Weakest-link attacker-defender games with multiple attack technologies
نویسندگان
چکیده
منابع مشابه
Cooperative weakest link games
We introduce Weakest Link Games (WLGs), a cooperative game modeling domains where a team’s value is determined by its weakest member. The game is represented as an edgeweighted graph with designated source and target vertices, where agents are the edges. The quality of a path between the source vertex and target vertex is the minimal edge weight along the path; the value of a coalition of edges...
متن کاملAudit Games with Multiple Defender Resources
Modern organizations (e.g., hospitals, social networks, government agencies) rely heavily on audit to detect and punish insiders who inappropriately access and disclose confidential information. Recent work on audit games models the strategic interaction between an auditor with a single audit resource and auditees as a Stackelberg game, augmenting associated well-studied security games with a c...
متن کاملSecurity Games with Multiple Attacker Resources
Algorithms for finding game-theoretic solutions are now used in several real-world security applications. This work has generally assumed a Stackelberg model where the defender commits to a mixed strategy first. In general two-player normal-form games, Stackelberg strategies are easier to compute than Nash equilibria, though it has recently been shown that in many security games, Stackelberg st...
متن کاملSolving Defender-Attacker-Defender Models for Infrastructure Defense
This paper (a) describes a defender-attacker-defender sequential game model (DAD) to plan defenses for an infrastructure system that will enhance that system’s resilience against attacks by an intelligent adversary, (b) describes a realistic formulation of DAD for defending a transportation network, (c) develops a decomposition algorithm for solving this instance of DAD and others, and (d) demo...
متن کاملOptimal power grid protection through a defender-attacker-defender model
Power grid vulnerability is a major concern of our society, and its protection problem is often formulated as a tri-level defender-attacker-defender model. However, this tri-level problem is computationally challenging. In this paper, we design and implement a Column-and-Constraint Generation algorithm to derive its optimal solutions. Numerical results on an IEEE system show that: (i) the devel...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Naval Research Logistics (NRL)
سال: 2012
ISSN: 0894-069X
DOI: 10.1002/nav.21500