2019
DOI: 10.1111/risa.13257
|View full text |Cite
|
Sign up to set email alerts
|

A Study on a Sequential One‐Defender‐N‐Attacker Game

Abstract: Government usually faces threat from multiple attackers. However, in the literature, researchers often model attackers as one monolithic player who chooses whether to attack, how much investment to spend, and on which target, instead of treating multiple attackers as independent agents. This modeling strategy may potentially cause suboptimal defense investment if the attackers have vastly different interests and preferences and may not be combined as one in theory. In this article, we develop a sequential game… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 28 publications
(15 citation statements)
references
References 31 publications
0
15
0
Order By: Relevance
“…The application of game theory to analyze the strategic choices of a firm in EIS literature has gained attention in recent times (Wu et al , 2017; Qian et al , 2018; Miaoui and Boudriga, 2019; Xu and Zhuang, 2019; Feng et al , 2020; Li and Xu, 2020; Peng et al , 2020; Wu et al , 2020; Zhai et al , 2020). Laszka et al (2015) provide a detailed literature review of existing research on strategic games under a full-information setting.…”
Section: Literature Reviewmentioning
confidence: 99%
See 3 more Smart Citations
“…The application of game theory to analyze the strategic choices of a firm in EIS literature has gained attention in recent times (Wu et al , 2017; Qian et al , 2018; Miaoui and Boudriga, 2019; Xu and Zhuang, 2019; Feng et al , 2020; Li and Xu, 2020; Peng et al , 2020; Wu et al , 2020; Zhai et al , 2020). Laszka et al (2015) provide a detailed literature review of existing research on strategic games under a full-information setting.…”
Section: Literature Reviewmentioning
confidence: 99%
“…We observe that broadly two forms of probability functions are adopted in the extant game-theoretic EIS literature: BPF first proposed by Gordon and Loeb (2002), modified by Cavusoglu et al (2008) and used in a multitude of cybersecurity investment problems (Huang et al , 2008; Kim and Kim, 2016; Young et al , 2016; Ezhei and Ladani, 2017; Qian et al , 2017; Wu et al , 2017; Ezhei and Ladani, 2018; Qian et al , 2018; Miaoui and Boudriga, 2019; Dou et al , 2020; Feng et al , 2020; Gordon et al , 2020; Li and Xu, 2020; Wu et al , 2020). Contest success function (CSF) introduced in rent-seeking literature and widely applied by Hausken and associates (Hausken and Bier, 2011; Hausken and Zhuang, 2012; Hausken, 2017a; Hausken, 2017b; Hausken, 2017c; Hausken, 2019) and other scholars (Gao et al , 2014; Peng et al , 2016; Guan et al , 2017; Wu et al , 2018; Wu et al , 2019; Xu and Zhuang, 2019; Wu et al , 2020; Peng et al , 2020; Xiao et al , 2020; Zhai et al , 2020) for modeling defender-attacker problems. …”
Section: Literature Reviewmentioning
confidence: 99%
See 2 more Smart Citations
“…We consider a two‐period game where the defender moves first and distributes its resources among y selected elements. For simplicity, we do not consider repeated interactions (Shan & Zhuang, ) or multiple attackers (Xu & Zhuang, ). The defender only discloses the number of protected elements y , so the attacker does not know precisely which elements are protected.…”
Section: The Modelmentioning
confidence: 99%