A review of attacker-defender games: Current state and paths forward

K Hunt, J Zhuang - European Journal of Operational Research, 2024 - Elsevier
In this article, we review the literature which proposes attacker-defender games to protect
against strategic adversarial threats. More specifically, we follow the systematic literature …

[HTML][HTML] A resilience glossary shaped by context: Reviewing resilience-related terms for critical infrastructures

A Mentges, L Halekotte, M Schneider, T Demmer… - International journal of …, 2023 - Elsevier
We present a comprehensive resilience glossary, comprising a set of 93 definitions of
resilience-related terms used in the context of critical infrastructures. The definition and use …

Fifty years of scholarly research on terrorism: Intellectual progression, structural composition, trends and knowledge gaps of the field

M Haghani, E Kuligowski, A Rajabifard… - International Journal of …, 2022 - Elsevier
Scholarly literature on terrorism is analysed in its full scope with three main goals:(i) to
objectively determine the structural makeup of the field,(ii) to document its current and past …

Optimizing system resilience: a facility protection model with recovery time

C Losada, MP Scaparra, JR O'Hanley - European Journal of Operational …, 2012 - Elsevier
Optimizing system resilience is concerned with the development of strategies to restore a
system to normal operations as quickly and efficiently as possible following potential …

Defense of cyber infrastructures against cyber‐physical attacks using game‐theoretic models

NSV Rao, SW Poole, CYT Ma, F He, J Zhuang… - Risk …, 2016 - Wiley Online Library
The operation of cyber infrastructures relies on both cyber and physical components, which
are subject to incidental and intentional degradations of different kinds. Within the context of …

[图书][B] Modeling of security systems for critical infrastructure facilities

S Yevseiev, R Hryshchuk, K Molodetska… - 2022 - papers.ssrn.com
The development of industry 4.0 technologies makes it possible to create fundamentally new
technologies and systems based on the rapid development of computing resources. The …

Component importance measures for multi-industry vulnerability of a freight transportation network

M Darayi, K Barker, JR Santos - Networks and spatial economics, 2017 - Springer
The multi-modal freight transportation network plays an important role in the economic
vitality of states, regions, and the broader country. The functionality of this network is …

Improving awareness in early stages of security analysis: A zone partition method based on GrC

H Fujita, A Gaeta, V Loia, F Orciuoli - Applied intelligence, 2019 - Springer
We present a method based on granular computing to support decision makers in analysing
and protecting large-scale infrastructures or urban areas from external attacks by identifying …

Attack-Defense game analysis of critical infrastructure network based on Cournot model with fixed operating nodes

S Wang, J Sun, J Zhang, Q Dong, X Gu… - International Journal of …, 2023 - Elsevier
In recent years, some game models were proposed to protect critical infrastructure networks.
But they mainly focused on the protection of key nodes, and there are rarely models to …

An integrated tri-level model for enhancing the resilience of facilities against intentional attacks

S Bao, C Zhang, M Ouyang, L Miao - Annals of Operations Research, 2019 - Springer
It is paramount to enhance the resilience of many facilities that are known to be critical for
modern societies and threatened by intentional attacks. For this purpose, it is important to …