Weakest-link attacker-defender games with multiple attack technologies

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cooperative weakest link games

We introduce Weakest Link Games (WLGs), a cooperative game modeling domains where a team’s value is determined by its weakest member. The game is represented as an edgeweighted graph with designated source and target vertices, where agents are the edges. The quality of a path between the source vertex and target vertex is the minimal edge weight along the path; the value of a coalition of edges...

متن کامل

Audit Games with Multiple Defender Resources

Modern organizations (e.g., hospitals, social networks, government agencies) rely heavily on audit to detect and punish insiders who inappropriately access and disclose confidential information. Recent work on audit games models the strategic interaction between an auditor with a single audit resource and auditees as a Stackelberg game, augmenting associated well-studied security games with a c...

متن کامل

Security Games with Multiple Attacker Resources

Algorithms for finding game-theoretic solutions are now used in several real-world security applications. This work has generally assumed a Stackelberg model where the defender commits to a mixed strategy first. In general two-player normal-form games, Stackelberg strategies are easier to compute than Nash equilibria, though it has recently been shown that in many security games, Stackelberg st...

متن کامل

Solving Defender-Attacker-Defender Models for Infrastructure Defense

This paper (a) describes a defender-attacker-defender sequential game model (DAD) to plan defenses for an infrastructure system that will enhance that system’s resilience against attacks by an intelligent adversary, (b) describes a realistic formulation of DAD for defending a transportation network, (c) develops a decomposition algorithm for solving this instance of DAD and others, and (d) demo...

متن کامل

Optimal power grid protection through a defender-attacker-defender model

Power grid vulnerability is a major concern of our society, and its protection problem is often formulated as a tri-level defender-attacker-defender model. However, this tri-level problem is computationally challenging. In this paper, we design and implement a Column-and-Constraint Generation algorithm to derive its optimal solutions. Numerical results on an IEEE system show that: (i) the devel...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Naval Research Logistics (NRL)

سال: 2012

ISSN: 0894-069X

DOI: 10.1002/nav.21500