2021
DOI: 10.1080/10242694.2021.1875289
|View full text |Cite
|
Sign up to set email alerts
|

A Game-theoretic Analysis of Hybrid Threats

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 24 publications
0
4
0
Order By: Relevance
“…While game theoretic approaches have gained traction in the hybrid domain [18] and the cyber domain [19], and dynamic Bayesian Network modelling has been used for hybrid threat modelling [21], our work is the first that encodes the uncertainties specific to the hybrid domain as probabilistic relations. In addition, as most research on the costs, deterrence -and mitigation ability of counter-hybrid measures is scattered across different domains, we have posed a method to aggregate these different findings via probability distributions to account for the lack of consensus in the literature.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…While game theoretic approaches have gained traction in the hybrid domain [18] and the cyber domain [19], and dynamic Bayesian Network modelling has been used for hybrid threat modelling [21], our work is the first that encodes the uncertainties specific to the hybrid domain as probabilistic relations. In addition, as most research on the costs, deterrence -and mitigation ability of counter-hybrid measures is scattered across different domains, we have posed a method to aggregate these different findings via probability distributions to account for the lack of consensus in the literature.…”
Section: Discussionmentioning
confidence: 99%
“…The model considers the behaviour of two agents possessing the characteristics of sovereign states, following the two-agent approach of [18] and [19]. On one side, agent A aims to pursue its strategic objectives using hybrid attacks.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Information policy includes such issues as net neutrality, filtering, intellectual property, Digital technological developments and their growing interconnection with changes in social relations have allowed some states to challenge unfriendly countries using so-called "hybrid threats" -coordinated and synchronized actions, that specifically target the vulnerabilities of states and institutions through various online platforms (Dragos et al, 2020). This method of warfare entails the use of a wide range of well-designed tools that remain below the thresholds of detection, attribution and retaliation (Balcaen et al, 2022). Disinformation campaigns result in undermining vulnerable places of democracy, such as freedom of speech, and freedom of the media, exacerbating existing ethnic, religious, political or economic differences, which leads to decreased social cohesion (Wigell, 2019).…”
Section: Introductionmentioning
confidence: 99%
“…This approach has found many applications in cybersecurity [27]. In security management, it can model different conflicts, for example, modeling mixed threats and as a tool for warfare [28]. Another example is modeling the response to the disclosure of additional security measures, for example, with new technologies used in airport controls and the response to it by terrorists [29].…”
mentioning
confidence: 99%