A review of attacker-defender games: Current state and paths forward

K Hunt, J Zhuang - European Journal of Operational Research, 2024 - Elsevier
In this article, we review the literature which proposes attacker-defender games to protect
against strategic adversarial threats. More specifically, we follow the systematic literature …

Optimal routing, aborting and hitting strategies of UAVs executing hitting the targets considering the defense range of targets

X Zhu, X Zhu, R Yan, R Peng - Reliability Engineering & System Safety, 2021 - Elsevier
This paper is an attempt to investigate optimal routing, aborting and hitting strategies of
Unmanned Aerial Vehicles (UAVs) executing hitting tasks. Several factors such as time …

Resource allocation among multiple targets for a defender-attacker game with false targets consideration

X Zhang, S Ding, B Ge, B Xia, W Pedrycz - Reliability Engineering & System …, 2021 - Elsevier
Appropriate resource allocation among multiple targets plays a vital role in the defender-
attacker game. Traditional methods seldom consider the optimal resource allocation with …

Optimal defense-attack strategies between M defenders and N attackers: A method based on cumulative prospect theory

C Lin, H Xiao, R Peng, Y Xiang - Reliability Engineering & System Safety, 2021 - Elsevier
This research studies the system defense of M defenders against N attackers. We model this
problem as a defense-attack game between M defenders and N attackers based on the …

Optimal interception strategy of air defence missile system considering multiple targets and phases

K Gao, H Xiao, L Qu, S Wang - … , Part O: Journal of Risk and …, 2022 - journals.sagepub.com
Due to the rapid development and wide application of air attack weapons, air defence
missiles against them are increasingly important and have become the main air defence …

A game-theoretical model of firm security reactions responding to a strategic hacker in a competitive industry

Y Wu, H Xiao, T Dai, D Cheng - Journal of the Operational …, 2022 - Taylor & Francis
The tendency of strategic hackers to attack specific industries brings new challenges for
information security management. This paper examines the interaction between firms in a …

Multistage attack–defense graph game analysis for protection resources allocation optimization against cyber attacks considering rationality evolution

C Shao, YF Li - Risk Analysis, 2022 - Wiley Online Library
Cyber vulnerabilities become ever more critical in modern industrial systems since the
attacker can utilize the vulnerabilities to degrade their performance or even cause disasters …

Firm investment decisions for information security under a fuzzy environment: a game-theoretic approach

R Gupta, B Biswas, I Biswas, SS Sana - Information & Computer …, 2021 - emerald.com
Purpose This paper aims to examine optimal decisions for information security investments
for a firm in a fuzzy environment. Under both sequential and simultaneous attack scenarios …

Deriving optimal defensive resource deployment of complex system-of-systems for risk response considering cascading effect

J Zhang, Z Fang, L Tao, S Wu, W Dong… - Journal of the …, 2024 - Taylor & Francis
As disruptions happen with increasing frequency, over-deployment or insufficient
deployment can lead to inefficiency or defensive failure for security risk management …

Defending a series system with individual protection, overarching protection, and disinformation

C Lin, H Xiao, G Kou, R Peng - Reliability Engineering & System Safety, 2020 - Elsevier
This research addresses the use of individual protection, overarching protection, and
disinformation to defend a series system against intentional attacks. The attacker can …