A game-theoretic approach to modeling attacks and defenses of smart grids at three levels
Author
Abstract
Suggested Citation
DOI: 10.1016/j.ress.2019.106683
Download full text from publisher
As the access to this document is restricted, you may want to search for a different version of it.
References listed on IDEAS
- Jun Zhuang & Vicki Bier, 2011. "Secrecy And Deception At Equilibrium, With Applications To Anti-Terrorism Resource Allocation," Defence and Peace Economics, Taylor & Francis Journals, vol. 22(1), pages 43-61.
- Bier, Vicki M. & Gratz, Eli R. & Haphuriwat, Naraphorn J. & Magua, Wairimu & Wierzbicki, Kevin R., 2007. "Methodology for identifying near-optimal interdiction strategies for a power transmission system," Reliability Engineering and System Safety, Elsevier, vol. 92(9), pages 1155-1161.
- Levitin, Gregory & Hausken, Kjell & Dai, Yuanshun, 2014. "Optimal defense with variable number of overarching and individual protections," Reliability Engineering and System Safety, Elsevier, vol. 123(C), pages 81-90.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Lin, Chen & Xiao, Hui & Kou, Gang & Peng, Rui, 2020. "Defending a series system with individual protection, overarching protection, and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
- Oster, Matthew R. & King, Ethan & Bakker, Craig & Bhattacharya, Arnab & Chatterjee, Samrat & Pan, Feng, 2023. "Multi-level optimization with the koopman operator for data-driven, domain-aware, and dynamic system security," Reliability Engineering and System Safety, Elsevier, vol. 237(C).
- Ding, Zhetong & Chen, Chunyu & Cui, Mingjian & Bi, Wenjun & Chen, Yang & Li, Fangxing, 2021. "Dynamic game-based defensive primary frequency control system considering intelligent attackers," Reliability Engineering and System Safety, Elsevier, vol. 216(C).
- Fu, Xiuwen & Li, Qing & Li, Wenfeng, 2023. "Modeling and analysis of industrial IoT reliability to cascade failures: An information-service coupling perspective," Reliability Engineering and System Safety, Elsevier, vol. 239(C).
- Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
- Berghout, Tarek & Benbouzid, Mohamed & Muyeen, S.M., 2022. "Machine learning for cybersecurity in smart grids: A comprehensive review-based study on methods, solutions, and prospects," International Journal of Critical Infrastructure Protection, Elsevier, vol. 38(C).
- Wu, Yipeng & Chen, Zhilong & Dang, Junhu & Chen, Yicun & Zhao, Xudong & Zha, Lvying, 2022. "Allocation of defensive and restorative resources in electric power system against consecutive multi-target attacks," Reliability Engineering and System Safety, Elsevier, vol. 219(C).
- Zhang, Jing & Wang, Yan & Zhuang, Jun, 2021. "Modeling multi-target defender-attacker games with quantal response attack strategies," Reliability Engineering and System Safety, Elsevier, vol. 205(C).
- Zhang, Xiaoxiong & Ding, Song & Ge, Bingfeng & Xia, Boyuan & Pedrycz, Witold, 2021. "Resource allocation among multiple targets for a defender-attacker game with false targets consideration," Reliability Engineering and System Safety, Elsevier, vol. 211(C).
- Lin, Chen & Xiao, Hui & Peng, Rui & Xiang, Yisha, 2021. "Optimal defense-attack strategies between M defenders and N attackers: A method based on cumulative prospect theory," Reliability Engineering and System Safety, Elsevier, vol. 210(C).
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
- Schlicher, Loe & Lurkin, Virginie, 2024. "Fighting pickpocketing using a choice-based resource allocation model," European Journal of Operational Research, Elsevier, vol. 315(2), pages 580-595.
- Ramirez-Marquez, José Emmanuel & Li, Qing, 2018. "Locating and protecting facilities from intentional attacks using secrecyAuthor-Name: Zhang, Chi," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 51-62.
- Ouyang, Min & Xu, Min & Zhang, Chi & Huang, Shitong, 2017. "Mitigating electric power system vulnerability to worst-case spatially localized attacks," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 144-154.
- Bier, Vicki M. & Hausken, Kjell, 2013. "Defending and attacking a network of two arcs subject to traffic congestion," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 214-224.
- Bier, Vicki & Gutfraind, Alexander, 2019. "Risk analysis beyond vulnerability and resilience – characterizing the defensibility of critical systems," European Journal of Operational Research, Elsevier, vol. 276(2), pages 626-636.
- Zhang, Chi & Ramirez-Marquez, José Emmanuel & Wang, Jianhui, 2015. "Critical infrastructure protection using secrecy – A discrete simultaneous game," European Journal of Operational Research, Elsevier, vol. 242(1), pages 212-221.
- Jesus Beyza & Jose M. Yusta, 2021. "Integrated Risk Assessment for Robustness Evaluation and Resilience Optimisation of Power Systems after Cascading Failures," Energies, MDPI, vol. 14(7), pages 1-18, April.
- Bose, Gautam & Konrad, Kai A., 2020. "Devil take the hindmost: Deflecting attacks to other defenders," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
- Lin, Chen & Xiao, Hui & Kou, Gang & Peng, Rui, 2020. "Defending a series system with individual protection, overarching protection, and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
- Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
- Mohammad E. Nikoofal & Mehmet Gümüs, 2015. "On the value of terrorist’s private information in a government’s defensive resource allocation problem," IISE Transactions, Taylor & Francis Journals, vol. 47(6), pages 533-555, June.
- Konrad, Kai A. & Morath, Florian, 2023.
"How to preempt attacks in multi-front conflict with limited resources,"
European Journal of Operational Research, Elsevier, vol. 305(1), pages 493-500.
- Kai A. Konrad & Florian Morath, 2022. "How to preempt attacks in multi-front conflict with limited resources," Working Papers tax-mpg-rps-2022-09, Max Planck Institute for Tax Law and Public Finance.
- Zio, E., 2009. "Reliability engineering: Old problems and new challenges," Reliability Engineering and System Safety, Elsevier, vol. 94(2), pages 125-141.
- Azzolin, Alberto & Dueñas-Osorio, Leonardo & Cadini, Francesco & Zio, Enrico, 2018. "Electrical and topological drivers of the cascading failure dynamics in power transmission networks," Reliability Engineering and System Safety, Elsevier, vol. 175(C), pages 196-206.
- Zhang, Jing & Wang, Yan & Zhuang, Jun, 2021. "Modeling multi-target defender-attacker games with quantal response attack strategies," Reliability Engineering and System Safety, Elsevier, vol. 205(C).
- Yi‐Ping Fang & Giovanni Sansavini & Enrico Zio, 2019. "An Optimization‐Based Framework for the Identification of Vulnerabilities in Electric Power Grids Exposed to Natural Hazards," Risk Analysis, John Wiley & Sons, vol. 39(9), pages 1949-1969, September.
- Zio, E. & Golea, L.R. & Rocco S., C.M., 2012. "Identifying groups of critical edges in a realistic electrical network by multi-objective genetic algorithms," Reliability Engineering and System Safety, Elsevier, vol. 99(C), pages 172-177.
- Konrad, Kai A., 2024. "The collective security dilemma of preemptive strikes," European Journal of Operational Research, Elsevier, vol. 313(3), pages 1191-1199.
- Wu, Di & Liu, Xiang-dong & Yan, Xiang-bin & Peng, Rui & Li, Gang, 2019. "Equilibrium analysis of bitcoin block withholding attack: A generalized model," Reliability Engineering and System Safety, Elsevier, vol. 185(C), pages 318-328.
More about this item
Keywords
Smart grid; Game theory; Cyber-physical security; Decision analysis;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:reensy:v:195:y:2020:i:c:s0951832019304077. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/reliability-engineering-and-system-safety .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.