2020
DOI: 10.1016/j.ress.2019.106651
|View full text |Cite
|
Sign up to set email alerts
|

Defending a parallel system against a strategic attacker with redundancy, protection and disinformation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
9
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 20 publications
(9 citation statements)
references
References 30 publications
0
9
0
Order By: Relevance
“…The application of game theory to analyze the strategic choices of a firm in EIS literature has gained attention in recent times (Wu et al , 2017; Qian et al , 2018; Miaoui and Boudriga, 2019; Xu and Zhuang, 2019; Feng et al , 2020; Li and Xu, 2020; Peng et al , 2020; Wu et al , 2020; Zhai et al , 2020). Laszka et al (2015) provide a detailed literature review of existing research on strategic games under a full-information setting.…”
Section: Literature Reviewmentioning
confidence: 99%
See 2 more Smart Citations
“…The application of game theory to analyze the strategic choices of a firm in EIS literature has gained attention in recent times (Wu et al , 2017; Qian et al , 2018; Miaoui and Boudriga, 2019; Xu and Zhuang, 2019; Feng et al , 2020; Li and Xu, 2020; Peng et al , 2020; Wu et al , 2020; Zhai et al , 2020). Laszka et al (2015) provide a detailed literature review of existing research on strategic games under a full-information setting.…”
Section: Literature Reviewmentioning
confidence: 99%
“…We observe that broadly two forms of probability functions are adopted in the extant game-theoretic EIS literature: BPF first proposed by Gordon and Loeb (2002), modified by Cavusoglu et al (2008) and used in a multitude of cybersecurity investment problems (Huang et al , 2008; Kim and Kim, 2016; Young et al , 2016; Ezhei and Ladani, 2017; Qian et al , 2017; Wu et al , 2017; Ezhei and Ladani, 2018; Qian et al , 2018; Miaoui and Boudriga, 2019; Dou et al , 2020; Feng et al , 2020; Gordon et al , 2020; Li and Xu, 2020; Wu et al , 2020). Contest success function (CSF) introduced in rent-seeking literature and widely applied by Hausken and associates (Hausken and Bier, 2011; Hausken and Zhuang, 2012; Hausken, 2017a; Hausken, 2017b; Hausken, 2017c; Hausken, 2019) and other scholars (Gao et al , 2014; Peng et al , 2016; Guan et al , 2017; Wu et al , 2018; Wu et al , 2019; Xu and Zhuang, 2019; Wu et al , 2020; Peng et al , 2020; Xiao et al , 2020; Zhai et al , 2020) for modeling defender-attacker problems. …”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Tullock's contest success model is the most commonly used model. For its specific description, see studies such as Bocchetti, Giorgio, Guida, and Pulcini (2009), Peng, Wu, and Zhai (2018), Peng, Zhai, and Levitin (2016) and Peng, Xiao, Guo, and Lin (2019).…”
Section: Introductionmentioning
confidence: 99%
“…MoS 2 quantum dots (QDs) with ultra-small sizes and many more active sites are beneficial for HER. Based on this, many methods including hydrothermal method [8][9][10], microwaveassisted synthesis [11], sono-chemical exfoliation [12] are developed to prepare MoS 2 QDs. However, MoS 2 QDs with ultra-small sizes are easy to aggregate and has poor conductivity, which seriously affects their electrocatalytic performance toward HER.…”
Section: Introductionmentioning
confidence: 99%