[HTML][HTML] A review of attacker-defender games: Current state and paths forward

K Hunt, J Zhuang - European Journal of Operational Research, 2024 - Elsevier
In this article, we review the literature which proposes attacker-defender games to protect
against strategic adversarial threats. More specifically, we follow the systematic literature …

[HTML][HTML] Game theory meets wireless sensor networks security requirements and threats mitigation: A survey

MS Abdalzaher, K Seddik, M Elsabrouty, O Muta… - Sensors, 2016 - mdpi.com
We present a study of using game theory for protecting wireless sensor networks (WSNs)
from selfish behavior or malicious nodes. Due to scalability, low complexity and …

Interplay of rumor propagation and clarification on social media during crisis events-A game-theoretic approach

P Agarwal, R Al Aziz, J Zhuang - European Journal of Operational …, 2022 - Elsevier
For a rapid dissemination of information during crisis events, official agencies and disaster
relief organizations have been utilizing social media platforms, which are susceptible to …

[图书][B] Adversarial risk analysis

DL Banks, JMR Aliaga, DR Insua - 2015 - books.google.com
This book shows decision makers how to build Bayesian models for the strategic calculation
of their opponents, enabling decision makers to maximize their expected utility or minimize …

Managing consumer behavior toward on-time return of the waste electrical and electronic equipment: A game theoretic approach

M Sabbaghi, S Behdad, J Zhuang - International Journal of Production …, 2016 - Elsevier
Increasing the collection rate of used products depends on how end users perceive the
value of a used product and benefits of returning it. It is empirically proven that consumers …

Information sharing in cybersecurity: A review

A Pala, J Zhuang - Decision Analysis, 2019 - pubsonline.informs.org
In this survey, we review the cybersecurity information-sharing literature, categorizing the
identified papers based on their main focus and methodological approaches implemented to …

A game-theoretic approach to modeling attacks and defenses of smart grids at three levels

XG Shan, J Zhuang - Reliability Engineering & System Safety, 2020 - Elsevier
As optimization, user capabilities, and data-taking abilities are incorporated into next-
generation power grids, or smart grids, they face cyber threats. The traditional electrical grid …

[PDF][PDF] Fifty Years of Operations Research in Defense

K Hausken - Eur. J. Oper. Res, 2024 - researchgate.net
ABSTRACT The OR (Operations Research) in defense literature is reviewed. Various OR
methodologies are outlined, eg decision theory, game theory, mergers of differential …

50 years of Operations Research in Defense–a European Perspective

K Hausken - European Journal of Operational Research, 2024 - Elsevier
Abstract The OR (Operations Research) in defense literature is reviewed. Various OR
methodologies are outlined, eg decision theory, game theory, mergers of differential …

Stochastic shortest path network interdiction with a case study of Arizona–Mexico border

J Zhang, J Zhuang, B Behlendorf - Reliability Engineering & System Safety, 2018 - Elsevier
One of the key challenges in securing the US-Mexico border is the smuggling of illicit goods
and humans between Ports-of-Entry (POEs). A confluence of factors advantageous to …