Deception in multi-attacker security game with nonfuzzy and fuzzy payoffs

سال انتشار: 1401
نوع سند: مقاله ژورنالی
زبان: انگلیسی
مشاهده: 136

فایل این مقاله در 25 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

JR_IJNAO-12-23_004

تاریخ نمایه سازی: 17 آبان 1401

چکیده مقاله:

There is significant interest in studying security games for defense op-timization and reducing the effects of attacks on various security systems involving vital infrastructures, financial systems, security, and urban safe-guarding centers. Game theory can be used as a mathematical tool to maximize the efficiency of limited security resources. In a game, players are smart, and it is natural for each player (defender or attacker) to try to deceive the opponent using various strategies in order to increase his payoff. Defenders can use deception as an effective means of enhancing security protection by giving incorrect information, hiding specific security resources, or using fake resources. However, despite the importance of de-ception in security issues, there is no considerable research on this field, and most of the works focus on deception in cyber environments. In this paper, a mixed-integer linear programming problem is proposed to allocate forces efficiently in a security game with multiple attackers using game the-ory analysis. The important subjects of information are their credibility and reliability. Especially when the defender uses deceptive defense forces, there are more ambiguity and uncertainty. Security game with Z-number payoffs is considered to apply both ambiguities in the payoffs and the reli-ability of earning these payoffs. Finally, the proposed method is illustrated by some numerical examples.

نویسندگان

Samaneh Esmaeeli

Department of Mathematics, University of Birjand, Birjand, I.R. of Iran.

Hassan Hassanpour

Department of Mathematics, University of Birjand, Birjand, I.R. of Iran.

H. Bigdeli

Researcher, Institute for the Study of War, Command and Staff University, Tehran, I.R. of Iran army.

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • Basilico, N., Gatti, N., and Amigoni, F. Leader-follower strategies for ...
  • Bigdeli, H., Hassanpour, H. and Tayyebi, J. Multiobjective security game ...
  • Hamilton, D.L. Deception in Soviet military doctrine and operations, NAVAL ...
  • Sakawa, M. and Nishizaki, I. Cooperative and noncooperative multi-level programming, ...
  • نمایش کامل مراجع