You are currently viewing a new version of our website. To view the old version click .
Entropy
  • Article
  • Open Access

28 December 2022

Attack–Defense Game Model with Multi-Type Attackers Considering Information Dilemma

,
,
,
and
College of Systems Engineering, National University of Defense Technology, Changsha 410073, China
*
Author to whom correspondence should be addressed.
This article belongs to the Topic Complex Systems and Network Science

Abstract

Today, people rely heavily on infrastructure networks. Attacks on infrastructure networks can lead to significant property damage and production stagnation. The game theory provides a suitable theoretical framework for solving the problem of infrastructure protection. Existing models consider only the beneficial effects that the defender obtains from information gaps. If the attacker’s countermeasures are ignored, the defender will become passive. Herein, we consider that a proficient attacker with a probability in the game can fill information gaps in the network. First, we introduce the link-hiding rule and the information dilemma. Second, based on the Bayesian static game model, we establish an attack–defense game model with multiple types of attackers. In the game model, we consider resource-consistent and different types of distributions of the attacker. Then, we introduce the solution method of our model by combining the Harsanyi transformation and the bi-matrix game. Finally, we conduct experiments using a scale-free network. The result shows that the defender can be benefited by hiding some links when facing a normal attacker or by estimating the distribution of the attacker correctly. The defender will experience a loss if it ignores the proficient attacker or misestimates the distribution.

1. Introduction

Critical infrastructures, such as electrical power systems, communications systems, and oil pipeline systems, exist in the form of networks and play an essential role in the lives of modern residents. Damage to these infrastructures brings tremendous economic losses and generates negative social influence. The importance of infrastructure attracts terrorists and enemies during wars. Recently, the Crimean Bridge, which undertook a resupply mission for the Russian army, was blown up, and one-third of the Ukrainian power plants were destroyed, leading to power outages across the country. The protection of infrastructure networks must be settled urgently.
Most research mainly considers the antagonism between the attacker and the defender and studies the allocation of defensive resources or the establishment of defensive strategies by building a game model suitable for the characteristics of various infrastructures. Feng et al. [1] established a static game model and Bayesian game model to analyze defense allocation for chemical facilities. Regarding the power system, Tas et al. [2] considered the cascade failure of the power grid and analyzed how the attacker harnesses it in the game. For transposition systems, Talarico et al. [3] built a framework to warn against impending attacks on the transportation infrastructure.
Combining game theory with complex networks theory, Li et al. [4,5,6] considered different disintegration strategies and analyzed the influence of network structure on equilibrium. Zeng et al. [7] contracted a false network to mislead an attacker by reconnecting links and studied the influence of asymmetric information on the game. They also built a Bayesian game model to solve the problem of multi-type attackers who have different payoff functions [8]. We design a link hiding rule to create the information gap between the defender and the attacker and compare the benefit of hiding links with reconnected links [9].
In previous research, there are some methods that build information gaps to mislead the attacker in game, such as hidden node information, hidden links in networks, and the construction of false links. However, the attackers can fill those gaps through reconnaissance and link predictions. In this paper, we build a Bayesian game model with a defender and an attacker to study the situation in which hidden links are discovered. We assume that there exist several types of attacker. The proficient attacker can discover the whole network structure, and the normal attacker cannot find the hidden links. In the view of the defender, the different type of attacker exists with a distribution of probability, which is prior probabilities in a Bayesian game. Then we calculate the Bayesian equilibrium in different parameter combinations. We consider the two situations of misjudgment. The result is shown that underestimating the probability of the proficient attacker is more serious.
The remainder of this paper is organized as follows: Section 2 introduces some related works; Section 3 introduces a link-hiding rule and information dilemma. Section 4 establishes an attack–defense game model based on the Bayesian static game model and presents the solution method; Section 5 shows the equilibrium results in a scale-free network and analyzes the impact of link information. Section 6 concludes this paper.

4. The Attack–Defense Game Model with Multi-Type Attackers under Information Dilemma

Considering the information dilemma caused by hidden links, we built a static game model based on Bayesian games. The type of attacker is uncertain, but the defender can estimate the distribution of the type. To simplify the model, we consider the proficient and normal types of attacker, and the distribution is estimated to Ω = ( ω , 1 ω ) .

4.1. Cost Model

We considered only the strategy of the node here. When a node is removed, the links are removed. The source of the attack and defense node v i is denoted by c i , a parameter related to the node’s property r i :
c i = r i ,
Assuming that the resources of attack or defense for all nodes are C ˜ , then:
C ˜ = i = 1 N c i = i = 1 N r i ,
we donate θ A [ 0 , 1 ] as the cost constraint coefficient, the attacker’s available resources can be represented as T ˜ A = θ A C ˜ A = θ A i = 1 N r i β . Similarly, we can define C ˜ D and T ˜ D by C ˜ D = i = 1 N c i D = i = 1 N ( r i ) , and T ˜ D = θ D C ˜ D = θ D i = 1 N r i , respectively.
The d = ( d 1 , d 2 , , d N ) S D is donated as a defensive strategy satisfying resource constraints, where S D is the strategy set of the defender. If the node is defended, we have d i = 1 ; otherwise, d i = 0 . The cost of d is:
C d D = v i V D r i = i = 1 N d i r i T ˜ D = θ D i = 1 N r i .
Similarly, we can define the attacker’s cost C a A , where a = [ a 1 , a 2 , , a N ] S A :
C a A = v i V A r i = i = 1 N a i r i T ˜ A = θ A i = 1 N r i .
We note that r i of the same nodes might be different for the attacker and defender. When links are hidden, r i is changed in the infrastructure networks, which means a cost change. Insufficient attacks may not damage the nodes. Let V A represent the set of attacked nodes. We define the success rates to reflect this effect: v i V A
p s i = 0 if c i A c i D r i < 0 c i A c i D r i if 0 c i A c i D r i 1 1 if 1 < c i A c i D r i .
where r i A and r i D represent the node properties in the views of the attacker and defender, respectively. Here, r i is the degree of the nodes.

4.2. Strategy Set

Here, we only consider two typical strategies:
(1)
High-degree attack or defense strategy. A high-degree attack strategy damages nodes with a high degree. The high-degree defense strategy defends nodes with a high degree.
(2)
Low-degree attack or defense strategy. The low-degree attack strategy is aimed at nodes with a low degree. Because the resources consumed are relatively low compared with high-degree nodes, the low-degree attack at the same cost can destroy more low-degree nodes. The low-degree defense strategy defends nodes with a low degree.
Specifically, the attacker develops strategies based on the network structure it owns. A proficient attacker adopts a strategy based on the true network, and thus it has a high-degree attack strategy in true networks ( T H A ) and a low-degree attack strategy in true networks ( T L A ). A normal attacker adopts a high-degree attack strategy in misleading networks ( M H A ) and a low-degree attack strategy in misleading networks ( M L A ). As the best response strategies, defenders need to consider four strategies: high-degree defense strategy in true networks ( T H D ), low-degree defense strategy in true networks ( T L D ), high-degree defense strategy in misleading networks ( M H D ), and low-degree defense strategy in misleading networks ( M L D ).

4.3. Payoff Function

We denote the measure function of the network performance by Γ , including the efficiency and size of the largest connected component. Let G ^ represent the network after a game round. Then, the defender’s payoff function is
u D ( a , d ) = Γ ( G ^ ) Γ ( G ) Γ ( G ) .
Similarly, the payoff of the attacker can be defined as:
u A ( a , d ) = Γ ( G ) Γ ( G ^ ) Γ ( G ) .
Here the G might be different between Equations (7) and (8) for partly hiding links.

5. Solution Method

The Bayesian Nash equilibrium is a general solution for the Bayesian game model, and we used it as the solution here. The solution form is ((the equilibrium of type 1 of the attacker, the equilibrium of type 2 of the attacker), the equilibrium of the defender). Let the distributions of the defender’s strategy and the attacker’s strategy be P = ( p 1 , p 2 , , p n ) and Q k = ( q 1 a k , q 2 a k , , q m a k a k ) [ 0 , 1 ] m a k , where n and m a k represent the number of defender’s and k t h type of attacker‘s strategies, respectively. The attacker’s objective function can be donated as:
max O a k = max P U a k Q k ,
where U a k represents the payoff matrix of the k t h type of attacker.
The defender’s objective function can be denoted as follows:
max O d = max k = 1 K ω k P U d Q k ,
where U d represents the payoff matrix of the defender.
The attack–defense game model established here is a Bayesian static game model in which both attackers and defenders act simultaneously. In other words, before the game occurs, neither the attacker nor the defender knows which strategy the other side has adopted. The Bayesian static game model can be transformed into a complete information static game model using Harsanyi transformation [23]. The solution of the Bayesian static game model is defined as the Bayesian Nash equilibrium (BNE). Let the solution be of the form ( P * , Q 1 * , Q 2 * , , Q K * ) Then, we have:
P * U a k Q k * P * U a k Q k
k = 1 K ω k P * U a k Q k * k = 1 K ω k P U a k Q k *
Specifically, we considered a payoff matrix for two types of attackers. When the attacker is normal, the attacker does not have full information about the network structure. At this point, it creates strategies and calculates the payoff according to the misleading network. When the defender adopts T H D and T L D , the attacker views them as M H D and M L D to calculate the payoff. When the attacker is proficient, it has full information about the entire game and knows all the strategies the defender may adopt. The payoff at this time is the value both parties calculated based on the real network. Then we can calculate the payoff matrices based on payoff function, and payoff matrices of proficient and normal attacker are shown in Table 1 and Table 2, respectively.
Table 1. The payoff matrix of proficient attacker, whose probability is ω .
Table 2. The payoff matrix of normal attacker, whose probability is 1 ω .
Based on the Harsanyi model [24,25], we can turn it to Table 3. We can solve this bi-matrix game using linear programming [26].
Table 3. The payoff matrix after the Harsanyi transformation.

6. Experiments

Most real-world networks are scale-free, such as airplane networks [27] and bank payoff networks [28]. We used the Barabási–Albert model to construct a scale-free network with 300 nodes and an average degree of 2. We conducted 500 independent experiments based on this network and obtained the average payoff. Main definitions used in this section are shown in Table 4.
Table 4. Abbreviations and definitions.

6.1. Benefits of the Link Hiding for the Defender

The degree values of the nodes with different link hidden coefficients are shown in Figure 2. According to the figure, the height degree of the node decreases more than the low degree of the nodes, with an increase in the average link hiding coefficient. Hiding some links disturbs the order of the degrees. The high-degree attack strategy based on a misleading network excludes some nodes, although its degree is high in reality.
Figure 2. The degree value of the node in the true network (TN) and the misleading network (MN). The x-axis represents the true degree value of the node, and the y-axis represents the degree value of the node behind the hidden link. The red and blue dots represent the change in the degree value of the node when the link hidden coefficient α = 0.1 and α = 0.2 , respectively.
If the link hiding cannot improve the defender’s payoff in any situation, an information dilemma does not exist. We prove the benefit to the defender facing the normal attacker by partly hiding links. Facing a normal attacker, ω equals zero, and the game degenerates into a complete information game. We calculate the payoff of the Nash equilibrium when applying M D (the strategy set contains M H D and M L D ) against M A (the strategy set contains M H A and M L A ), and the results are shown in Figure 3. We found that hidden links can benefit the defender and that the benefit to the defender increases with an increase in the link hidden coefficient.
Figure 3. The defender’s equilibrium payoff when the defender adopts the M D set facing the normal attacker, when attack cost constraint coefficient θ A [ 0.1 , 0.9 ] , defense cost constraint coefficient θ D [ 0.1 , 0.9 ] , average link hiding coefficient α = 0 , 0.1 , 0.2 .
We computed the Bayesian Nash equilibrium of the defender when the distributions of the attacker type Ω = ( ω , 1 ω ) were ( 0.1 , 0.9 ) , ( 0.5 , 0.5 ) , ( 0.7 , 0.3 ) . The results are shown in Figure 4. According to the figure, the probability of the defender adopting the real strategy gradually increases with a gradual increase in the number of hidden links and the probability of a highly proficient attacker. We observed that when the probability of a proficient attacker is low, the defender still adopts T D (the defense strategies based on the true network) in some cases, particularly T H D (the high-degree defense strategy based on the true network). T D covers more real critical nodes and allocates more resources to protect the network. The defender adopts M D (the defense strategies based on a misleading network), which can better cope with the normal attacker when the defender’s cost constraint coefficient and the probability of the proficient attacker are both low. The M D cost is lower than T D . We also calculated the defender’s equilibrium payoff; the results are shown in Figure 5. As seen in Figure 5, the defender’s payoff increases as the defense cost increases and the attack cost decreases. Hiding partial links can benefit the defender in most situations in the Bayesian Nash equilibrium. There are also singularities when the probability of a proficient attacker is high.
Figure 4. Probabilities of the defender’s strategies in Bayesian Nash equilibrium under different attack cost constraint coefficient θ A and defense cost constraint coefficient combinations, when average link hiding coefficient α = 0 , 0.1 , 0.2 , probability of the proficient attacker ω equal 0.1 , 0.5 , 0.7 . The yellow grid represents when T L D and M L D coincide.
Figure 5. Defender’s equilibrium payoff under different attack cost constraint coefficient θ A and defense cost constraint coefficient θ D combinations, when average link hiding coefficient α = 0 , 0.1 , 0.2 , probability of the proficient attacker ω equal 0.1 , 0.5 , 0.7 .

6.2. Equilibrium with Different Distributions of the Attacker’s Type

The attacker is the proficient type, and its equilibrium strategy is shown in Figure 6. When the attacker has more resources than the defender, it adopts the high-degree strategy to attack the critical nodes, which cannot be covered by the high-degree defense strategy for the low-defense resource. When the defender estimates the probability of a proficient attacker as low, the defender mainly copes with the attack strategy based on the misleading network. Therefore, the proficient attacker will likely use high-degree strategies, which can obtain more payoff for destroying critical nodes. With the increase in the average hiding coefficient, the gap between the strategy based on the true network and the strategy based on the misleading network increases. The proficient attacker obtains more payoff by increasing the probability of the high-degree attack strategy. When the defender estimates the probability of a proficient attacker increase, the defender mainly resists the attack strategies based on the true network. The defender protects the critical nodes with a high-degree defense strategy. The proficient attacker decreases the probability of the high-degree strategy to avoid defense.
Figure 6. Probability of the proficient attacker adopting high-degree attack strategies based on the true network under different attack cost constraint coefficient ( θ A [ 0.1 , 0.9 ] ) and defense cost constraint coefficient ( θ D [ 0.1 , 0.9 ] ) combinations in Bayesian Nash equilibrium, when average hiding coefficient α = 0 , 0.1 , 0.2 , probability of the proficient attacker ω = 0.1 , 0.5 , 0.7 .
When the attacker is of the normal type, the equilibrium strategy is shown in Figure 7. The normal attacker has a similar result to the proficient attacker. When the probability of the normal type is high ( 1 ω = 0.9 ), the defender pays more attention to strategies based on the misleading network. Link hiding has almost no effect on the equilibrium at this time. With the decrease in the probability of the normal type, attack strategies based on the misleading network cannot be held back, and the normal attacker adopts the pure strategies. However, our calculation of the equilibrium payoff is insignificant. A normal attacker may not adopt the strategy distribution we provided. According to the Nash equilibrium definition, when the attacker adopts other strategy distributions, the payoff obtained is less than or equal to the equilibrium payoff.
Figure 7. Probability of the normal attacker adopting M H A (the high-degree attack strategy based on the misleading network) in Bayesian Nash equilibrium under different attack cost constraint coefficient ( θ A [ 0.1 , 0.9 ] ) and defense cost constraint coefficient ( θ D [ 0.1 , 0.9 ] ) combinations, when average hiding coefficient α = 0 , 0.1 , 0.2 , probability of the normal attacker 1 ω = 0.9 , 0.5 , 0.3 .

6.3. Influence of the Misjudgment on the Defender

Consider the first information dilemma, in which the defender ignores the existence of the proficient attacker. When the attacker is a proficient type, and the defender does not know it at all, we calculate u D ( T H A , M H D ) and u D ( T L A , M L D ) when α = 0 , 0.1 , 0.2 and θ = θ A = θ D , and the result is shown in Figure 8. At this moment, the defender and attacker have the same cost constraint coefficient. The gap between the corresponding “optimal response strategy” gradually increases with the link hiding coefficient. We also calculate the equilibrium payoff for this situation. The results are shown in Figure 9. This information gap reduces the defender’s payoff.
Figure 8. Payoff u D ( T H A , M H D ) and payoff u D ( T L A , M L D ) when the average hiding coefficient α = 0 , 0.1 , 0.2 and cost coefficient θ = θ A = θ D [ 0.1 , 0.9 ] . The T H A represents the high-degree attack strategy based on the true network, and the T L A represents the low-degree attack strategy based on the true network. The M H D represents the high-degree defense strategy based on the misleading network, and the M L D represents the low-degree defense strategy based on the misleading network. The Subfigure (a) reflect the gap between T H A and M H D , and the Subfigure (b) reflect the gap between T L A and M L D . Gaps increases when the α increases, which means the defender cannot cope with the attacker although it chooses right defense mode.
Figure 9. Defender’s equilibrium payoff when the defender adopts M H D (high-degree defense strategy based on the misleading network) and M L D (low-degree defense strategy based on the misleading network) facing a proficient attacker under different attack cost constraint coefficient ( θ A [ 0.1 , 0.9 ] ) and defense cost constraint coefficient ( θ D [ 0.1 , 0.9 ] ) combinations.
Second, we considered the information dilemma triggered by the misjudgment of the distribution of attacker types. The defender’s judgment of the type of attacker is also based on data experience and other methods. There is uncertainty in this method; therefore, there is a situation in which the attacker may be misled about the distribution. We calculate the payoff when the true type distribution is Ω = ( 0.1 , 0.9 ) , the misjudgment distribution is Ω = ( 0.9 , 0.1 ) , the true type distribution is Ω = ( 0.9 , 0.1 ) and the misjudgment distribution is Ω = ( 0.1 , 0.9 ) . The results are shown in Figure 10 and Figure 11.
Figure 10. Defender’s payoff with correct ( Ω = ( 0.1 , 0.9 ) ) and incorrect ( Ω = ( 0.9 , 0.1 ) ) judge attacker probability distributions, when attack cost constraint coefficient θ A [ 0.1 , 0.9 ] , defense cost constraint coefficient θ D [ 0.1 , 0.9 ] , average hiding coefficient α = 0.1 , 0.2 . The δ ( C I ) represents the payoff difference between correct and incorrect situation. Link hiding brings about a loss to the defender when underestimating normal attackers.
Figure 11. Defender’s payoff when correct ( Ω = ( 0.9 , 0.1 ) ) and incorrect ( Ω = ( 0.1 , 0.9 ) ) judge attacker probability distributions, attack cost constraint coefficient θ A [ 0.1 , 0.9 ] , defense cost constraint coefficient θ D [ 0.1 , 0.9 ] , and average hiding coefficient α = 0.1 , 0.2 . The δ ( C I ) represent the payoff difference between correct and incorrect situation. Link hiding brings about a loss to the defender when underestimating proficient attackers.
As shown in Figure 10, in the face of the first type of misjudgment, the defender’s payoff decreases in most cases, and the decrease in the payoff increases with an increase in the link hidden coefficient. There are also some singularities in this situation. When the average hiding coefficient α is equal to 0.1 and the defense cost coefficient θ D is greater than 0.5 , the payoff of incorrect judgment is greater than that of correct judgment for protecting critical nodes. With an increase in the average hiding coefficient, the degree of high-degree nodes decreases, which can be contained in a high-degree strategy based on misleading networks at a lower cost. Thus, when the average hiding coefficient α equals 0.2 , the singularities appear at θ D lower than 0.5 .
From Figure 11, we can obtain similar conclusions when Ω = ( 0.9 , 0.1 ) and Ω = ( 0.1 , 0.9 ) . An incorrect estimation can result in extra loss for hiding partial links. The loss increases with an increase in the average hiding coefficient. Combined with Figure 10 and Figure 11, the loss of the underestimated the probability of the proficient attacker is more than that of the underestimated normal attacker.

7. Conclusions

Technology has facilitated the construction of infrastructure networks and has brought great convenience to people’s lives, making residents increasingly dependent on them. To effectively protect the infrastructure network, it is necessary to combine game theory and complex network theory to study this problem. The link information plays important roles for the game participants as an essential part of infrastructure networks. The link hiding can benefit the defender facing normal attackers by building information gaps. However, when facing a proficient attacker, it causes trouble for the defender. We call the situation an information dilemma.
In this paper, we study the information dilemma by establishing a Bayesian game model. First, we introduce the link hiding rule, which is an effective method to build an information gap, and translate why the information dilemma exists. Second, we build a Bayesian game model with a multi-type of attacker. Then, we introduce the solution method. Finally, we experiment in a scale-free network. The result is shown that link hiding benefits the defender when facing the normal attacker. By the Bayesian Nash equilibrium, the defender copes with the different types of attacker and benefits by partly hiding links. We also analyze the situation of missed and incorrect judgments, which proves disadvantageous in link hiding. We should pay more attention to the proficient attacker.
Only two typical strategies are considered in our model, and more possible strategies will be considered in future work. In addition, the game model that we established mainly faces perfect rational participants. In reality, people are not always completely rational [29]. Therefore, the bounded rational groups should be studied in the future. We will make the game model more practical in the following work.

Supplementary Materials

The following supporting information can be downloaded at: https://www.mdpi.com/article/10.3390/e25010057/s1.

Author Contributions

Conceptualization, G.Q. and J.L.; methodology, G.Q. and J.L; software, G.Q.; validation, G.Q., J.L. and C.X.; formal analysis, G.Q., G.C. and J.L.; investigation, J.L. and K.Y.; writing, original draft preparation, G.Q., J.L. and C.X.; writing, review and editing, G.Q., J.L., C.X., G.C. and K.Y.; visualization, G.Q. and J.L.; project administration, G.Q.; funding acquisition, J.L. and K.Y. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported in part by the National Natural Science Foundation of China under Grant Nos 72001209, 72231011, 71971213, 72071206 and the Science and Technology Innovative Research Team in Higher Educational Institutions of Hunan Province under Grant Nos 2020RC4046, and the Science Foundation for Outstanding Youth Scholars of Hunan Province No. 2022JJ20047.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

Data are contained within the article or Supplementary Materials.

Conflicts of Interest

The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

References

  1. Feng, Q.; Cai, H.; Chen, Z.; Zhao, X.; Chen, Y. Using game theory to optimize allocation of defensive resources to protect multiple chemical facilities in a city against terrorist attacks. J. Loss Prev. Process. Ind. 2016, 43, 614–628. [Google Scholar] [CrossRef]
  2. Tas, S.; Bier, V.M. Addressing vulnerability to cascading failure against intelligent adversaries in power networks. Energy Syst. 2016, 7, 193–213. [Google Scholar] [CrossRef]
  3. Talarico, L.; Reniers, G.; Sörensen, K.; Springael, J. MISTRAL: A game-theoretical model to allocate security measures in a multi-modal chemical transportation network with adaptive adversaries. Reliab. Eng. Syst. Saf. 2015, 138, 105–114. [Google Scholar] [CrossRef]
  4. Li, Y.; Tan, S.; Deng, Y.; Wu, J. Attacker-defender game from a network science perspective. Chaos Interdiscip. J. Nonlinear Sci. 2018, 28, 051102. [Google Scholar] [CrossRef]
  5. Li, Y.; Deng, Y.; Xiao, Y.; Wu, J. Attack and defense strategies in complex networks based on game theory. J. Syst. Sci. Complex. 2019, 32, 1630–1640. [Google Scholar] [CrossRef]
  6. Li, Y.; Qiao, S.; Deng, Y.; Wu, J. Stackelberg game in critical infrastructures from a network science perspective. Phys. A Stat. Mech. Its Appl. 2019, 521, 705–714. [Google Scholar] [CrossRef]
  7. Zeng, C.; Ren, B.; Li, M.; Liu, H.; Chen, J. Stackelberg game under asymmetric information in critical infrastructure system: From a complex network perspective. Chaos Interdiscip. J. Nonlinear Sci. 2019, 29, 083129. [Google Scholar] [CrossRef]
  8. Zeng, C.; Ren, B.; Liu, H.; Chen, J. Applying the bayesian stackelberg active deception game for securing infrastructure networks. Entropy 2019, 21, 909. [Google Scholar] [CrossRef]
  9. Qi, G.; Li, J.; Xu, X.; Chen, G.; Yang, K. An attack–defense game model in infrastructure networks under link hiding. Chaos Interdiscip. J. Nonlinear Sci. 2022, 32, 113109. [Google Scholar] [CrossRef]
  10. Bier, V.; Oliveros, S.; Samuelson, L. Choosing what to protect: Strategic defensive allocation against an unknown attacker. J. Public Econ. Theory 2007, 9, 563–587. [Google Scholar] [CrossRef]
  11. Baykal-Guersoy, M.; Duan, Z.; Poor, H.V.; Garnaev, A. Infrastructure security games. Eur. J. Oper. Res. 2014, 239, 469–478. [Google Scholar] [CrossRef]
  12. Chen, P.; Cheng, S.; Chen, K. Smart attacks in smart grid communication networks. IEEE Commun. Mag. 2012, 50, 24–29. [Google Scholar] [CrossRef]
  13. Fu, C.; Gao, Y.; Zhong, J.; Sun, Y.; Pengtao, Z.; Wu, T. Attack-defense game for critical infrastructure considering the cascade effect. Reliab. Eng. Syst. Saf. 2021, 216, 107958. [Google Scholar]
  14. Brown, G.; Carlyle, M.; Salmerón, J.; Wood, K. Defending critical infrastructure. Interfaces 2006, 36, 530–544. [Google Scholar] [CrossRef]
  15. Fu, C.; Zhang, P.; Zhou, L.; Gao, Y.; Du, N. Camouflage strategy of a Stackelberg game based on evolution rules. Chaos Solitons Fractals 2021, 153, 111603. [Google Scholar]
  16. Zhang, H.; Dingkun, Y.U.; Wang, J.; Han, J.; Wang, N. Security Defence Policy Selection Method Using the Incomplete Information Game Model. China Commun. 2015, 9, 2. [Google Scholar]
  17. Feng, Q.; Cai, H.; Chen, Z. Using game theory to optimize the allocation of defensive resources on a city scale to protect chemical facilities against multiple types of attackers. Reliab. Eng. Syst. Saf. 2019, 191, 105900. [Google Scholar] [CrossRef]
  18. Jiang, J.; Liu, X. Bayesian Stackelberg game model for water supply networks against interdictions with mixed strategies. Int. J. Prod. Res. 2021, 59, 2537–2557. [Google Scholar] [CrossRef]
  19. Gu, X.; Zeng, C.; Xiang, F. Applying a Bayesian Stackelberg game to secure infrastructure system: From a complex network perspective. In Proceedings of the 2019 4th International Conference on Automation, Control and Robotics Engineering, Shenzhen, China, 19–21 July 2019; pp. 1–6. [Google Scholar]
  20. Li, Y.; Wu, J.; Zou, A. Effect of eliminating edges on robustness of scale-free networks under intentional attack. Chin. Phys. Lett. 2010, 27, 068901. [Google Scholar]
  21. Hayashi, Y.; Matsukubo, J. Improvement of the robustness on geographical networks by adding shortcuts. Phys. A Stat. Mech. Its Appl. 2007, 380, 552–562. [Google Scholar] [CrossRef]
  22. Zhou, X.; Chen, Q.; Lyu, S.; Chen, H. Mapping the Buried Cable by Ground Penetrating Radar and Gaussian-Process Regression. IEEE Trans. Geosci. Remote. Sens. 2022, 60, 1–12. [Google Scholar] [CrossRef]
  23. Harsanyi, J.C.; Selten, R. A generalized Nash solution for two-person bargaining games with incomplete information. Manag. Sci. 1972, 18, 80–106. [Google Scholar] [CrossRef]
  24. Harsanyi, J.C. Games with incomplete information played by “Bayesian” players, I–III Part I. The basic model. Manag. Sci. 1967, 14, 159–182. [Google Scholar] [CrossRef]
  25. Harsanyi, J.C. Games with incomplete information played by “Bayesian” players part II. Bayesian equilibrium points. Manag. Sci. 1968, 14, 320–334. [Google Scholar] [CrossRef]
  26. Bilò, V.; Fanelli, A. Computing exact and approximate Nash equilibria in 2-player games. In Proceedings of the International Conference on Algorithmic Applications in Management; Springer: Berlin/Heidelberg, Germany, 2010; pp. 58–69. [Google Scholar]
  27. De Masi, G.; Iori, G.; Caldarelli, G. Fitness model for the Italian interbank money market. Phys. Rev. E 2006, 74, 066112. [Google Scholar] [CrossRef] [PubMed]
  28. Guimera, R.; Mossa, S.; Turtschi, A.; Amaral, L.N. The worldwide air transportation network: Anomalous centrality, community structure, and cities’ global roles. Proc. Natl. Acad. Sci. USA 2005, 102, 7794–7799. [Google Scholar] [CrossRef] [PubMed]
  29. Zhang, J.; Wang, Y.; Zhuang, J. Modeling multi-target defender-attacker games with quantal response attack strategies. Reliab. Eng. Syst. Saf. 2021, 205, 107165. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.