Analysis of the cascading failure for scale-free networks based on a multi-strategy evolutionary game

H Dui, X Meng, H Xiao, J Guo - Reliability Engineering & System Safety, 2020 - Elsevier
This research studies the cascading failure in a scale-free network from the perspective of
the payoffs of nodes in a multi-strategy evolutionary game. Different from the traditional …

Reliability analysis and optimal generator allocation and protection strategy of a non-repairable power grid system

M Cao, J Guo, H Xiao, L Wu - Reliability Engineering & System Safety, 2022 - Elsevier
In a power grid system, generators may fail due to the internal structure and material
degradation caused by stress levels or work conditions. However, power grid systems may …

Resource allocation among multiple targets for a defender-attacker game with false targets consideration

X Zhang, S Ding, B Ge, B Xia, W Pedrycz - Reliability Engineering & System …, 2021 - Elsevier
Appropriate resource allocation among multiple targets plays a vital role in the defender-
attacker game. Traditional methods seldom consider the optimal resource allocation with …

Improving awareness in early stages of security analysis: A zone partition method based on GrC

H Fujita, A Gaeta, V Loia, F Orciuoli - Applied intelligence, 2019 - Springer
We present a method based on granular computing to support decision makers in analysing
and protecting large-scale infrastructures or urban areas from external attacks by identifying …

Optimal defense-attack strategies between M defenders and N attackers: A method based on cumulative prospect theory

C Lin, H Xiao, R Peng, Y Xiang - Reliability Engineering & System Safety, 2021 - Elsevier
This research studies the system defense of M defenders against N attackers. We model this
problem as a defense-attack game between M defenders and N attackers based on the …

Redundancy versus protection for a non-reparable phased-mission system subject to external impacts

R Peng, D Wu, H Xiao, L Xing, K Gao - Reliability Engineering & System …, 2019 - Elsevier
Abstract Systems that have multiple consecutive and non-overlapping phases of operations
during their missions are referred to as phased-mission systems (PMSs). Previous research …

Equilibrium analysis of bitcoin block withholding attack: A generalized model

D Wu, X Liu, X Yan, R Peng, G Li - Reliability Engineering & System Safety, 2019 - Elsevier
Block withholding attack is an action where a miner who has found a legal block chooses
not to submit it but rather directly abandons it. This attack makes the mining pool lose all …

[HTML][HTML] The collective security dilemma of preemptive strikes

KA Konrad - European Journal of Operational Research, 2024 - Elsevier
Players who are targets of potential raids can sometimes preempt some of these raids and
neutralize the raiders. These threatened players have different values to the attackers as …

Network defense and behavioral biases: An experimental study

D Woods, M Abdallah, S Bagchi, S Sundaram… - Experimental …, 2022 - Springer
How do people distribute defenses over a directed network attack graph, where they must
defend a critical node? This question is of interest to computer scientists, information …

Object defence of a single object with preventive strike of random effect

K Gao, X Yan, X Liu, R Peng - Reliability Engineering & System Safety, 2019 - Elsevier
Most existing research on system defence is restricted to passive measures such as
providing redundancy, protecting system elements, and deploying false elements. Some …