This paper analyzes the optimal strategies for an attacker and a defender in an attack-defense game on a network consisting of interdependent subnetworks. The defender moves first and allocates its resource to protect the network nodes. The attacker then moves and allocates its resources to attack the network nodes. The binary decision diagram is employed to obtain all potential states of the network system after attack. Considering each of its opponent’s strategies, the game player tries to maximize its own cumulative prospect value. The backward induction method is employed to obtain the game players’ optimal strategies, respectively. Different resource relationships are analyzed to testify the robustness of the main conclusions and playe...
This dissertation presents research that focuses on efficient allocation of defense resources to min...
We investigate the impacts of game-theoretic and behavioral decision-making in two broad classes of ...
Connections between individuals facilitate the exchange of goods, resources and information and crea...
This paper analyzes the optimal strategies for the attacker in an attack-defense game on a network c...
This paper analyses the optimal strategies for one defender and two attackers in a defence-attack ga...
Maintaining the security of critical infrastructure networks is vital for a modern economy. This pap...
We propose interdependent defense (IDD) games, a computational game-theoretic framework to study asp...
Today, information security in defender-attacker game models is getting more attention from the rese...
Today, information security in defender-attacker game models is getting more attention from the rese...
The evolution of interactions between individuals or organizations are a central theme of complexity...
In the multistep attack scenario, each rational attack-defense player tries to maximize his payoff, ...
We present a new analysis of multi-hop network security in the form of a zero-sum game played betwee...
Roughly speaking, Interdependent Defense (IDD) games, previously proposed, model the situation where...
Today, information security in defender-attacker game models is getting more attention from the rese...
We study a security game over a network played between a defender and k attackers. Every attacker ch...
This dissertation presents research that focuses on efficient allocation of defense resources to min...
We investigate the impacts of game-theoretic and behavioral decision-making in two broad classes of ...
Connections between individuals facilitate the exchange of goods, resources and information and crea...
This paper analyzes the optimal strategies for the attacker in an attack-defense game on a network c...
This paper analyses the optimal strategies for one defender and two attackers in a defence-attack ga...
Maintaining the security of critical infrastructure networks is vital for a modern economy. This pap...
We propose interdependent defense (IDD) games, a computational game-theoretic framework to study asp...
Today, information security in defender-attacker game models is getting more attention from the rese...
Today, information security in defender-attacker game models is getting more attention from the rese...
The evolution of interactions between individuals or organizations are a central theme of complexity...
In the multistep attack scenario, each rational attack-defense player tries to maximize his payoff, ...
We present a new analysis of multi-hop network security in the form of a zero-sum game played betwee...
Roughly speaking, Interdependent Defense (IDD) games, previously proposed, model the situation where...
Today, information security in defender-attacker game models is getting more attention from the rese...
We study a security game over a network played between a defender and k attackers. Every attacker ch...
This dissertation presents research that focuses on efficient allocation of defense resources to min...
We investigate the impacts of game-theoretic and behavioral decision-making in two broad classes of ...
Connections between individuals facilitate the exchange of goods, resources and information and crea...