Cyber deterrence with imperfect attribution and unverifiable signaling
Author
Abstract
Suggested Citation
DOI: 10.1016/j.ejor.2022.07.021
Download full text from publisher
As the access to this document is restricted, you may want to search for a different version of it.
References listed on IDEAS
- Konrad, Kai A., 2020.
"Attacking and defending multiple valuable secrets in a big data world,"
European Journal of Operational Research, Elsevier, vol. 280(3), pages 1122-1129.
- Kai A. Konrad, 2019. "Attacking and Defending Multiple Valuable Secrets in a Big Data World," Working Papers tax-mpg-rps-2019-05, Max Planck Institute for Tax Law and Public Finance.
- Solak, Senay & Zhuo, Yueran, 2020. "Optimal policies for information sharing in information system security," European Journal of Operational Research, Elsevier, vol. 284(3), pages 934-950.
- Jesse C. Johnson & Brett Ashley Leeds & Ahra Wu, 2015. "Capability, Credibility, and Extended General Deterrence," International Interactions, Taylor & Francis Journals, vol. 41(2), pages 309-336, March.
- Emir Kamenica & Matthew Gentzkow, 2011.
"Bayesian Persuasion,"
American Economic Review, American Economic Association, vol. 101(6), pages 2590-2615, October.
- Emir Kamenica & Matthew Gentzkow, 2009. "Bayesian Persuasion," NBER Working Papers 15540, National Bureau of Economic Research, Inc.
- Emir Kamenica & Matthew Gentzkow, 2009. "Bayesian Persuasion," NajEcon Working Paper Reviews 814577000000000369, www.najecon.org.
- Levitin, Gregory & Hausken, Kjell, 2009. "False targets efficiency in defense strategy," European Journal of Operational Research, Elsevier, vol. 194(1), pages 155-162, April.
- Baliga, Sandeep & Bueno De Mesquita, Ethan & Wolitzky, Alexander, 2020. "Deterrence with Imperfect Attribution," American Political Science Review, Cambridge University Press, vol. 114(4), pages 1155-1178, November.
- Cheung, Kam-Fung & Bell, Michael G.H., 2021. "Attacker–defender model against quantal response adversaries for cyber security in logistics management: An introductory study," European Journal of Operational Research, Elsevier, vol. 291(2), pages 471-481.
- Liang, Liang & Chen, Jingxian & Siqueira, Kevin, 2020. "Revenge or continued attack and defense in defender–attacker conflicts," European Journal of Operational Research, Elsevier, vol. 287(3), pages 1180-1190.
- Simon, Jay & Omar, Ayman, 2020. "Cybersecurity investments in the supply chain: Coordination and a strategic attacker," European Journal of Operational Research, Elsevier, vol. 282(1), pages 161-171.
- Zhuang, Jun & Bier, Vicki M. & Alagoz, Oguzhan, 2010. "Modeling secrecy and deception in a multiple-period attacker-defender signaling game," European Journal of Operational Research, Elsevier, vol. 203(2), pages 409-418, June.
- Vladislav SARAN, 2016. "Media Manipulation And Psychological War In Ukraine And The Republic Of Moldova," CES Working Papers, Centre for European Studies, Alexandru Ioan Cuza University, vol. 8(4), pages 738-752, December.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Dacorogna, Michel & Debbabi, Nehla & Kratz, Marie, 2023. "Building up cyber resilience by better grasping cyber risk via a new algorithm for modelling heavy-tailed data," European Journal of Operational Research, Elsevier, vol. 311(2), pages 708-729.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
- Kjell Hausken & Jonathan W. Welburn & Jun Zhuang, 2024. "A Review of Attacker–Defender Games and Cyber Security," Games, MDPI, vol. 15(4), pages 1-27, August.
- Nicola Dimitri, 2020. "Skills, Efficiency, and Timing in a Simple Attack and Defense Model," Decision Analysis, INFORMS, vol. 17(3), pages 227-234, September.
- Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
- Kjell Hausken, 2014. "Choosing what to protect when attacker resources and asset valuations are uncertain," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 24(3), pages 23-44.
- Levitin, Gregory & Hausken, Kjell, 2013. "Is it wise to leave some false targets unprotected?," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 176-186.
- Shan, Xiaojun & Zhuang, Jun, 2018. "Modeling cumulative defensive resource allocation against a strategic attacker in a multi-period multi-target sequential game," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 12-26.
- Ye, Zhi-Sheng & Peng, Rui & Wang, Wenbin, 2017. "Defense and attack of performance-sharing common bus systemsAuthor-Name: Zhai, Qingqing," European Journal of Operational Research, Elsevier, vol. 256(3), pages 962-975.
- Zhang, Xiaoxiong & Ding, Song & Ge, Bingfeng & Xia, Boyuan & Pedrycz, Witold, 2021. "Resource allocation among multiple targets for a defender-attacker game with false targets consideration," Reliability Engineering and System Safety, Elsevier, vol. 211(C).
- Bagchi, Aniruddha & Paul, Jomon A., 2021. "National security vs. human rights: A game theoretic analysis of the tension between these objectives," European Journal of Operational Research, Elsevier, vol. 290(2), pages 790-805.
- Zhang, Xiaoyu & Xu, Maochao & Su, Jianxi & Zhao, Peng, 2023. "Structural models for fog computing based internet of things architectures with insurance and risk management applications," European Journal of Operational Research, Elsevier, vol. 305(3), pages 1273-1291.
- Mohammad E. Nikoofal & Jun Zhuang, 2012. "Robust Allocation of a Defensive Budget Considering an Attacker's Private Information," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 930-943, May.
- Simeon Schudy & Verena Utikal, 2015. "Does imperfect data privacy stop people from collecting personal health data?," TWI Research Paper Series 98, Thurgauer Wirtschaftsinstitut, Universität Konstanz.
- Koessler, Frederic & Laclau, Marie & Renault, Jérôme & Tomala, Tristan, 2022.
"Long information design,"
Theoretical Economics, Econometric Society, vol. 17(2), May.
- Frédéric Koessler & Marie Laclau & Jérôme Renault & Tristan Tomala, 2021. "Long Information Design," PSE Working Papers halshs-02400053, HAL.
- Frédéric Koessler & Marie Laclau & Jerôme Renault & Tristan Tomala, 2022. "Long information design," PSE-Ecole d'économie de Paris (Postprint) hal-03700394, HAL.
- Koessler, Frédéric & Laclau, Marie & Renault, Jérôme & Tomala, Tristan, 2022. "Long information design," TSE Working Papers 22-1341, Toulouse School of Economics (TSE).
- Marie Laclau & Frédéric Koessler & Jérôme Renault & Tristan Tomala, 2022. "Long Information Design," Post-Print halshs-03342880, HAL.
- Marie Laclau & Frédéric Koessler & Jérôme Renault & Tristan Tomala, 2022. "Long Information Design," PSE-Ecole d'économie de Paris (Postprint) halshs-03342880, HAL.
- Frédéric Koessler & Marie Laclau & Jerôme Renault & Tristan Tomala, 2022. "Long information design," Post-Print hal-03700394, HAL.
- Frédéric Koessler & Marie Laclau & Jérôme Renault & Tristan Tomala, 2021. "Long Information Design," Working Papers halshs-02400053, HAL.
- Frédéric Koessler & Marie Laclau & Jérôme Renault & Tristan Tomala, 2022. "Long Information Design," Post-Print halshs-02400053, HAL.
- Frédéric Koessler & Marie Laclau & Jérôme Renault & Tristan Tomala, 2022. "Long Information Design," PSE-Ecole d'économie de Paris (Postprint) halshs-02400053, HAL.
- Zhang, Chi & Ramirez-Marquez, José Emmanuel & Wang, Jianhui, 2015. "Critical infrastructure protection using secrecy – A discrete simultaneous game," European Journal of Operational Research, Elsevier, vol. 242(1), pages 212-221.
- Eduardo Perez-Richet, 2014.
"Interim Bayesian Persuasion: First Steps,"
American Economic Review, American Economic Association, vol. 104(5), pages 469-474, May.
- Eduardo Perez, 2015. "Interim Bayesian Persuasion: First Steps," Post-Print hal-03392982, HAL.
- Li, Fei & Song, Yangbo & Zhao, Mofei, 2023. "Global manipulation by local obfuscation," Journal of Economic Theory, Elsevier, vol. 207(C).
- Redlicki, B., 2017. "Spreading Lies," Cambridge Working Papers in Economics 1747, Faculty of Economics, University of Cambridge.
- Alp Atakan & Mehmet Ekmekci & Ludovic Renou, 2021.
"Cross-verification and Persuasive Cheap Talk,"
Papers
2102.13562, arXiv.org, revised Apr 2021.
- Renou, Ludovic & Atakan, Alp & Ekmekci, Mehmet, 2021. "Cross-verification and Persuasive Cheap Talk," CEPR Discussion Papers 16801, C.E.P.R. Discussion Papers.
- Peter T. Leeson, 2013. "Vermin Trials," Journal of Law and Economics, University of Chicago Press, vol. 56(3), pages 811-836.
More about this item
Keywords
Game theory; Decision analysis; Security;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:ejores:v:306:y:2023:i:3:p:1399-1416. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: http://www.elsevier.com/locate/eor .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.