Modeling secrecy and deception in a multiple-period attacker-defender signaling game

From MaRDI portal
Revision as of 00:05, 31 January 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:1046116


DOI10.1016/j.ejor.2009.07.028zbMath1177.91053MaRDI QIDQ1046116

Jun Zhuang, Oguzhan Alagoz, Vicki M. Bier

Publication date: 21 December 2009

Published in: European Journal of Operational Research (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1016/j.ejor.2009.07.028


91A80: Applications of game theory

90C39: Dynamic programming

91A28: Signaling and communication in game theory


Related Items

Governments' and Terrorists' Defense and Attack in a T-Period Game, Target-Hardening Decisions Based on Uncertain Multiattribute Terrorist Utility, Robust Adversarial Risk Analysis: A Level-k Approach, Modeling Credible Retaliation Threats in Deterring the Smuggling of Nuclear Weapons Using Partial Inspection—A Three-Stage Game, Information Security Investment When Hackers Disseminate Knowledge, Sequential Shortest Path Interdiction with Incomplete Information, An Adversarial Risk Analysis Framework for Batch Acceptance Problems, Tree-Based Structural Twin Support Tensor Clustering with Square Loss Function, Network Inspection for Detecting Strategic Attacks, Two-Stage Invest–Defend Game: Balancing Strategic and Operational Decisions, Sequential Shortest Path Interdiction with Incomplete Information and Limited Feedback, Defense and security planning under resource uncertainty and multi‐period commitments, Modeling bluffing behavior in signaling security games, A game‐theoretic approach for the location of terror response facilities with both disruption risk and hidden information, A complete analysis on the risk of using quantal response: when attacker maliciously changes behavior under uncertainty, Cyber deterrence with imperfect attribution and unverifiable signaling, The risk of attacker behavioral learning: can attacker fool defender under uncertainty?, Casino rationale: countering attacker deception in zero-sum Stackelberg security games of bounded rationality, Value of information for a leader-follower partially observed Markov game, Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender-attacker game, Hypergame theory: a model for conflict, misperception, and deception, Infrastructure security games, Modeling costly learning and counter-learning in a defender-attacker game with private defender information, Optimal resource distribution between protection and redundancy considering the time and uncertainties of attacks, On the value of exposure and secrecy of defense system: first-mover advantage vs. robustness, Optimal control of a terror queue, A game theoretic model for resource allocation among countermeasures with multiple attributes, Balancing congestion and security in the presence of strategic applicants with private information, Publicity vs. impact in nonprofit disclosures and donor preferences: a sequential game with one nonprofit organization and \(N\) donors, Defending against multiple different attackers, Critical infrastructure protection using secrecy -- a discrete simultaneous game, Discrete game-theoretic analysis of defense in correlated cyber-physical systems, Military system of systems architecting with individual system contracts, Two-stage security screening strategies in the face of strategic applicants, congestions and screening errors, Systems under attack-survivability rather than reliability: concept, results, and applications, Defense and attack for interdependent systems, An approximate solution to rent-seeking contests with private information, Defense and attack of performance-sharing common bus systems, Multi-objective Stackelberg game model for water supply networks against interdictions with incomplete information, Risk evaluation and games in mine warfare considering shipcounter effects, AI-based competition of autonomous vehicle fleets with application to fleet modularity, Revenge or continued attack and defense in defender-attacker conflicts, National security vs. human rights: a game theoretic analysis of the tension between these objectives, Terrorists' eradication versus perpetual terror war, Resource Allocation for Homeland Defense: Dealing with the Team Effect, ACTIVE AND PASSIVE DEFENSE AGAINST MULTIPLE ATTACK FACILITIES, Deception-Based Game Theoretical Approach to Mitigate DoS Attacks



Cites Work