A review of attacker-defender games: Current state and paths forward

K Hunt, J Zhuang - European Journal of Operational Research, 2024 - Elsevier
In this article, we review the literature which proposes attacker-defender games to protect
against strategic adversarial threats. More specifically, we follow the systematic literature …

基于攻防博弈的网络防御决策方法研究综述

刘小虎, 张恒巍, 马军强, 张玉臣… - 网络与信息安全 …, 2022 - infocomm-journal.com
博弈论研究冲突对抗条件下最优决策问题, 是网络空间安全的基础理论之一,
能够为解决网络防御决策问题提供理论依据. 提炼网络攻防所具备的目标对立, 策略依存 …

Critical risks in global supply networks: A static structure and dynamic propagation perspective

X Yue, D Mu, C Wang, H Ren, R Peng, J Du - Reliability engineering & …, 2024 - Elsevier
The global fragmentation of supply networks results from outsourcing and offshoring
strategies. Supply networks outsource segments to specialized suppliers, thereby …

Countering terrorist propaganda: Competitive resource allocation to communities

X Chen, Y Dong, J Zhuang - IISE Transactions, 2025 - Taylor & Francis
Increased terrorist propaganda has caused greater violence worldwide. Communities are
efficient channels through which terrorist organizations can access target audiences; thus …

How to react to hacker types and asset types in security decision-making

X Wu, Y Wu, Q Li, T Dai - Expert Systems with Applications, 2023 - Elsevier
To efficiently manage information security, firms typically allocate limited budgets to protect
their information assets based on asset types and hacker types. This paper builds a game …

Optimal interception strategy of air defence missile system considering multiple targets and phases

K Gao, H Xiao, L Qu, S Wang - … , Part O: Journal of Risk and …, 2022 - journals.sagepub.com
Due to the rapid development and wide application of air attack weapons, air defence
missiles against them are increasingly important and have become the main air defence …

A game-theoretical model of firm security reactions responding to a strategic hacker in a competitive industry

Y Wu, H Xiao, T Dai, D Cheng - Journal of the Operational …, 2022 - Taylor & Francis
The tendency of strategic hackers to attack specific industries brings new challenges for
information security management. This paper examines the interaction between firms in a …

Attack–defense game in interdependent networks: A functional perspective

J Sun, S Wang, J Zhang, Q Dong - Journal of Infrastructure Systems, 2023 - ascelibrary.org
The normal operation of critical infrastructure is related to the stability of society and a
country's development. Based on game theory and network science, this paper analyzes the …

GeniGraph: A genetic-based novel security defense resource allocation method for interdependent systems modeled by attack graphs

MR Al-Eiadeh, M Abdallah - Computers & Security, 2024 - Elsevier
We design a resource allocation framework for securing interdependent systems managed
by multiple defenders. Our framework models these multi-defender interdependent systems …

Attack-defense game modeling framework from a vulnerability perspective to protect critical infrastructure systems

Y Wu, P Guo, Y Wang, E Zio - Reliability Engineering & System Safety, 2025 - Elsevier
Critical infrastructure systems (CISs) are increasingly vulnerable to attacks due to their
complex interdependencies. To enhance the resilience of CISs against deliberate attacks …