2015
DOI: 10.1016/j.ejor.2015.04.043
|View full text |Cite
|
Sign up to set email alerts
|

On the value of exposure and secrecy of defense system: First-mover advantage vs. robustness

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
21
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
7
1

Relationship

3
5

Authors

Journals

citations
Cited by 42 publications
(24 citation statements)
references
References 50 publications
2
21
0
Order By: Relevance
“…with one defender and N attackers. The defender is assumed to act first, specifying the defense effort d to leverage the first‐mover advantage suggested by Nikoofal and Zhuang () and Zhuang and Bier (), though Nikoofal and Zhuang () point out that disclosure of the defense information may not always be beneficial to the defender. Then, all the attackers move simultaneously based on d .…”
Section: Multiple Attackers Modelmentioning
confidence: 99%
“…with one defender and N attackers. The defender is assumed to act first, specifying the defense effort d to leverage the first‐mover advantage suggested by Nikoofal and Zhuang () and Zhuang and Bier (), though Nikoofal and Zhuang () point out that disclosure of the defense information may not always be beneficial to the defender. Then, all the attackers move simultaneously based on d .…”
Section: Multiple Attackers Modelmentioning
confidence: 99%
“…Analogous, participation cost‐related factors were investigated by Tosh et al Ghose and Hausken modeled relationships between attackers carrying out an attack against an enterprise to investigate the incentives for and the optimal level of sharing the information about the company's vulnerabilities. Nikoofal and Zhuang, Zhuang et al, Zhuang and Bier, and Dighe et al applied game theory to determine the role of sharing cybersecurity information in cyberdefense strategies. Another approach was adopted by Sedenberg and Mulligan who analyzed public health care as a model that enabled identifying guiding principles for cybersecurity IS.…”
Section: Related Workmentioning
confidence: 99%
“…(2010), and Dighe et al . (2009) apply game theory to model strategies of the defender's secrecy and deception strategies in attacker–defender games with incomplete information . The strategic interactions among stakeholders are rather essential in the practice.…”
Section: Current Information Sharing Architecturesmentioning
confidence: 99%