Defending against multiple different attackers
From MaRDI portal
Publication:713120
DOI10.1016/j.ejor.2010.12.013zbMath1250.91021OpenAlexW2015632107MaRDI QIDQ713120
Publication date: 26 October 2012
Published in: European Journal of Operational Research (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ejor.2010.12.013
Related Items (17)
Defense against an opportunistic challenger: theory and experiments ⋮ Multithreat multisite protection: a security case study ⋮ Natural disasters and their impact on cooperation against a common enemy ⋮ The price of defense ⋮ Two-Stage Invest–Defend Game: Balancing Strategic and Operational Decisions ⋮ An approximate solution to rent-seeking contests with private information ⋮ Defense and attack of performance-sharing common bus systems ⋮ Multi-objective Stackelberg game model for water supply networks against interdictions with incomplete information ⋮ Governmental combat of the dynamics of multiple competing terrorist organizations ⋮ Revenge or continued attack and defense in defender-attacker conflicts ⋮ Critical infrastructure protection using secrecy -- a discrete simultaneous game ⋮ Information Security Investment When Hackers Disseminate Knowledge ⋮ Skills, Efficiency, and Timing in a Simple Attack and Defense Model ⋮ An Adversarial Risk Analysis Framework for Batch Acceptance Problems ⋮ Attacking and defending multiple valuable secrets in a big data world ⋮ How to preempt attacks in multi-front conflict with limited resources ⋮ Governments Playing Games and Combating the Dynamics of a Terrorist Organization
Cites Work
- Unnamed Item
- Optimal resource allocation for security in reliability systems
- A network game with attackers and a defender
- Modeling secrecy and deception in a multiple-period attacker-defender signaling game
- The ecology of terror defense
- Interdependent security
- Contest success functions
- Inoculation strategies for victims of viruses and the sum-of-squares partition problem
- Balancing Terrorism and Natural Disasters—Defensive Strategy with Endogenous Attacker Effort
This page was built for publication: Defending against multiple different attackers