Interdicting Attack Plans with Boundedly Rational Players and Multiple Attackers: An Adversarial Risk Analysis Approach
Author
Abstract
Suggested Citation
DOI: 10.1287/deca.2023.0471
Download full text from publisher
References listed on IDEAS
- Benjamin Scheibehenne & Rainer Greifeneder & Peter M. Todd, 2010. "Can There Ever Be Too Many Options? A Meta-Analytic Review of Choice Overload," Journal of Consumer Research, Journal of Consumer Research Inc., vol. 37(3), pages 409-425, October.
- Fisher, M.L. & Nemhauser, G.L. & Wolsey, L.A., 1978. "An analysis of approximations for maximizing submodular set functions - 1," LIDAM Reprints CORE 334, Université catholique de Louvain, Center for Operations Research and Econometrics (CORE).
- Smith, J. Cole & Song, Yongjia, 2020. "A survey of network interdiction models and algorithms," European Journal of Operational Research, Elsevier, vol. 283(3), pages 797-811.
- Stahl Dale O. & Wilson Paul W., 1995.
"On Players' Models of Other Players: Theory and Experimental Evidence,"
Games and Economic Behavior, Elsevier, vol. 10(1), pages 218-254, July.
- Dale O. Stahl & Paul W. Wilson, 2010. "On Players' Models of Other Players: Theory and Experimental Evidence," Levine's Working Paper Archive 542, David K. Levine.
- Jorge González-Ortega & Refik Soyer & David Ríos Insua & Fabrizio Ruggeri, 2021. "An Adversarial Risk Analysis Framework for Batch Acceptance Problems," Decision Analysis, INFORMS, vol. 18(1), pages 25-40, March.
- Wei Wang & Francesco Di Maio & Enrico Zio, 2019. "Adversarial Risk Analysis to Allocate Optimal Defense Resources for Protecting Cyber–Physical Systems from Cyber Attacks," Risk Analysis, John Wiley & Sons, vol. 39(12), pages 2766-2785, December.
- David Rios Insua & Aitor Couce‐Vieira & Jose A. Rubio & Wolter Pieters & Katsiaryna Labunets & Daniel G. Rasines, 2021. "An Adversarial Risk Analysis Framework for Cybersecurity," Risk Analysis, John Wiley & Sons, vol. 41(1), pages 16-36, January.
- Shouqiang Wang & David Banks, 2011. "Network routing for insurgency: An adversarial risk analysis framework," Naval Research Logistics (NRL), John Wiley & Sons, vol. 58(6), pages 595-607, September.
- Jun Zhuang & Vicki M. Bier, 2007. "Balancing Terrorism and Natural Disasters---Defensive Strategy with Endogenous Attacker Effort," Operations Research, INFORMS, vol. 55(5), pages 976-991, October.
- Javier Cano & Alessandro Pollini & Lorenzo Falciani & Uğur Turhan, 2016. "Modeling current and emerging threats in the airport domain through adversarial risk analysis," Journal of Risk Research, Taylor & Francis Journals, vol. 19(7), pages 894-912, August.
- Laura A. Albert & Alexander Nikolaev & Sheldon H. Jacobson, 2023. "Homeland security research opportunities," IISE Transactions, Taylor & Francis Journals, vol. 55(1), pages 22-31, January.
- Colin F. Camerer & Teck-Hua Ho & Juin-Kuan Chong, 2004. "A Cognitive Hierarchy Model of Games," The Quarterly Journal of Economics, President and Fellows of Harvard College, vol. 119(3), pages 861-898.
- Kaiyue Zheng & Laura A. Albert & James R. Luedtke & Eli Towle, 2019. "A budgeted maximum multiple coverage model for cybersecurity planning and management," IISE Transactions, Taylor & Francis Journals, vol. 51(12), pages 1303-1317, December.
- Knowles, William & Prince, Daniel & Hutchison, David & Disso, Jules Ferdinand Pagna & Jones, Kevin, 2015. "A survey of cyber security management in industrial control systems," International Journal of Critical Infrastructure Protection, Elsevier, vol. 9(C), pages 52-80.
- Fisher, M.L. & Nemhauser, G.L. & Wolsey, L.A., 1978. "An analysis of approximations for maximizing submodular set functions," LIDAM Reprints CORE 341, Université catholique de Louvain, Center for Operations Research and Econometrics (CORE).
- Zhang, Jing & Zhuang, Jun & Behlendorf, Brandon, 2018. "Stochastic shortest path network interdiction with a case study of Arizona–Mexico border," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 62-73.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- William N. Caballero & Ethan Gharst & David Banks & Jeffery D. Weir, 2023. "Multipolar Security Cooperation Planning: A Multiobjective, Adversarial-Risk-Analysis Approach," Decision Analysis, INFORMS, vol. 20(1), pages 16-39, March.
- Beck, Yasmine & Ljubić, Ivana & Schmidt, Martin, 2023. "A survey on bilevel optimization under uncertainty," European Journal of Operational Research, Elsevier, vol. 311(2), pages 401-426.
- Kübra Tanınmış & Markus Sinnl, 2022. "A Branch-and-Cut Algorithm for Submodular Interdiction Games," INFORMS Journal on Computing, INFORMS, vol. 34(5), pages 2634-2657, September.
- Ekin, Tahir & Naveiro, Roi & Ríos Insua, David & Torres-Barrán, Alberto, 2023. "Augmented probability simulation methods for sequential games," European Journal of Operational Research, Elsevier, vol. 306(1), pages 418-430.
- Muhammad Ejaz & Stephen Joe & Chaitanya Joshi, 2021. "Adversarial Risk Analysis for Auctions Using Mirror Equilibrium and Bayes Nash Equilibrium," Decision Analysis, INFORMS, vol. 18(3), pages 185-202, September.
- González-Ortega, Jorge & Ríos Insua, David & Cano, Javier, 2019. "Adversarial risk analysis for bi-agent influence diagrams: An algorithmic approach," European Journal of Operational Research, Elsevier, vol. 273(3), pages 1085-1096.
- Sergeyev, Dmitriy & Iovino, Luigi, 2018. "Central Bank Balance Sheet Policies Without Rational Expectations," CEPR Discussion Papers 13100, C.E.P.R. Discussion Papers.
- Vincent P. Crawford & Nagore Iriberri, 2004.
"Fatal Attraction: Focality, Naivete, and Sophistication in Experimental Hide-and-Seek Games,"
Levine's Bibliography
122247000000000345, UCLA Department of Economics.
- Crawford, Vincent P. & Iriberri, Nagore, 2005. "Fatal Attraction: Focality, Naivete and Sophistication in Experimental “Hide and Seek” Games," University of California at San Diego, Economics Working Paper Series qt96v0t3kq, Department of Economics, UC San Diego.
- Vince P. Crawford & Nagore Iriberri, 2005. "Fatal Attraction: Focality, Naivete, and Sophistication in Experimental Hide-and-Seek Games," Levine's Bibliography 666156000000000454, UCLA Department of Economics.
- Vincent P. Crawford & Nagore Iriberri, 2004. "Fatal Attraction: Focality, Naivete, and Sophistication in Experimental Hide-and-Seek Games," Levine's Bibliography 122247000000000316, UCLA Department of Economics.
- Vincent P. Crawford & Nagore Iriberri, 2004. "Fatal Attraction: Focality, Naivete, and Sophistication in Experimental Hide-and-Seek Games," Levine's Bibliography 122247000000000566, UCLA Department of Economics.
- Vincent P. Crawford & Nagore Iriberri, 2006. "Fatal Attraction: Focality, Naivete, and Sophistication in Experimental Hide-and-Seek Games," Levine's Bibliography 122247000000001176, UCLA Department of Economics.
- Strzalecki, Tomasz, 2014.
"Depth of reasoning and higher order beliefs,"
Journal of Economic Behavior & Organization, Elsevier, vol. 108(C), pages 108-122.
- Tomasz Strzalecki, "undated". "Depth of Reasoning and Higher Order Beliefs," Working Paper 8334, Harvard University OpenScholar.
- Strzalecki, Tomasz, 2014. "Depth of Reasoning and Higher Order Beliefs," Scholarly Articles 14397608, Harvard University Department of Economics.
- Dam, Tien Thanh & Ta, Thuy Anh & Mai, Tien, 2022. "Submodularity and local search approaches for maximum capture problems under generalized extreme value models," European Journal of Operational Research, Elsevier, vol. 300(3), pages 953-965.
- Dengler, Sebastian & Prüfer, Jens, 2021.
"Consumers' privacy choices in the era of big data,"
Games and Economic Behavior, Elsevier, vol. 130(C), pages 499-520.
- Prüfer, Jens & Dengler, Sebastian, 2018. "Consumers' Privacy Choices in the Era of Big Data," Discussion Paper 2018-012, Tilburg University, Center for Economic Research.
- Dengler, Sebastian & Prüfer, Jens, 2018. "Consumers' Privacy Choices in the Era of Big Data," Discussion Paper 2018-014, Tilburg University, Tilburg Law and Economic Center.
- Baethge, Caroline, 2016. "Performance in the beauty contest: How strategic discussion enhances team reasoning," Passauer Diskussionspapiere, Betriebswirtschaftliche Reihe B-17-16, University of Passau, Faculty of Business and Economics.
- Alaoui, Larbi & Janezic, Katharina A. & Penta, Antonio, 2020.
"Reasoning about others' reasoning,"
Journal of Economic Theory, Elsevier, vol. 189(C).
- Larbi Alaoui & Katharina A. Janezic & Antonio Penta, 2017. "Reasoning about Others’ Reasoning," Working Papers 1003, Barcelona School of Economics.
- Larbi Alaoui & Katharina A. Janezic & Antonio Penta, 2017. "Reasoning about others’ reasoning," Economics Working Papers 1587, Department of Economics and Business, Universitat Pompeu Fabra.
- Choo, Lawrence C.Y & Kaplan, Todd R., 2014.
"Explaining Behavior in the "11-20" Game,"
MPRA Paper
52808, University Library of Munich, Germany.
- Lawrence C.Y Choo & Todd R. Kaplan, 2014. "Explaining Behavior in the "11-20” Game," Discussion Papers 1401, University of Exeter, Department of Economics.
- Kyle Hyndman & Antoine Terracol & Jonathan Vaksmann, 2022.
"Beliefs and (in)stability in normal-form games,"
Experimental Economics, Springer;Economic Science Association, vol. 25(4), pages 1146-1172, September.
- Hyndman, Kyle & Terracol, Antoine & Vaksmann, Jonathan, 2013. "Beliefs and (In)Stability in Normal-Form Games," MPRA Paper 47221, University Library of Munich, Germany.
- Kyle Hyndman & Antoine Terracol & Jonathan Vaksmann, 2022. "Beliefs and (in)stability in normal-form games," Post-Print hal-03709691, HAL.
- Breitmoser, Yves, 2019.
"Knowing me, imagining you: Projection and overbidding in auctions,"
Games and Economic Behavior, Elsevier, vol. 113(C), pages 423-447.
- Breitmoser, Yves, 2015. "Knowing me, imagining you: Projection and overbidding in auctions," MPRA Paper 62052, University Library of Munich, Germany.
- Breitmoser, Yves, 2016. "Knowing me, imagining you: Projection and overbidding in auctions," MPRA Paper 68981, University Library of Munich, Germany.
- Breitmoser, Yves, 2015. "Knowing me, imagining you: Projection and overbidding in auctions," VfS Annual Conference 2015 (Muenster): Economic Development - Theory and Policy 113160, Verein für Socialpolitik / German Economic Association.
- Benjamin Patrick Evans & Mikhail Prokopenko, 2021. "Bounded rationality for relaxing best response and mutual consistency: The Quantal Hierarchy model of decision-making," Papers 2106.15844, arXiv.org, revised Mar 2023.
- Shapiro, Dmitry & Shi, Xianwen & Zillante, Artie, 2014. "Level-k reasoning in a generalized beauty contest," Games and Economic Behavior, Elsevier, vol. 86(C), pages 308-329.
- Rad Niazadeh & Negin Golrezaei & Joshua Wang & Fransisca Susan & Ashwinkumar Badanidiyuru, 2023. "Online Learning via Offline Greedy Algorithms: Applications in Market Design and Optimization," Management Science, INFORMS, vol. 69(7), pages 3797-3817, July.
- Vincent P. Crawford & Nagore Iriberri, 2007.
"Level-k Auctions: Can a Nonequilibrium Model of Strategic Thinking Explain the Winner's Curse and Overbidding in Private-Value Auctions?,"
Econometrica, Econometric Society, vol. 75(6), pages 1721-1770, November.
- Crawford, Vincent P. & Iriberri, Nagore, 2005. "Level-k Auctions: Can a Non-Equilibrium Model of Strategic Thinking Explain the Winner's Curse and Overbidding in Private-Value Auctions?," University of California at San Diego, Economics Working Paper Series qt12586197, Department of Economics, UC San Diego.
- Vincent P. Crawford & Nagore Iriberri, 2006. "Level-k Auctions: Can a Non-Equilibrium Model of Strategic Thinking Explain the Winner's Curse and Overbidding in Private-Value Auctions?," Levine's Bibliography 321307000000000256, UCLA Department of Economics.
- Vincent P. Crawford & Nagore Iriberri, 2005. "Level-k Auctions: Can a Non-Equilibrium Model of Strategic Thinking Explain the Winner's Curse and Overbidding in Private-Value Auctions?," Levine's Bibliography 784828000000000604, UCLA Department of Economics.
- Vincent P Crawford & Nagore Iriberri, 2007. "Level-k Auctions: Can a Non-Equilibrium Model of Strategic Thinking Explain the Winner's Curse and Overbidding in Private-Value Auctions?," Levine's Bibliography 321307000000001005, UCLA Department of Economics.
More about this item
Keywords
cybersecurity; security; attacker/defender; optimization;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:inm:ordeca:v:20:y:2023:i:3:p:202-219. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Chris Asher (email available below). General contact details of provider: https://edirc.repec.org/data/inforea.html .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.