2014
DOI: 10.1016/j.ejor.2014.04.033
|View full text |Cite
|
Sign up to set email alerts
|

Infrastructure security games

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
26
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 56 publications
(26 citation statements)
references
References 59 publications
0
26
0
Order By: Relevance
“…Another technique used to address lack of information problems is state estimation. For example, [31] used a Kalman filter to estimate the state of an observable, linear, stochastic dynamic system in an infrastructure security game. Since, our system of interest is nonlinear and may not be completely-observable, applicability of these techniques is also very limited.…”
Section: B Related Workmentioning
confidence: 99%
“…Another technique used to address lack of information problems is state estimation. For example, [31] used a Kalman filter to estimate the state of an observable, linear, stochastic dynamic system in an infrastructure security game. Since, our system of interest is nonlinear and may not be completely-observable, applicability of these techniques is also very limited.…”
Section: B Related Workmentioning
confidence: 99%
“…taking account of the total attrition on the way to the destination and Equation (4). E l is a set of arcs on the path l and E e l is a set of arcs from the start node through an arc e along the path l. From the derivation, we calculate the expectation of the game value by a defender mixed strategy g(s) and further by a mixed strategy of the h-type attacker, π h , as follows.…”
Section: Formulation and Equilibriummentioning
confidence: 99%
“…While sequentially observing the defender's position, an attacker is going to invade the region and decides to attack or not targets on the nodes he reaches, worrying about an arrest by the defender coming there during attacking the target. In the model of Baykal-Gursoy et al [4], a patrolling defender tries to mitigate the damage an attacker causes to targets placed on several nodes on a network. Garnaev et al [10] considered the same security game on a network but modeled the problem by a Bayesian game assuming two types of attackers.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Salmeron et al [43,44] considered a defense game of an electric power grid involving mitigating the damage inflicted by terrorist attacks. Baykal-Gürsoy et al [8] considered a mitigation policy of node investigations and active patrols after an attacker has damaged nodes on a network.…”
Section: Introductionmentioning
confidence: 99%