2024
DOI: 10.1016/j.ejor.2023.04.009
|View full text |Cite
|
Sign up to set email alerts
|

A review of attacker-defender games: Current state and paths forward

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 24 publications
(4 citation statements)
references
References 152 publications
0
4
0
Order By: Relevance
“…No additional experiments were found that could be included in the reanalysis. This is not surprising given our restrictive inclusion criteria and because the attacker–defender contest is a recent advance in the behavioral game literature (De Dreu & Gross, 2019b) with most work being theoretical rather than experimental (for a review, see Hunt & Zhuang, 2023). In short, to our knowledge, all studies available for our research questions are included in the reanalyses (i.e., there is no file drawer).…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…No additional experiments were found that could be included in the reanalysis. This is not surprising given our restrictive inclusion criteria and because the attacker–defender contest is a recent advance in the behavioral game literature (De Dreu & Gross, 2019b) with most work being theoretical rather than experimental (for a review, see Hunt & Zhuang, 2023). In short, to our knowledge, all studies available for our research questions are included in the reanalyses (i.e., there is no file drawer).…”
Section: Methodsmentioning
confidence: 99%
“…COMPETITION AND CONFLICT Hunt & Zhuang, 2023). In short, to our knowledge, all studies available for our research questions are included in the reanalyses (i.e., there is no file drawer).…”
Section: Identifying Eligible Studies For Reanalysismentioning
confidence: 99%
See 1 more Smart Citation
“…Moreover, game theory has been used to solve the problem of resource-constrained resources and the security defense level. The survey in [24,25] summarized the methods that have been adopted to solve attacker-defender games and found that the current attacker-defender games that focus on technology adoption assume that the defender will deploy a single new technology at all target sites. The work discussed the future trends and research directions for applying game theory models in edge services and considering usage scenarios.…”
Section: Related Workmentioning
confidence: 99%