critical infrastructure system in order to protect it from antagonistic attacks. Previous studies
have assumed that the attacker has complete information about the utilities associated with
attacks on each element. In reality, it is likely that the attacker's perception of the system is
not as precise as the defender's, due to geographical separation from the system, secrecy,
surveillance, complex system properties, etc. As a result, the attacker's actions may not be …