This research studies the defense strategy of an interdependent system in the face of rational attacks. We proposed a new model of sequential game between an attacker and a defender on an interdependent system of systems (SoS) to explore the effect of interdependency on the optimal defense strategy. An algorithm of backward induction is developed to determine the equilibrium path of the game. The attacker is the first mover as he applies an attack strategy on constituent systems that maximize his utility. The defender observes and responds by an optimal defense strategy which maximizes her utility. The utility is evaluated as the difference between a player’s reward and the cost of the action. The sensitivity analysis is carried out to comp...
In the multistep attack scenario, each rational attack-defense player tries to maximize his payoff, ...
Past work on tournaments in iterated prisoner’s dilemma and the evolution of cooperation spawned by ...
Evolutionary game theory is widely applied in network attack and defense. The existing network attac...
Cyber-physical systems (CPS) consist of cyber and physical components linked together which are inte...
This paper examines theory and behavior in a two-player game of siege, sequential attack and defense...
Most of the cybersecurity research focus on either presenting a specific vulnerability %or hacking t...
Today, resource allocation in defender-attacker game models is getting more attention from the resea...
Today, information security in defender-attacker game models is getting more attention from the rese...
We study a strategic, two-player, sequential game between an attacker and defender. The defender mu...
Risks faced by information system operators and users are not only determined by their own security ...
This paper analyzes the optimal strategies for an attacker and a defender in an attack-defense game ...
This paper analyzes the optimal strategies for the attacker in an attack-defense game on a network c...
This note extends the game theoretic analysis of strategic conflicts begun in earlier Seminars on Pl...
We propose a novel class of game-theoretic models for the optimal assignment of defen-sive resources...
Game Theoretic Analysis of Two Period Dependent Degraded Multistate Reliability Systems, Kjell Haus...
In the multistep attack scenario, each rational attack-defense player tries to maximize his payoff, ...
Past work on tournaments in iterated prisoner’s dilemma and the evolution of cooperation spawned by ...
Evolutionary game theory is widely applied in network attack and defense. The existing network attac...
Cyber-physical systems (CPS) consist of cyber and physical components linked together which are inte...
This paper examines theory and behavior in a two-player game of siege, sequential attack and defense...
Most of the cybersecurity research focus on either presenting a specific vulnerability %or hacking t...
Today, resource allocation in defender-attacker game models is getting more attention from the resea...
Today, information security in defender-attacker game models is getting more attention from the rese...
We study a strategic, two-player, sequential game between an attacker and defender. The defender mu...
Risks faced by information system operators and users are not only determined by their own security ...
This paper analyzes the optimal strategies for an attacker and a defender in an attack-defense game ...
This paper analyzes the optimal strategies for the attacker in an attack-defense game on a network c...
This note extends the game theoretic analysis of strategic conflicts begun in earlier Seminars on Pl...
We propose a novel class of game-theoretic models for the optimal assignment of defen-sive resources...
Game Theoretic Analysis of Two Period Dependent Degraded Multistate Reliability Systems, Kjell Haus...
In the multistep attack scenario, each rational attack-defense player tries to maximize his payoff, ...
Past work on tournaments in iterated prisoner’s dilemma and the evolution of cooperation spawned by ...
Evolutionary game theory is widely applied in network attack and defense. The existing network attac...