Infrastructure security games
From MaRDI portal
Publication:297288
DOI10.1016/j.ejor.2014.04.033zbMath1339.90105MaRDI QIDQ297288
Andrey Garnaev, Melike Baykal-Gürsoy, Zhe Duan, H. Vincent Poor
Publication date: 24 June 2016
Published in: European Journal of Operational Research (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ejor.2014.04.033
91A80: Applications of game theory
90B06: Transportation, logistics and supply chain management
90B25: Reliability, availability, maintenance, inspection in operations research
90B10: Deterministic network models in operations research
Related Items
Adversarial Patrolling in a Uniform, Probability Distributions on Partially Ordered Sets and Network Interdiction Games, Network Inspection for Detecting Strategic Attacks, Two-Stage Invest–Defend Game: Balancing Strategic and Operational Decisions, Optimal selection of IT security safeguards from an existing knowledge base, A Monte Carlo tree search approach to finding efficient patrolling schemes on graphs, Scalable min-max multi-objective cyber-security optimisation over probabilistic attack graphs, Weighted network search games with multiple hidden objects and multiple search teams, Network interdiction with asymmetric cost uncertainty, A survey of network interdiction models and algorithms, Designing networks with resiliency to edge failures using two-stage robust optimization, An iterative security game for computing robust and adaptive network flows, Integer programming methods for solving binary interdiction games, Patrolling a Border
Cites Work
- Evader interdiction: algorithms, complexity and collateral damage
- Nuclear threat detection with mobile distributed sensor networks
- Search for an immobile entity on a network
- Network search games with immobile hider, without a designated searcher starting point
- Passenger grouping with risk levels in an airport security system
- Modeling secrecy and deception in a multiple-period attacker-defender signaling game
- Search games
- Infiltration games on arbitrary graphs
- A decomposition approach for undiscounted two-person zero-sum stochastic games
- On the infiltration game
- The theory of search games and rendezvous.
- Search games and other applications of game theory
- Patrolling security games: definition and algorithms for solving large instances with single patroller and single intruder
- Deterministic network interdiction
- A note on two-person zero-sum communicating stochastic games
- Robust game theory
- Two-person zero-sum stochastic games
- Non-cooperative games
- Patrolling Games
- Balancing Terrorism and Natural Disasters—Defensive Strategy with Endogenous Attacker Effort
- TECHNICAL NOTE—Spatial Queueing Analysis of an Interdiction System to Protect Cities from a Nuclear Terrorist Attack
- A search game taking account of attributes of searching resources
- Multiagent Systems
- Optimal Interdiction of Unreactive Markovian Evaders
- Ambushing Random Walks II: Continuous Models
- Dynamic Search Games
- Searching for a Mobile Intruder in a Polygonal Region
- Inventory control under substitutable demand: A stochastic game application
- Two-Person Zero-Sum Games for Network Interdiction
- Games with Incomplete Information Played by “Bayesian” Players Part II. Bayesian Equilibrium Points
- Games with Incomplete Information Played by ‘Bayesian’ Players, Part III. The Basic Probability Distribution of the Game
- Games with Incomplete Information Played by “Bayesian” Players, I–III Part I. The Basic Model
- A Survey of Search Theory
- CANONICAL STRUCTURE OF LINEAR DYNAMICAL SYSTEMS
- A Multistage Search Game
- Stochastic Games
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item