attacker-defender games: current state and paths forward
From MaRDI portal
Publication:6555126
DOI10.1016/j.ejor.2023.04.009MaRDI QIDQ6555126
Publication date: 14 June 2024
Published in: European Journal of Operational Research (Search for Journal in Brave)
Cites Work
- Unnamed Item
- Unnamed Item
- Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender-attacker game
- Infrastructure security games
- Individual versus overarching protection and attack of assets
- Modeling costly learning and counter-learning in a defender-attacker game with private defender information
- On the value of exposure and secrecy of defense system: first-mover advantage vs. robustness
- A game theoretic model for resource allocation among countermeasures with multiple attributes
- Improving resource allocation strategies against human adversaries in security games: an extended study
- Balancing congestion and security in the presence of strategic applicants with private information
- Determining all Nash equilibria in a (bi-linear) inspection game
- A single-shot game of multi-period inspection
- Robust solutions to Stackelberg games: addressing bounded rationality and limited observations in human cognition
- Endogenizing the sticks and carrots: modeling possible perverse effects of counterterrorism measures
- A Stackelberg game model for resource allocation in cargo container security
- Analytical method to identify the number of containers to inspect at U.S. ports to deter terrorist attacks
- Defending against multiple different attackers
- Discrete game-theoretic analysis of defense in correlated cyber-physical systems
- Location of terror response facilities: a game between state and terrorist
- Nature plays with dice - terrorists do not: Allocating resources to counter strategic versus probabilistic risks
- False targets efficiency in defense strategy
- Terror and counterterror operations: Differential game with cyclical Nash solution
- Sequential, nonzero-sum ``Blotto: allocating defensive resources prior to attack
- Modeling secrecy and deception in a multiple-period attacker-defender signaling game
- A two-resource allocation algorithm with an application to large-scale zero-sum defensive games
- Security screening queues with impatient applicants: a new model with a case study
- Two-stage security screening strategies in the face of strategic applicants, congestions and screening errors
- Defense and attack for interdependent systems
- Defense and attack of performance-sharing common bus systems
- Patrolling security games: definition and algorithms for solving large instances with single patroller and single intruder
- Patrolling a perimeter
- A study of general and security Stackelberg game formulations
- Revenge or continued attack and defense in defender-attacker conflicts
- Counterfactual regret minimization for integrated cyber and air defense resource allocation
- Adversarial risk analysis under partial information
- Stackelberg production-protection games: defending crop production against intentional attacks
- Gradient methods for solving Stackelberg games
- A survey of network interdiction models and algorithms
- Prepositioning of assets and supplies in disaster operations management: review and research gap identification
- OR/MS research in disaster operations management
- Strategic defense and attack for series and parallel reliability systems
- Whether to attack a terrorist's resource stock today or tomorrow
- Non-cooperative games
- A Game Theoretic Model for the Optimal Location of Integrated Air Defense System Missile Batteries
- A Graph Patrol Problem with Random Attack Times
- Optimal Allocation of Resources in Airport Security: Profiling vs. Screening
- Patrolling Games
- Patrolling a Border
- Resource Allocation for Homeland Defense: Dealing with the Team Effect
- Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness
- Protecting complex infrastructures against multiple strategic attackers
- Weakest-link attacker-defender games with multiple attack technologies
- Balancing Terrorism and Natural Disasters—Defensive Strategy with Endogenous Attacker Effort
- Optimizing Multinomial Logit Profit Functions
- Governments' and Terrorists' Defense and Attack in a T-Period Game
- Deterring the Smuggling of Nuclear Weapons in Container Freight Through Detection and Retaliation
- Target-Hardening Decisions Based on Uncertain Multiattribute Terrorist Utility
- Robust Adversarial Risk Analysis: A Level-k Approach
- Adversarial Risk Analysis: The Somali Pirates Case
- Modeling Credible Retaliation Threats in Deterring the Smuggling of Nuclear Weapons Using Partial Inspection—A Three-Stage Game
- Modeling a Multitarget Attacker–Defender Game with Budget Constraints
- Game-Theoretic Patrolling with Dynamic Execution Uncertainty and a Case Study on a Real Transit System
- Securing Gates of a Protected Area: A Hybrid Game and Queueing Theory Modeling Approach
- Two-Stage Invest–Defend Game: Balancing Strategic and Operational Decisions
- Timely exposure of a secret project: Which activities to monitor?
- Adversarial Risk Analysis
- Equilibrium Points of Bimatrix Games
- The Theory of Play and Integral Equations with Skew Symmetric Kernels
- A game‐theoretic approach for the location of terror response facilities with both disruption risk and hidden information
- A sequential partial information bomber‐defender shooting problem
- Adversarial risk analysis: an overview
This page was built for publication: A review of attacker-defender games: current state and paths forward