4.7 Article

Defending a series system with individual protection, overarching protection, and disinformation

Related references

Note: Only part of the references are listed.
Article Engineering, Industrial

A game-theoretic approach to modeling attacks and defenses of smart grids at three levels

Xiaojun Gene Shan et al.

RELIABILITY ENGINEERING & SYSTEM SAFETY (2020)

Article Public, Environmental & Occupational Health

Defender-Attacker Games with Asymmetric Player Utilities

Qingqing Zhai et al.

RISK ANALYSIS (2020)

Article Engineering, Industrial

Defending a parallel system against a strategic attacker with redundancy, protection and disinformation

Rui Peng et al.

RELIABILITY ENGINEERING & SYSTEM SAFETY (2020)

Article Computer Science, Hardware & Architecture

Defense Resource Allocation Against Sequential Unintentional and Intentional Impacts

Rui Peng et al.

IEEE TRANSACTIONS ON RELIABILITY (2019)

Article Computer Science, Information Systems

A new CubeSat design with reconfigurable multi-band radios for dynamic spectrum satellite communication networks

Ian F. Akyildiz et al.

AD HOC NETWORKS (2019)

Article Computer Science, Information Systems

Designing comprehensively robust networks against intentional attacks and cascading failures

Shuai Wang et al.

INFORMATION SCIENCES (2019)

Article Engineering, Industrial

Object defence of a single object with preventive strike of random effect

Gao Kaiye et al.

RELIABILITY ENGINEERING & SYSTEM SAFETY (2019)

Article Engineering, Industrial

Redundancy versus protection for a non-reparable phased-mission system subject to external impacts

Rui Peng et al.

RELIABILITY ENGINEERING & SYSTEM SAFETY (2019)

Article Engineering, Industrial

Modeling a multi-target attacker-defender game with multiple attack types

Jing Zhang et al.

RELIABILITY ENGINEERING & SYSTEM SAFETY (2019)

Article Engineering, Industrial

Modeling cumulative defensive resource allocation against a strategic attacker in a multi-period multi-target sequential game

Xiaojun Shan et al.

RELIABILITY ENGINEERING & SYSTEM SAFETY (2018)

Article Engineering, Industrial

The role of risk preferences in a multi-target defender-attacker resource allocation game

Jing Zhang et al.

RELIABILITY ENGINEERING & SYSTEM SAFETY (2018)

Article Engineering, Industrial

Locating and protecting facilities from intentional attacks using secrecy

Chi Zhang et al.

RELIABILITY ENGINEERING & SYSTEM SAFETY (2018)

Article Engineering, Industrial

Object defense with preventive strike and false targets

Di Wu et al.

RELIABILITY ENGINEERING & SYSTEM SAFETY (2018)

Article Engineering, Industrial

A random-effects Wiener degradation model based on accelerated failure time

Qingqing Zhai et al.

RELIABILITY ENGINEERING & SYSTEM SAFETY (2018)

Article Chemistry, Analytical

Defense Strategies for Asymmetric Networked Systems with Discrete Components

Nageswara S. V. Rao et al.

SENSORS (2018)

Article Computer Science, Hardware & Architecture

On channel estimation for power line communication systems in the presence of impulsive noise

Deep Shrestha et al.

COMPUTERS & ELECTRICAL ENGINEERING (2018)

Article Management

Defense and attack for interdependent systems

Kjell Hausken

EUROPEAN JOURNAL OF OPERATIONAL RESEARCH (2017)

Article Management

Defense and attack of. performance-sharing common bus systems

Qingqing Zhai et al.

EUROPEAN JOURNAL OF OPERATIONAL RESEARCH (2017)

Article Engineering, Industrial

Optimizing power system investments and resilience against attacks

Yiping Fang et al.

RELIABILITY ENGINEERING & SYSTEM SAFETY (2017)

Article Engineering, Industrial

Special versus general protection and attack of parallel and series components

Kjell Hausken

RELIABILITY ENGINEERING & SYSTEM SAFETY (2017)

Article Public, Environmental & Occupational Health

Deterrence and Risk Preferences in Sequential Attacker-Defender Games with Continuous Efforts

Vineet M. Payyappalli et al.

RISK ANALYSIS (2017)

Article Computer Science, Hardware & Architecture

Dynamic anomaly detection using cross layer security in MANET

G. Usha et al.

COMPUTERS & ELECTRICAL ENGINEERING (2017)

Article Operations Research & Management Science

Individual versus overarching protection and attack of assets

Kjell Hausken

CENTRAL EUROPEAN JOURNAL OF OPERATIONS RESEARCH (2014)

Article Engineering, Industrial

Optimal defense with variable number of overarching and individual protections

Gregory Levitin et al.

RELIABILITY ENGINEERING & SYSTEM SAFETY (2014)

Article Engineering, Industrial

Maintenance Versus Individual and Overarching Protections for Parallel Systems

Rui Peng et al.

QUALITY TECHNOLOGY AND QUANTITATIVE MANAGEMENT (2014)

Article Operations Research & Management Science

COMBINED SERIES AND PARALLEL SYSTEMS SUBJECT TO INDIVIDUAL VERSUS OVERARCHING DEFENSE AND ATTACK

Kjell Hausken

ASIA-PACIFIC JOURNAL OF OPERATIONAL RESEARCH (2013)

Article Management

Defence resource distribution between protection and decoys for constant resource stockpiling pace

G. Levitin et al.

JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY (2013)

Article Engineering, Industrial

Individual vs. overarching protection for minimizing the expected damage caused by an attack

Gregory Levitin et al.

RELIABILITY ENGINEERING & SYSTEM SAFETY (2013)

Article Management

Individual versus overarching protection against strategic attacks

G. Levitin et al.

JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY (2012)

Article Management

Trade-offs between target hardening and overarching protection

N. Haphuriwat et al.

EUROPEAN JOURNAL OF OPERATIONAL RESEARCH (2011)

Article Management

Optimal defence of single object with imperfect false targets

R. Peng et al.

JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY (2011)

Article Engineering, Industrial

Is it wise to protect false targets?

Gregory Levitin et al.

RELIABILITY ENGINEERING & SYSTEM SAFETY (2011)

Article Computer Science, Information Systems

An exploration of defensive deception in industrial communication networks

Julian L. Rrushi

INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION (2011)

Article Management

Defence and attack of systems with variable attacker system structure detection probability

G. Levitin et al.

JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY (2010)

Article Engineering, Industrial

Intelligence and impact contests in systems with redundancy, false targets, and partial protection

Gregory Levitin et al.

RELIABILITY ENGINEERING & SYSTEM SAFETY (2009)

Article Engineering, Industrial

Protection vs. false targets in series systems

Kjell Hausken et al.

RELIABILITY ENGINEERING & SYSTEM SAFETY (2009)