Abstract This paper (a) describes a defender-attacker-defender sequential game model (DAD) to plan defenses for an infrastructure system that will enhance that system’s resilience against attacks by an intelligent adversary, (b) describes a realistic formulation of DAD for defending a transportation network, (c) develops a decomposition algorithm for solving this instance of DAD and others, and (d) demonstrates the solution of a small transportation-network example. A DAD model generally evaluates system operation through the solution of an optimization model, and the decomposition algo-rithm developed here requires only that this system-operation model be continuous and convex. For example, our transportation-network example incorporates a...
This paper presents a control strategy for CyberPhysical System defense developed in the framework o...
This paper presents a control strategy for Cyber-Physical System defense developed in the framework ...
Today, people rely heavily on infrastructure networks. Attacks on infrastructure networks can lead t...
104 p.The work proposed here will explore applications of game theory, optimization, and demonstrabl...
The article of record as published may be located at http://dx.doi.org//10.1287/inte.1060.0252We des...
Abstract We describe new bilevel programming models to (1) help make the country’s criti-cal infrast...
Infrastructure systems are increasingly facing new security threats due to the vulnerabilities of cy...
International audienceInfrastructure networks are vulnerable to both cyber and physical attacks. Bui...
Abstract. Previous work on Stackelberg Security Games for scheduling secu-rity resources has mostly ...
Today, information security in defender-attacker game models is getting more attention from the rese...
Critical infrastructures rely on cyber and physical components that are both subject to natural, inc...
This dissertation presents research that focuses on efficient allocation of defense resources to min...
In recent years, Stackelberg Security Games have been successfully applied to solve re-source alloca...
© 1969-2012 IEEE. In the critical infrastructure domain, there exist two distinct players, i.e., att...
Today, resource allocation in defender-attacker game models is getting more attention from the resea...
This paper presents a control strategy for CyberPhysical System defense developed in the framework o...
This paper presents a control strategy for Cyber-Physical System defense developed in the framework ...
Today, people rely heavily on infrastructure networks. Attacks on infrastructure networks can lead t...
104 p.The work proposed here will explore applications of game theory, optimization, and demonstrabl...
The article of record as published may be located at http://dx.doi.org//10.1287/inte.1060.0252We des...
Abstract We describe new bilevel programming models to (1) help make the country’s criti-cal infrast...
Infrastructure systems are increasingly facing new security threats due to the vulnerabilities of cy...
International audienceInfrastructure networks are vulnerable to both cyber and physical attacks. Bui...
Abstract. Previous work on Stackelberg Security Games for scheduling secu-rity resources has mostly ...
Today, information security in defender-attacker game models is getting more attention from the rese...
Critical infrastructures rely on cyber and physical components that are both subject to natural, inc...
This dissertation presents research that focuses on efficient allocation of defense resources to min...
In recent years, Stackelberg Security Games have been successfully applied to solve re-source alloca...
© 1969-2012 IEEE. In the critical infrastructure domain, there exist two distinct players, i.e., att...
Today, resource allocation in defender-attacker game models is getting more attention from the resea...
This paper presents a control strategy for CyberPhysical System defense developed in the framework o...
This paper presents a control strategy for Cyber-Physical System defense developed in the framework ...
Today, people rely heavily on infrastructure networks. Attacks on infrastructure networks can lead t...