Infrastructure security games
From MaRDI portal
Publication:297288
DOI10.1016/j.ejor.2014.04.033zbMath1339.90105OpenAlexW1966962864MaRDI QIDQ297288
Andrey Garnaev, Melike Baykal-Gürsoy, Zhe Duan, H. Vincent Poor
Publication date: 24 June 2016
Published in: European Journal of Operational Research (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ejor.2014.04.033
Applications of game theory (91A80) Transportation, logistics and supply chain management (90B06) Reliability, availability, maintenance, inspection in operations research (90B25) Deterministic network models in operations research (90B10)
Related Items (15)
Optimal selection of IT security safeguards from an existing knowledge base ⋮ Probability Distributions on Partially Ordered Sets and Network Interdiction Games ⋮ Network Inspection for Detecting Strategic Attacks ⋮ An iterative security game for computing robust and adaptive network flows ⋮ Integer programming methods for solving binary interdiction games ⋮ Patrolling a Border ⋮ A two‐stage network interdiction‐monitoring game ⋮ Two-Stage Invest–Defend Game: Balancing Strategic and Operational Decisions ⋮ A Monte Carlo tree search approach to finding efficient patrolling schemes on graphs ⋮ Network interdiction with asymmetric cost uncertainty ⋮ Scalable min-max multi-objective cyber-security optimisation over probabilistic attack graphs ⋮ Weighted network search games with multiple hidden objects and multiple search teams ⋮ A survey of network interdiction models and algorithms ⋮ Designing networks with resiliency to edge failures using two-stage robust optimization ⋮ Adversarial Patrolling in a Uniform
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Evader interdiction: algorithms, complexity and collateral damage
- Nuclear threat detection with mobile distributed sensor networks
- Search for an immobile entity on a network
- Network search games with immobile hider, without a designated searcher starting point
- Passenger grouping with risk levels in an airport security system
- Modeling secrecy and deception in a multiple-period attacker-defender signaling game
- Search games
- Infiltration games on arbitrary graphs
- A decomposition approach for undiscounted two-person zero-sum stochastic games
- On the infiltration game
- The theory of search games and rendezvous.
- Search games and other applications of game theory
- Patrolling security games: definition and algorithms for solving large instances with single patroller and single intruder
- Deterministic network interdiction
- A note on two-person zero-sum communicating stochastic games
- Robust game theory
- Two-person zero-sum stochastic games
- Non-cooperative games
- Patrolling Games
- Balancing Terrorism and Natural Disasters—Defensive Strategy with Endogenous Attacker Effort
- TECHNICAL NOTE—Spatial Queueing Analysis of an Interdiction System to Protect Cities from a Nuclear Terrorist Attack
- A search game taking account of attributes of searching resources
- Multiagent Systems
- Optimal Interdiction of Unreactive Markovian Evaders
- Ambushing Random Walks II: Continuous Models
- Dynamic Search Games
- Searching for a Mobile Intruder in a Polygonal Region
- Inventory control under substitutable demand: A stochastic game application
- Two-Person Zero-Sum Games for Network Interdiction
- Games with Incomplete Information Played by “Bayesian” Players Part II. Bayesian Equilibrium Points
- Games with Incomplete Information Played by ‘Bayesian’ Players, Part III. The Basic Probability Distribution of the Game
- Games with Incomplete Information Played by “Bayesian” Players, I–III Part I. The Basic Model
- A Survey of Search Theory
- CANONICAL STRUCTURE OF LINEAR DYNAMICAL SYSTEMS
- A Multistage Search Game
- Stochastic Games
This page was built for publication: Infrastructure security games