相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。A game-theoretic approach to modeling attacks and defenses of smart grids at three levels
Xiaojun Gene Shan et al.
RELIABILITY ENGINEERING & SYSTEM SAFETY (2020)
Defender-Attacker Games with Asymmetric Player Utilities
Qingqing Zhai et al.
RISK ANALYSIS (2020)
Defending a parallel system against a strategic attacker with redundancy, protection and disinformation
Rui Peng et al.
RELIABILITY ENGINEERING & SYSTEM SAFETY (2020)
Defense Resource Allocation Against Sequential Unintentional and Intentional Impacts
Rui Peng et al.
IEEE TRANSACTIONS ON RELIABILITY (2019)
A new CubeSat design with reconfigurable multi-band radios for dynamic spectrum satellite communication networks
Ian F. Akyildiz et al.
AD HOC NETWORKS (2019)
Designing comprehensively robust networks against intentional attacks and cascading failures
Shuai Wang et al.
INFORMATION SCIENCES (2019)
Object defence of a single object with preventive strike of random effect
Gao Kaiye et al.
RELIABILITY ENGINEERING & SYSTEM SAFETY (2019)
Redundancy versus protection for a non-reparable phased-mission system subject to external impacts
Rui Peng et al.
RELIABILITY ENGINEERING & SYSTEM SAFETY (2019)
Modeling a multi-target attacker-defender game with multiple attack types
Jing Zhang et al.
RELIABILITY ENGINEERING & SYSTEM SAFETY (2019)
Modeling cumulative defensive resource allocation against a strategic attacker in a multi-period multi-target sequential game
Xiaojun Shan et al.
RELIABILITY ENGINEERING & SYSTEM SAFETY (2018)
On sequence planning for selective maintenance of multi-state systems under stochastic maintenance durations
Yu Liu et al.
EUROPEAN JOURNAL OF OPERATIONAL RESEARCH (2018)
The role of risk preferences in a multi-target defender-attacker resource allocation game
Jing Zhang et al.
RELIABILITY ENGINEERING & SYSTEM SAFETY (2018)
Locating and protecting facilities from intentional attacks using secrecy
Chi Zhang et al.
RELIABILITY ENGINEERING & SYSTEM SAFETY (2018)
Object defense with preventive strike and false targets
Di Wu et al.
RELIABILITY ENGINEERING & SYSTEM SAFETY (2018)
A random-effects Wiener degradation model based on accelerated failure time
Qingqing Zhai et al.
RELIABILITY ENGINEERING & SYSTEM SAFETY (2018)
Defense Strategies for Asymmetric Networked Systems with Discrete Components
Nageswara S. V. Rao et al.
SENSORS (2018)
On channel estimation for power line communication systems in the presence of impulsive noise
Deep Shrestha et al.
COMPUTERS & ELECTRICAL ENGINEERING (2018)
Defense and attack for interdependent systems
Kjell Hausken
EUROPEAN JOURNAL OF OPERATIONAL RESEARCH (2017)
Defense and attack of. performance-sharing common bus systems
Qingqing Zhai et al.
EUROPEAN JOURNAL OF OPERATIONAL RESEARCH (2017)
Optimizing power system investments and resilience against attacks
Yiping Fang et al.
RELIABILITY ENGINEERING & SYSTEM SAFETY (2017)
Special versus general protection and attack of parallel and series components
Kjell Hausken
RELIABILITY ENGINEERING & SYSTEM SAFETY (2017)
Deterrence and Risk Preferences in Sequential Attacker-Defender Games with Continuous Efforts
Vineet M. Payyappalli et al.
RISK ANALYSIS (2017)
Dynamic anomaly detection using cross layer security in MANET
G. Usha et al.
COMPUTERS & ELECTRICAL ENGINEERING (2017)
Reliability analysis and optimal structure of series-parallel phased-mission systems subject to fault-level coverage
Rui Peng et al.
IIE TRANSACTIONS (2016)
Design of optical fiber communication network monitoring and detection system based on address resolution protocol cheats
Hao Zhang et al.
OPTIK (2016)
Optimal resource distribution between protection and redundancy considering the time and uncertainties of attacks
Huadong Mo et al.
EUROPEAN JOURNAL OF OPERATIONAL RESEARCH (2015)
Individual versus overarching protection and attack of assets
Kjell Hausken
CENTRAL EUROPEAN JOURNAL OF OPERATIONS RESEARCH (2014)
Optimal defense with variable number of overarching and individual protections
Gregory Levitin et al.
RELIABILITY ENGINEERING & SYSTEM SAFETY (2014)
Maintenance Versus Individual and Overarching Protections for Parallel Systems
Rui Peng et al.
QUALITY TECHNOLOGY AND QUANTITATIVE MANAGEMENT (2014)
COMBINED SERIES AND PARALLEL SYSTEMS SUBJECT TO INDIVIDUAL VERSUS OVERARCHING DEFENSE AND ATTACK
Kjell Hausken
ASIA-PACIFIC JOURNAL OF OPERATIONAL RESEARCH (2013)
Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender-attacker game
Xiaojun Shan et al.
EUROPEAN JOURNAL OF OPERATIONAL RESEARCH (2013)
Protecting critical infrastructures against intentional attacks: a two-stage game with incomplete information
Chi Zhang et al.
IIE TRANSACTIONS (2013)
Defence resource distribution between protection and decoys for constant resource stockpiling pace
G. Levitin et al.
JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY (2013)
Individual vs. overarching protection for minimizing the expected damage caused by an attack
Gregory Levitin et al.
RELIABILITY ENGINEERING & SYSTEM SAFETY (2013)
Individual versus overarching protection against strategic attacks
G. Levitin et al.
JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY (2012)
Trade-offs between target hardening and overarching protection
N. Haphuriwat et al.
EUROPEAN JOURNAL OF OPERATIONAL RESEARCH (2011)
Optimal defence of single object with imperfect false targets
R. Peng et al.
JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY (2011)
Is it wise to protect false targets?
Gregory Levitin et al.
RELIABILITY ENGINEERING & SYSTEM SAFETY (2011)
An exploration of defensive deception in industrial communication networks
Julian L. Rrushi
INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION (2011)
Optimal preventive maintenance policy under fuzzy Bayesian reliability assessment environments
Yu Liu et al.
IIE TRANSACTIONS (2010)
Defence and attack of systems with variable attacker system structure detection probability
G. Levitin et al.
JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY (2010)
Intelligence and impact contests in systems with redundancy, false targets, and partial protection
Gregory Levitin et al.
RELIABILITY ENGINEERING & SYSTEM SAFETY (2009)
Protection vs. false targets in series systems
Kjell Hausken et al.
RELIABILITY ENGINEERING & SYSTEM SAFETY (2009)