331
Views
24
CrossRef citations to date
0
Altmetric
Original Articles

Defence and attack of complex interdependent systems

Pages 364-376 | Received 08 May 2017, Accepted 05 Feb 2018, Published online: 03 Mar 2018

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (1)

Rui Peng, Di Wu, Mengyao Sun & Shaomin Wu. (2021) An attack-defense game on interdependent networks. Journal of the Operational Research Society 72:10, pages 2331-2341.
Read now

Articles from other publishers (23)

Amin Ahmadi Digehsara, Amir Ardestani-Jaafari, Shumail Mazahir & Michel Fathi. (2023) Two-stage nodal network interdiction under decision-dependent uncertainty. Annals of Operations Research 335:2, pages 665-687.
Crossref
Kai A. Konrad & Florian Morath. (2023) How to preempt attacks in multi-front conflict with limited resources. European Journal of Operational Research 305:1, pages 493-500.
Crossref
Yasser Almoghathawi, Shokri Selim & Kash Barker. (2023) Community structure recovery optimization for partial disruption, functionality, and restoration in interdependent networks. Reliability Engineering & System Safety 229, pages 108853.
Crossref
Xihong Yan, Xiaorong Ren & Xiaofeng Nie. (2022) A budget allocation model for domestic airport network protection. Socio-Economic Planning Sciences 82, pages 101274.
Crossref
Qing Li, Mingchu Li, Zhongqiang Gong, Yuan Tian & Runfa Zhang. (2022) Locating and protecting interdependent facilities to hedge against multiple non-cooperative limited choice attackers. Reliability Engineering & System Safety 223, pages 108440.
Crossref
Lucheng Sun, Ya Zhang & Changyin Sun. (2022) Stochastic Denial-of-Service Attack Allocation in Leader-Following Multiagent Systems. IEEE Transactions on Systems, Man, and Cybernetics: Systems 52:5, pages 2848-2857.
Crossref
Qing Li, Mingchu Li, Runfa Zhang & Jianyuan Gan. (2021) A stochastic bilevel model for facility location-protection problem with the most likely interdiction strategy. Reliability Engineering & System Safety 216, pages 108005.
Crossref
Shuliang Wang, Xifeng Gu, Shengyang Luan & Mingwei Zhao. (2021) Resilience analysis of interdependent critical infrastructure systems considering deep learning and network theory. International Journal of Critical Infrastructure Protection 35, pages 100459.
Crossref
Ahmed Shokry, Piero Baraldi, Andrea Castellano, Luigi Serio & Enrico Zio. (2021) Identification of Critical Components in the Complex Technical Infrastructure of the Large Hadron Collider Using Relief Feature Ranking and Support Vector Machines. Energies 14:18, pages 6000.
Crossref
Xiaoxiong Zhang, Song Ding, Bingfeng Ge, Boyuan Xia & Witold Pedrycz. (2021) Resource allocation among multiple targets for a defender-attacker game with false targets consideration. Reliability Engineering & System Safety 211, pages 107617.
Crossref
Rohit Gupta, Baidyanath Biswas, Indranil Biswas & Shib Sankar Sana. (2020) Firm investment decisions for information security under a fuzzy environment: a game-theoretic approach. Information & Computer Security 29:1, pages 73-104.
Crossref
Zohreh S. Gatmiry, Ashkan Hafezalkotob, Morteza Khakzar bafruei & Roya Soltani. (2021) Food web conservation vs. strategic threats: A security game approach. Ecological Modelling 442, pages 109426.
Crossref
Gautam Bose & Kai A. Konrad. (2020) Devil take the hindmost: Deflecting attacks to other defenders. Reliability Engineering & System Safety 204, pages 107205.
Crossref
Nicola Dimitri. (2020) Skills, Efficiency, and Timing in a Simple Attack and Defense Model. Decision Analysis 17:3, pages 227-234.
Crossref
Piero Baraldi, Andrea Castellano, Ahmed Shokry, Ugo Gentile, Luigi Serio & Enrico Zio. (2020) A Feature Selection-based Approach for the Identification of Critical Components in Complex Technical Infrastructures: Application to the CERN Large Hadron Collider. Reliability Engineering & System Safety 201, pages 106974.
Crossref
Xiaoxiong Zhang, Yanqing Ye & Yuejin Tan. (2020) How to protect a genuine target against an attacker trying to detect false targets. Physica A: Statistical Mechanics and its Applications 553, pages 124245.
Crossref
Nafiseh Ghorbani-Renani, Andrés D. González, Kash Barker & Nazanin Morshedlou. (2020) Protection-interdiction-restoration: Tri-level optimization for enhancing interdependent network resilience. Reliability Engineering & System Safety 199, pages 106907.
Crossref
Gabriel Kuper, Fabio Massacci, Woohyun Shim & Julian Williams. (2020) Who Should Pay for Interdependent Risk? Policy Implications for Security Interdependence Among Airports. Risk Analysis 40:5, pages 1001-1019.
Crossref
Dario Valcamonico, Giovanni Sansavini & Enrico Zio. (2020) Cooperative co-evolutionary approach to optimize recovery for improving resilience in multi-communities. Reliability Engineering & System Safety 197, pages 106800.
Crossref
Jay Simon & Ayman Omar. (2020) Cybersecurity investments in the supply chain: Coordination and a strategic attacker. European Journal of Operational Research 282:1, pages 161-171.
Crossref
Erja Mustonen-Ollila, Martti Lehto & Jukka Heikkonen. (2020) Components of defence strategies in society’s information environment: a case study based on the grounded theory. Security and Defence Quarterly 28:1, pages 19-43.
Crossref
Xiaoxiong Zhang, Xin Li & Zhen Yuan. (2019) Defending a single object in a defender-attacker game considering time. Defending a single object in a defender-attacker game considering time.
Kai A. Konrad & Florian Morath. (2022) How to Preempt Attacks in Multi-front Conflict with Limited Resources. SSRN Electronic Journal.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.