[HTML][HTML] A review of attacker-defender games: Current state and paths forward
In this article, we review the literature which proposes attacker-defender games to protect
against strategic adversarial threats. More specifically, we follow the systematic literature …
against strategic adversarial threats. More specifically, we follow the systematic literature …
[HTML][HTML] Game theory meets wireless sensor networks security requirements and threats mitigation: A survey
We present a study of using game theory for protecting wireless sensor networks (WSNs)
from selfish behavior or malicious nodes. Due to scalability, low complexity and …
from selfish behavior or malicious nodes. Due to scalability, low complexity and …
Interplay of rumor propagation and clarification on social media during crisis events-A game-theoretic approach
For a rapid dissemination of information during crisis events, official agencies and disaster
relief organizations have been utilizing social media platforms, which are susceptible to …
relief organizations have been utilizing social media platforms, which are susceptible to …
Managing consumer behavior toward on-time return of the waste electrical and electronic equipment: A game theoretic approach
Increasing the collection rate of used products depends on how end users perceive the
value of a used product and benefits of returning it. It is empirically proven that consumers …
value of a used product and benefits of returning it. It is empirically proven that consumers …
Information sharing in cybersecurity: A review
A Pala, J Zhuang - Decision Analysis, 2019 - pubsonline.informs.org
In this survey, we review the cybersecurity information-sharing literature, categorizing the
identified papers based on their main focus and methodological approaches implemented to …
identified papers based on their main focus and methodological approaches implemented to …
A game-theoretic approach to modeling attacks and defenses of smart grids at three levels
As optimization, user capabilities, and data-taking abilities are incorporated into next-
generation power grids, or smart grids, they face cyber threats. The traditional electrical grid …
generation power grids, or smart grids, they face cyber threats. The traditional electrical grid …
[PDF][PDF] Fifty Years of Operations Research in Defense
K Hausken - Eur. J. Oper. Res, 2024 - researchgate.net
ABSTRACT The OR (Operations Research) in defense literature is reviewed. Various OR
methodologies are outlined, eg decision theory, game theory, mergers of differential …
methodologies are outlined, eg decision theory, game theory, mergers of differential …
50 years of Operations Research in Defense–a European Perspective
K Hausken - European Journal of Operational Research, 2024 - Elsevier
Abstract The OR (Operations Research) in defense literature is reviewed. Various OR
methodologies are outlined, eg decision theory, game theory, mergers of differential …
methodologies are outlined, eg decision theory, game theory, mergers of differential …
Stochastic shortest path network interdiction with a case study of Arizona–Mexico border
J Zhang, J Zhuang, B Behlendorf - Reliability Engineering & System Safety, 2018 - Elsevier
One of the key challenges in securing the US-Mexico border is the smuggling of illicit goods
and humans between Ports-of-Entry (POEs). A confluence of factors advantageous to …
and humans between Ports-of-Entry (POEs). A confluence of factors advantageous to …