Modeling secrecy and deception in a multiple-period attacker-defender signaling game

From MaRDI portal
Publication:1046116


DOI10.1016/j.ejor.2009.07.028zbMath1177.91053MaRDI QIDQ1046116

Jun Zhuang, Oguzhan Alagoz, Vicki M. Bier

Publication date: 21 December 2009

Published in: European Journal of Operational Research (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1016/j.ejor.2009.07.028


91A80: Applications of game theory

90C39: Dynamic programming

91A28: Signaling and communication in game theory


Related Items

Governments' and Terrorists' Defense and Attack in a T-Period Game, Target-Hardening Decisions Based on Uncertain Multiattribute Terrorist Utility, Robust Adversarial Risk Analysis: A Level-k Approach, Modeling Credible Retaliation Threats in Deterring the Smuggling of Nuclear Weapons Using Partial Inspection—A Three-Stage Game, Information Security Investment When Hackers Disseminate Knowledge, Sequential Shortest Path Interdiction with Incomplete Information, Value of information for a leader-follower partially observed Markov game, Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender-attacker game, Hypergame theory: a model for conflict, misperception, and deception, Infrastructure security games, Modeling costly learning and counter-learning in a defender-attacker game with private defender information, Optimal resource distribution between protection and redundancy considering the time and uncertainties of attacks, On the value of exposure and secrecy of defense system: first-mover advantage vs. robustness, Optimal control of a terror queue, A game theoretic model for resource allocation among countermeasures with multiple attributes, Balancing congestion and security in the presence of strategic applicants with private information, Publicity vs. impact in nonprofit disclosures and donor preferences: a sequential game with one nonprofit organization and \(N\) donors, Defending against multiple different attackers, Critical infrastructure protection using secrecy -- a discrete simultaneous game, Military system of systems architecting with individual system contracts, Two-stage security screening strategies in the face of strategic applicants, congestions and screening errors, Systems under attack-survivability rather than reliability: concept, results, and applications, Defense and attack for interdependent systems, An approximate solution to rent-seeking contests with private information, Defense and attack of performance-sharing common bus systems, Multi-objective Stackelberg game model for water supply networks against interdictions with incomplete information, Risk evaluation and games in mine warfare considering shipcounter effects, Terrorists' eradication versus perpetual terror war, Resource Allocation for Homeland Defense: Dealing with the Team Effect, ACTIVE AND PASSIVE DEFENSE AGAINST MULTIPLE ATTACK FACILITIES, Deception-Based Game Theoretical Approach to Mitigate DoS Attacks



Cites Work