Application of hybrid strategies of complex network attack and defense games
Author
Abstract
Suggested Citation
DOI: 10.1016/j.chaos.2024.115662
Download full text from publisher
As the access to this document is restricted, you may want to search for a different version of it.
References listed on IDEAS
- Chaoqi, Fu & Yangjun, Gao & Jilong, Zhong & Yun, Sun & Pengtao, Zhang & Tao, Wu, 2021. "Attack-defense game for critical infrastructure considering the cascade effect," Reliability Engineering and System Safety, Elsevier, vol. 216(C).
- Wu, Yipeng & Chen, Zhilong & Gong, Huadong & Feng, Qilin & Chen, Yicun & Tang, Haizhou, 2021. "Defender–attacker–operator: Tri-level game-theoretic interdiction analysis of urban water distribution networks," Reliability Engineering and System Safety, Elsevier, vol. 214(C).
- Dui, Hongyan & Meng, Xueyu & Xiao, Hui & Guo, Jianjun, 2020. "Analysis of the cascading failure for scale-free networks based on a multi-strategy evolutionary game," Reliability Engineering and System Safety, Elsevier, vol. 199(C).
- Porter, Ryan & Nudelman, Eugene & Shoham, Yoav, 2008. "Simple search methods for finding a Nash equilibrium," Games and Economic Behavior, Elsevier, vol. 63(2), pages 642-662, July.
- Liu, Jun & Xiong, Qingyu & Shi, Weiren & Shi, Xin & Wang, Kai, 2016. "Evaluating the importance of nodes in complex networks," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 452(C), pages 209-219.
- Chen, Duanbing & Lü, Linyuan & Shang, Ming-Sheng & Zhang, Yi-Cheng & Zhou, Tao, 2012. "Identifying influential nodes in complex networks," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 391(4), pages 1777-1787.
- Zhang, Jing & Zhuang, Jun, 2019. "Modeling a multi-target attacker-defender game with multiple attack types," Reliability Engineering and System Safety, Elsevier, vol. 185(C), pages 465-475.
- Godinho, Pedro & Dias, Joana, 2013. "Two-player simultaneous location game: Preferential rights and overbidding," European Journal of Operational Research, Elsevier, vol. 229(3), pages 663-672.
- Godinho, Pedro & Dias, Joana, 2010. "A two-player competitive discrete location model with simultaneous decisions," European Journal of Operational Research, Elsevier, vol. 207(3), pages 1419-1432, December.
- Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
- Wang, Shuliang & Sun, Jingya & Zhang, Jianhua & Dong, Qiqi & Gu, Xifeng & Chen, Chen, 2023. "Attack-Defense game analysis of critical infrastructure network based on Cournot model with fixed operating nodes," International Journal of Critical Infrastructure Protection, Elsevier, vol. 40(C).
- Linyuan Lü & Yi-Cheng Zhang & Chi Ho Yeung & Tao Zhou, 2011. "Leaders in Social Networks, the Delicious Case," PLOS ONE, Public Library of Science, vol. 6(6), pages 1-9, June.
- Zhang, Xiaoxiong & Ding, Song & Ge, Bingfeng & Xia, Boyuan & Pedrycz, Witold, 2021. "Resource allocation among multiple targets for a defender-attacker game with false targets consideration," Reliability Engineering and System Safety, Elsevier, vol. 211(C).
- Jared K. Nystrom & Matthew J. Robbins & Richard F. Deckro & James F. Morris, 2018. "Simulating attacker and defender strategies within a dynamic game on network topology," Journal of Simulation, Taylor & Francis Journals, vol. 12(4), pages 1-25, October.
- Li, Yapeng & Qiao, Shun & Deng, Ye & Wu, Jun, 2019. "Stackelberg game in critical infrastructures from a network science perspective," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 521(C), pages 705-714.
- Lin, Chen & Xiao, Hui & Peng, Rui & Xiang, Yisha, 2021. "Optimal defense-attack strategies between M defenders and N attackers: A method based on cumulative prospect theory," Reliability Engineering and System Safety, Elsevier, vol. 210(C).
- Wang, Ning & Gao, Ying & He, Jia-tao & Yang, Jun, 2022. "Robustness evaluation of the air cargo network considering node importance and attack cost," Reliability Engineering and System Safety, Elsevier, vol. 217(C).
- Casorrán, Carlos & Fortz, Bernard & Labbé, Martine & Ordóñez, Fernando, 2019. "A study of general and security Stackelberg game formulations," European Journal of Operational Research, Elsevier, vol. 278(3), pages 855-868.
- Rui Peng & Di Wu & Mengyao Sun & Shaomin Wu, 2021. "An attack-defense game on interdependent networks," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 72(10), pages 2331-2341, October.
- Nageswara S. V. Rao & Stephen W. Poole & Chris Y. T. Ma & Fei He & Jun Zhuang & David K. Y. Yau, 2016. "Defense of Cyber Infrastructures Against Cyber‐Physical Attacks Using Game‐Theoretic Models," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 694-710, April.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
- Wang, Shuliang & Sun, Jingya & Zhang, Jianhua & Dong, Qiqi & Gu, Xifeng & Chen, Chen, 2023. "Attack-Defense game analysis of critical infrastructure network based on Cournot model with fixed operating nodes," International Journal of Critical Infrastructure Protection, Elsevier, vol. 40(C).
- Chaoqi, Fu & Yangjun, Gao & Jilong, Zhong & Yun, Sun & Pengtao, Zhang & Tao, Wu, 2021. "Attack-defense game for critical infrastructure considering the cascade effect," Reliability Engineering and System Safety, Elsevier, vol. 216(C).
- Chaoqi, Fu & Pengtao, Zhang & Lin, Zhou & Yangjun, Gao & Na, Du, 2021. "Camouflage strategy of a Stackelberg game based on evolution rules," Chaos, Solitons & Fractals, Elsevier, vol. 153(P2).
- Zhou, Jun & Zhu, Jiaxing & Liang, Guangchuan & Ma, Junjie & He, Jiayi & Du, Penghua & Ye, Zhanpeng, 2024. "Three-layer and robust planning models to evaluate the strategies of defense layer, attack layer, and operation layer for optimal protection in natural gas pipeline network," Reliability Engineering and System Safety, Elsevier, vol. 249(C).
- Li, Qing & Li, Mingchu & Gong, Zhongqiang & Tian, Yuan & Zhang, Runfa, 2022. "Locating and protecting interdependent facilities to hedge against multiple non-cooperative limited choice attackers," Reliability Engineering and System Safety, Elsevier, vol. 223(C).
- Li, Yulong & Lin, Jie & Zhang, Chi & Zhu, Huaxing & Zeng, Saixing & Sun, Chengshaung, 2022. "Joint optimization of structure and protection of interdependent infrastructure networks," Reliability Engineering and System Safety, Elsevier, vol. 218(PB).
- Yupeng Li & Zhaotong Wang & Xiaoyu Zhong & Fan Zou, 2019. "Identification of influential function modules within complex products and systems based on weighted and directed complex networks," Journal of Intelligent Manufacturing, Springer, vol. 30(6), pages 2375-2390, August.
- Wang, Longjian & Zhang, Shuichao & Szűcs, Gábor & Wang, Yonggang, 2024. "Identifying the critical nodes in multi-modal transportation network with a traffic demand-based computational method," Reliability Engineering and System Safety, Elsevier, vol. 244(C).
- Zhang, Chi & Ramirez-Marquez, José Emmanuel & Wang, Jianhui, 2015. "Critical infrastructure protection using secrecy – A discrete simultaneous game," European Journal of Operational Research, Elsevier, vol. 242(1), pages 212-221.
- Zhou, Ming-Yang & Xiong, Wen-Man & Wu, Xiang-Yang & Zhang, Yu-Xia & Liao, Hao, 2018. "Overlapping influence inspires the selection of multiple spreaders in complex networks," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 508(C), pages 76-83.
- Wang, Jingjing & Xu, Shuqi & Mariani, Manuel S. & Lü, Linyuan, 2021. "The local structure of citation networks uncovers expert-selected milestone papers," Journal of Informetrics, Elsevier, vol. 15(4).
- Godinho, Pedro & Dias, Joana, 2013. "Two-player simultaneous location game: Preferential rights and overbidding," European Journal of Operational Research, Elsevier, vol. 229(3), pages 663-672.
- Li, Hanwen & Shang, Qiuyan & Deng, Yong, 2021. "A generalized gravity model for influential spreaders identification in complex networks," Chaos, Solitons & Fractals, Elsevier, vol. 143(C).
- Wu, Hongqian & Deng, Hongzhong & Li, Jichao & Wang, Yangjun & Yang, Kewei, 2024. "Hunting for influential nodes based on radiation theory in complex networks," Chaos, Solitons & Fractals, Elsevier, vol. 188(C).
- Wang, Zhixiao & Zhao, Ya & Xi, Jingke & Du, Changjiang, 2016. "Fast ranking influential nodes in complex networks using a k-shell iteration factor," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 461(C), pages 171-181.
- Dilek, Hande & Karaer, Özgen & Nadar, Emre, 2018. "Retail location competition under carbon penalty," European Journal of Operational Research, Elsevier, vol. 269(1), pages 146-158.
- Zhang, Wei & Cao, Juyang & Mariani, Manuel Sebastian & Wang, Zhen-Zhen & Zhou, Mingyang & Chen, Wei & Liao, Hao, 2024. "Uncovering milestone papers: A network diffusion and game theory approach," Journal of Informetrics, Elsevier, vol. 18(3).
- Feng, Jian Rui & Zhao, Meng-ke & Lu, Shou-xiang, 2024. "Accident spread and risk propagation mechanism in complex industrial system network," Reliability Engineering and System Safety, Elsevier, vol. 244(C).
- Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2022. "On the adoption of new technology to enhance counterterrorism measures: An attacker–defender game with risk preferences," Reliability Engineering and System Safety, Elsevier, vol. 218(PB).
More about this item
Keywords
Attack and defense games; Critical infrastructure networks; Hybrid strategies; Non-uniform costs;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:chsofr:v:189:y:2024:i:p1:s0960077924012141. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Thayer, Thomas R. (email available below). General contact details of provider: https://www.journals.elsevier.com/chaos-solitons-and-fractals .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.