Defending a single object against an attacker trying to detect a subset of false targets
Author
Abstract
Suggested Citation
DOI: 10.1016/j.ress.2016.01.002
Download full text from publisher
As the access to this document is restricted, you may want to search for a different version of it.
References listed on IDEAS
- Gregory Levitin & Kjell Hausken, 2009. "Intelligence and Impact Contests in Systems with Fake Targets," Defense & Security Analysis, Taylor & Francis Journals, vol. 25(2), pages 157-173, June.
- Levitin, Gregory & Hausken, Kjell, 2009. "False targets efficiency in defense strategy," European Journal of Operational Research, Elsevier, vol. 194(1), pages 155-162, April.
- J Setréus & D Månsson & P Hilber & S Arnborg, 2012. "Component ranking in Great Britain transmission system based on either equipment failures or sabotage," Journal of Risk and Reliability, , vol. 226(1), pages 96-108, February.
- Azaiez, M.N. & Bier, Vicki M., 2007. "Optimal resource allocation for security in reliability systems," European Journal of Operational Research, Elsevier, vol. 181(2), pages 773-786, September.
- Hausken, Kjell & Levitin, Gregory, 2009. "Protection vs. false targets in series systems," Reliability Engineering and System Safety, Elsevier, vol. 94(5), pages 973-981.
- K Hausken & G Levitin, 2010. "Defence of homogeneous parallel multi-state systems subject to two sequential attacks," Journal of Risk and Reliability, , vol. 224(3), pages 171-183, September.
- Kjell Hausken, 2005. "Production and Conflict Models Versus Rent-Seeking Models," Public Choice, Springer, vol. 123(1), pages 59-93, April.
- Levitin, Gregory & Hausken, Kjell, 2009. "Intelligence and impact contests in systems with redundancy, false targets, and partial protection," Reliability Engineering and System Safety, Elsevier, vol. 94(12), pages 1927-1941.
- Ramirez-Marquez, Jose E. & Rocco S, Claudio M. & Levitin, Gregory, 2009. "Optimal protection of general source–sink networks via evolutionary techniques," Reliability Engineering and System Safety, Elsevier, vol. 94(10), pages 1676-1684.
- Stergios Skaperdas, 1996.
"Contest success functions (*),"
Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 7(2), pages 283-290.
- Skaperdas, Stergios, 1996. "Contest Success Functions," Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 7(2), pages 283-290, February.
- Stergios Skaperdas, 1996. "Contest success functions," Springer Books, in: Roger D. Congleton & Arye L. Hillman & Kai A. Konrad (ed.), 40 Years of Research on Rent Seeking 1, pages 263-270, Springer.
- Jun Zhuang & Vicki M. Bier, 2007. "Balancing Terrorism and Natural Disasters---Defensive Strategy with Endogenous Attacker Effort," Operations Research, INFORMS, vol. 55(5), pages 976-991, October.
- Peng, R. & Levitin, G. & Xie, M. & Ng, S.H., 2010. "Defending simple series and parallel systems with imperfect false targets," Reliability Engineering and System Safety, Elsevier, vol. 95(6), pages 679-688.
- K Hausken & J Zhuang, 2012. "The timing and deterrence of terrorist attacks due to exogenous dynamics," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 63(6), pages 726-735, June.
- Gregory Levitin, 2009. "Optimizing Defense Strategies for Complex Multi-State Systems," International Series in Operations Research & Management Science, in: Vicki M. M. Bier & M. Naceur Azaiez (ed.), Game Theoretic Risk Analysis of Security Threats, chapter 3, pages 33-64, Springer.
- R Peng & G Levitin & M Xie & S H Ng, 2011. "Optimal defence of single object with imperfect false targets," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 62(1), pages 134-141, January.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Gao, Kaiye & Yan, Xiangbin & Liu, Xiang-dong & Peng, Rui, 2019. "Object defence of a single object with preventive strike of random effect," Reliability Engineering and System Safety, Elsevier, vol. 186(C), pages 209-219.
- Zhang, Xiaoxiong & Ye, Yanqing & Tan, Yuejin, 2020. "How to protect a genuine target against an attacker trying to detect false targets," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 553(C).
- Levitin, Gregory & Xing, Liudong & Xiang, Yanping, 2020. "Optimal early warning defense of N-version programming service against co-resident attacks in cloud system," Reliability Engineering and System Safety, Elsevier, vol. 201(C).
- Bose, Gautam & Konrad, Kai A., 2020. "Devil take the hindmost: Deflecting attacks to other defenders," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
- Kress, Moshe & Caulkins, Jonathan P. & Feichtinger, Gustav & Grass, Dieter & Seidl, Andrea, 2018. "Lanchester model for three-way combat," European Journal of Operational Research, Elsevier, vol. 264(1), pages 46-54.
- Sakai, Kazuki & Hohzaki, Ryusuke & Fukuda, Emiko & Sakuma, Yutaka, 2018. "Risk evaluation and games in mine warfare considering shipcounter effects," European Journal of Operational Research, Elsevier, vol. 268(1), pages 300-313.
- Hu, Xiaoxiao & Xu, Maochao & Xu, Shouhuai & Zhao, Peng, 2017. "Multiple cyber attacks against a target with observation errors and dependent outcomes: Characterization and optimization," Reliability Engineering and System Safety, Elsevier, vol. 159(C), pages 119-133.
- Jamalzadeh, Saeed & Mettenbrink, Lily & Barker, Kash & González, Andrés D. & Radhakrishnan, Sridhar & Johansson, Jonas & Bessarabova, Elena, 2024. "Weaponized disinformation spread and its impact on multi-commodity critical infrastructure networks," Reliability Engineering and System Safety, Elsevier, vol. 243(C).
- Levitin, Gregory & Xing, Liudong & Dai, Yuanshun, 2022. "Co-residence based data theft game in cloud system with virtual machine replication and cancellation," Reliability Engineering and System Safety, Elsevier, vol. 222(C).
- Xing, Liudong & Levitin, Gregory, 2017. "Balancing theft and corruption threats by data partition in cloud system with independent server protection," Reliability Engineering and System Safety, Elsevier, vol. 167(C), pages 248-254.
- Chen, Die & Xu, Maochao & Shi, Weidong, 2018. "Defending a cyber system with early warning mechanism," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 224-234.
- Rui Peng & Di Wu & Mengyao Sun & Shaomin Wu, 2021. "An attack-defense game on interdependent networks," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 72(10), pages 2331-2341, October.
- Wu, Di & Yan, Xiangbin & Peng, Rui & Wu, Shaomin, 2020. "Risk-attitude-based defense strategy considering proactive strike, preventive strike and imperfect false targets," Reliability Engineering and System Safety, Elsevier, vol. 196(C).
- Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
- Peng, Rui & Xiao, Hui & Guo, Jianjun & Lin, Chen, 2020. "Defending a parallel system against a strategic attacker with redundancy, protection and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 193(C).
- Wu, Di & Xiao, Hui & Peng, Rui, 2018. "Object defense with preventive strike and false targets," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 76-80.
- Zhang, Xiaoxiong & Ding, Song & Ge, Bingfeng & Xia, Boyuan & Pedrycz, Witold, 2021. "Resource allocation among multiple targets for a defender-attacker game with false targets consideration," Reliability Engineering and System Safety, Elsevier, vol. 211(C).
- Hausken, Kjell, 2017. "Special versus general protection and attack of parallel and series components," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 239-256.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Peng, Rui & Xiao, Hui & Guo, Jianjun & Lin, Chen, 2020. "Defending a parallel system against a strategic attacker with redundancy, protection and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 193(C).
- Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
- Levitin, Gregory & Hausken, Kjell, 2011. "Is it wise to protect false targets?," Reliability Engineering and System Safety, Elsevier, vol. 96(12), pages 1647-1656.
- Dan Kovenock & Brian Roberson, 2012.
"Strategic Defense And Attack For Series And Parallel Reliability Systems: Comment,"
Defence and Peace Economics, Taylor & Francis Journals, vol. 23(5), pages 507-515, October.
- Dan Kovenock & Brian Roberson, 2010. "Strategic Defense and Attack for Series and Parallel Reliability Systems: Comment," Purdue University Economics Working Papers 1253, Purdue University, Department of Economics.
- Levitin, Gregory & Hausken, Kjell, 2013. "Is it wise to leave some false targets unprotected?," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 176-186.
- Ye, Zhi-Sheng & Peng, Rui & Wang, Wenbin, 2017. "Defense and attack of performance-sharing common bus systemsAuthor-Name: Zhai, Qingqing," European Journal of Operational Research, Elsevier, vol. 256(3), pages 962-975.
- Hausken, Kjell, 2017. "Special versus general protection and attack of parallel and series components," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 239-256.
- Szidarovszky, Ferenc & Luo, Yi, 2014. "Incorporating risk seeking attitude into defense strategy," Reliability Engineering and System Safety, Elsevier, vol. 123(C), pages 104-109.
- Levitin, Gregory & Hausken, Kjell, 2009. "Intelligence and impact contests in systems with redundancy, false targets, and partial protection," Reliability Engineering and System Safety, Elsevier, vol. 94(12), pages 1927-1941.
- Xiao, Hui & Shi, Daimin & Ding, Yi & Peng, Rui, 2016. "Optimal loading and protection of multi-state systems considering performance sharing mechanism," Reliability Engineering and System Safety, Elsevier, vol. 149(C), pages 88-95.
- Zhang, Xiaoxiong & Ding, Song & Ge, Bingfeng & Xia, Boyuan & Pedrycz, Witold, 2021. "Resource allocation among multiple targets for a defender-attacker game with false targets consideration," Reliability Engineering and System Safety, Elsevier, vol. 211(C).
- G Levitin & K Hausken, 2010. "Defence and attack of systems with variable attacker system structure detection probability," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 61(1), pages 124-133, January.
- R Peng & G Levitin & M Xie & S H Ng, 2011. "Optimal defence of single object with imperfect false targets," Journal of the Operational Research Society, Palgrave Macmillan;The OR Society, vol. 62(1), pages 134-141, January.
- Chen, Die & Xu, Maochao & Shi, Weidong, 2018. "Defending a cyber system with early warning mechanism," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 224-234.
- Kjell Hausken, 2019. "Special versus general protection and attack of two assets," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 29(4), pages 53-93.
- Levitin, Gregory & Hausken, Kjell, 2010. "Influence of attacker's target recognition ability on defense strategy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 95(5), pages 565-572.
- Gao, Kaiye & Yan, Xiangbin & Liu, Xiang-dong & Peng, Rui, 2019. "Object defence of a single object with preventive strike of random effect," Reliability Engineering and System Safety, Elsevier, vol. 186(C), pages 209-219.
- Levitin, Gregory & Hausken, Kjell, 2009. "False targets vs. redundancy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 94(2), pages 588-595.
- Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
- Levitin, G. & Gertsbakh, I. & Shpungin, Y., 2013. "Evaluating the damage associated with intentional supply deprivation in multi-commodity network," Reliability Engineering and System Safety, Elsevier, vol. 119(C), pages 11-17.
More about this item
Keywords
Reliability; Vulnerability; Defense; Attack; False targets; Contest success function;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:reensy:v:149:y:2016:i:c:p:137-147. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/reliability-engineering-and-system-safety .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.