DEFENDER-ATTACKER MODELS FOR RESOURCE ALLOCATION IN INFORMATION SECURITY
Аннотация
Ключевые слова
Полный текст:
PDFЛитература
Deng, Z., & Kong, Z. (2020). Multi-Agent Cooperative Pursuit-Defense Strategy Against One
Single Attacker. IEEE Robotics And Automation Letters, 5(4), 5772-5778. https://doi.org/10.1109/
lra.2020.3010740
Fu, J., Li, Z., Sun, D., & Liu, W. (2013, November). Modeling multiple locations defence and attack
dynamic Bayesian decision game. In 2013 Sixth International Conference on Business Intelligence and
Financial Engineering (pp. 449-453). IEEE.
Friedman, L. (1958). Game-Theory Models in the Allocation of Advertising Expenditures. Operations
Research, 6(5), 699-709. https://doi.org/10.1287/opre.6.5.699
Ab Ghani, A. T., & Tanaka, K. (2011). Network Games with Many Attackers and Defenders. Proceedings
of Research Institute for Mathematical Sciences (RIMS) Kôkyûroku Kyoto University, 1729, 146-151.
Korzhyk, D., Conitzer, V., & Parr, R. (2011, June). Security games with multiple attacker resources.
In Twenty-Second International Joint Conference on Artificial Intelligence.
Lei, H., Huang, S., Liu, Y., & Zhang, T. (2019). Robust optimization for microgrid defense resource
planning and allocation against multi-period attacks. IEEE Transactions on Smart Grid, 10(5), 5841-
https://doi.org/10.1109/tsg.2019.2892201
Li, Y., Xiao, L., Dai, H., & Poor, H. V. (2017, May). Game theoretic study of protecting MIMO transmissions
against smart attacks. In 2017 IEEE International Conference on Communications (ICC) (pp. 1-6). IEEE.
Masucci, A. M., & Silva, A. (2015, December). Defensive resource allocation in social networks.
In 2015 54th IEEE Conference on Decision and Control (CDC) (pp. 2927-2932). IEEE.
Sahabandu, D., Moothedath, S., Allen, J., Clark, A., Bushnell, L., Lee, W., & Poovendran, R. (2019,
December). Dynamic information flow tracking games for simultaneous detection of multiple
attackers. In 2019 IEEE 58th Conference on Decision and Control (CDC) (pp. 567-574). IEEE.
Sanjab, A., & Saad, W. (2016). Data injection attacks on smart grids with multiple adversaries:
A game-theoretic perspective. IEEE Transactions on Smart Grid, 7(4), 2038-2049. https://doi.
org/10.1109/tsg.2016.2550218
Vejandla, P., Dasgupta, D., Kaushal, A., & Nino, F. (2010, August). Evolving gaming strategies for
attacker-defender in a simulated network environment. In 2010 IEEE Second International Conference
on Social Computing (pp. 889-896). IEEE.
Wang, C., Hou, Y., & Ten, C. W. (2016). Determination of Nash equilibrium based on plausible attackdefense dynamics. IEEE Transactions on Power Systems, 32(5), 3670-3680. https://doi.org/10.1109/
tpwrs.2016.2635156
Xiang, Y., & Wang, L. (2018). An improved defender–attacker–defender model for transmission line
defense considering offensive resource uncertainties. IEEE Transactions on Smart Grid, 10(3), 2534-
https://doi.org/10.1109/tsg.2018.2803783
Xu, Z., & Zhuang, J. (2019). A study on a sequential one-defender-N-attacker game. Risk Analysis, 39(6),
-1432. https://doi.org/10.1111/risa.13257
Ye, M., & Hu, G. (2015). Distributed seeking of time-varying Nash equilibrium for non-cooperative
games. IEEE Transactions on Automatic Control, 60(11), 3000-3005. https://doi.org/10.1109/
tac.2015.2414817.
Yuan, H., Xia, Y., Zhang, J., Yang, H., & Mahmoud, M. S. (2019). Stackelberg-game-based defense
analysis against advanced persistent threats on cloud control system. IEEE Transactions on Industrial
Informatics, 16(3), 1571-1580. https://doi.org/10.1109/tii.2019.2925035
Zhang, J., & Zhuang, J. (2019). Modeling a multi-target attacker-defender game with multiple
attack types. Reliability Engineering & System Safety, 185, 465-475. https://doi.org/10.1016/j.
ress.2019.01.015
Zhang, J., Zhuang, J., & Jose, V. (2018). The role of risk preferences in a multi-target defenderattacker resource allocation game. Reliability Engineering & System Safety, 169, 95-104. https://doi.
org/10.1016/j.ress.2017.08.002
Zhang, L., & Li, J. (2018). Enabling robust and privacy-preserving resource allocation in fog
computing. IEEE Access, 6, 50384-50393. https://doi.org/10.1109/access.2018.2868920
Zhang, X., Hipel, K. W., Ge, B., & Tan, Y. (2019). A game-theoretic model for resource allocation
with deception and defense efforts. Systems Engineering, 22(3), 282-291. https://doi.org/10.1002/
sys.21479
Zhang, X., Li, X., & Yuan, Z. (2019, October). Defending a single object in a defender-attacker game
considering time. In 2019 IEEE International Conference on Systems, Man and Cybernetics (SMC) (pp.
-510). IEEE.
Zhu, Q., Bushnell, L., & Başar, T. (2012, December). Game-theoretic analysis of node capture and
cloning attack with multiple attackers in wireless sensor networks. In 2012 IEEE 51st IEEE Conference
on Decision and Control (CDC) (pp. 3404-3411). IEEE.
DOI: http://dx.doi.org/10.37943/AITU.2021.96.94.001
Ссылки
- Ссылки не определены.
(P): 2707-9031
(E): 2707-904X
Articles are open access under the Creative Commons License
Нур-Султан
Бизнес-центр EXPO, блок C.1.
Казахстан, 010000