{"id":"https://openalex.org/W2049898172","doi":"https://doi.org/10.1108/03684921011043279","title":"The impacts of adaptive attacking and defending strategies on mitigation of intentional threats","display_name":"The impacts of adaptive attacking and defending strategies on mitigation of intentional threats","publication_year":2010,"publication_date":"2010-06-15","ids":{"openalex":"https://openalex.org/W2049898172","doi":"https://doi.org/10.1108/03684921011043279","mag":"2049898172"},"language":"en","primary_location":{"id":"doi:10.1108/03684921011043279","is_oa":false,"landing_page_url":"https://doi.org/10.1108/03684921011043279","pdf_url":null,"source":{"id":"https://openalex.org/S168682784","display_name":"Kybernetes","issn_l":"0368-492X","issn":["0368-492X","1758-7883"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Kybernetes","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100345321","display_name":"Jing Zhang","orcid":"https://orcid.org/0000-0001-6595-7661"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jing Zhang","raw_affiliation_strings":["Department of Engineering Physics, Tsinghua University, Beijing, People's Republic of China","Department of Engineering Physics, Tsinghua University, Beijing, People\u2019s Republic of China"],"affiliations":[{"raw_affiliation_string":"Department of Engineering Physics, Tsinghua University, Beijing, People's Republic of China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"Department of Engineering Physics, Tsinghua University, Beijing, People\u2019s Republic of China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113193736","display_name":"Shifei Shen","orcid":null},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shifei Shen","raw_affiliation_strings":["Department of Engineering Physics, Tsinghua University, Beijing, People's Republic of China","Department of Engineering Physics, Tsinghua University, Beijing, People\u2019s Republic of China"],"affiliations":[{"raw_affiliation_string":"Department of Engineering Physics, Tsinghua University, Beijing, People's Republic of China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"Department of Engineering Physics, Tsinghua University, Beijing, People\u2019s Republic of China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017503364","display_name":"Rui Yang","orcid":"https://orcid.org/0000-0001-5695-3773"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Rui Yang","raw_affiliation_strings":["Department of Engineering Physics, Tsinghua University, Beijing, People's Republic of China","Department of Engineering Physics, Tsinghua University, Beijing, People\u2019s Republic of China"],"affiliations":[{"raw_affiliation_string":"Department of Engineering Physics, Tsinghua University, Beijing, People's Republic of China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"Department of Engineering Physics, Tsinghua University, Beijing, People\u2019s Republic of China","institution_ids":["https://openalex.org/I99065089"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100345321"],"corresponding_institution_ids":["https://openalex.org/I99065089"],"apc_list":null,"apc_paid":null,"fwci":0.8669,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.78427214,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"39","issue":"5","first_page":"825","last_page":"837"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11807","display_name":"Infrastructure Resilience and Vulnerability Analysis","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11807","display_name":"Infrastructure Resilience and Vulnerability Analysis","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13371","display_name":"Military Defense Systems Analysis","score":0.9742000102996826,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12825","display_name":"Defense, Military, and Policy Studies","score":0.9233999848365784,"subfield":{"id":"https://openalex.org/subfields/2002","display_name":"Economics and Econometrics"},"field":{"id":"https://openalex.org/fields/20","display_name":"Economics, Econometrics and Finance"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6802753210067749},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.6535638570785522},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6098078489303589},{"id":"https://openalex.org/keywords/adaptive-strategies","display_name":"Adaptive strategies","score":0.5672323107719421},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5365856289863586},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.5018572807312012},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4173148572444916},{"id":"https://openalex.org/keywords/asynchronous-communication","display_name":"Asynchronous communication","score":0.41104209423065186},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3493436872959137},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.32740092277526855},{"id":"https://openalex.org/keywords/operations-research","display_name":"Operations research","score":0.32350990176200867},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.0974402129650116}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6802753210067749},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.6535638570785522},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6098078489303589},{"id":"https://openalex.org/C167393769","wikidata":"https://www.wikidata.org/wiki/Q4680768","display_name":"Adaptive strategies","level":2,"score":0.5672323107719421},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5365856289863586},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.5018572807312012},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4173148572444916},{"id":"https://openalex.org/C151319957","wikidata":"https://www.wikidata.org/wiki/Q752739","display_name":"Asynchronous communication","level":2,"score":0.41104209423065186},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3493436872959137},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.32740092277526855},{"id":"https://openalex.org/C42475967","wikidata":"https://www.wikidata.org/wiki/Q194292","display_name":"Operations research","level":1,"score":0.32350990176200867},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0974402129650116},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.0},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/03684921011043279","is_oa":false,"landing_page_url":"https://doi.org/10.1108/03684921011043279","pdf_url":null,"source":{"id":"https://openalex.org/S168682784","display_name":"Kybernetes","issn_l":"0368-492X","issn":["0368-492X","1758-7883"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Kybernetes","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7099999785423279,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W125969323","https://openalex.org/W1555329134","https://openalex.org/W1963693045","https://openalex.org/W1968274760","https://openalex.org/W2001679520","https://openalex.org/W2016834768","https://openalex.org/W2023143558","https://openalex.org/W2037335935","https://openalex.org/W2042562662","https://openalex.org/W2068491626","https://openalex.org/W2070924607","https://openalex.org/W2078414810","https://openalex.org/W2089974433","https://openalex.org/W2106895989","https://openalex.org/W2144846366","https://openalex.org/W2147543731","https://openalex.org/W2148534455","https://openalex.org/W2151056235","https://openalex.org/W2161055501","https://openalex.org/W2162048614","https://openalex.org/W2575731723","https://openalex.org/W6641127035","https://openalex.org/W6654392308","https://openalex.org/W6659799221","https://openalex.org/W6667714193","https://openalex.org/W6732044407","https://openalex.org/W6824963819"],"related_works":["https://openalex.org/W4388150944","https://openalex.org/W2116677773","https://openalex.org/W2155261584","https://openalex.org/W2584231425","https://openalex.org/W4242235492","https://openalex.org/W2150611273","https://openalex.org/W4237162029","https://openalex.org/W2367268135","https://openalex.org/W4207086172","https://openalex.org/W2042919702"],"abstract_inverted_index":{"Purpose":[0],"The":[1,23,122,186],"purpose":[2],"of":[3,90,112,145,154,169,198,217],"this":[4],"paper":[5,178],"is":[6,70,148,156,189],"to":[7,52,62,82,157,171],"focus":[8],"on":[9,42],"resource":[10],"allocation":[11,191],"and":[12,33,36,47,77,87,114,166,192,202,213],"information":[13,193],"disclosure":[14,194],"policy":[15,195],"for":[16,72,196],"defending":[17,48,138,159],"multiple":[18],"targets":[19,113],"against":[20],"intentional":[21,24,127,199],"attacks.":[22],"attacks,":[25],"like":[26],"terrorism":[27],"events,":[28],"probably":[29,140],"cause":[30],"great":[31],"losses":[32],"fatalities.":[34],"Attackers":[35,76,201],"defenders":[37,78,155,203],"usually":[38],"make":[39,57],"decisions":[40,60],"based":[41],"incomplete":[43],"information.":[44,92],"Adaptive":[45,93],"attacking":[46],"strategies":[49,94,100,160,182,207],"are":[50,79,95],"considered,":[51],"study":[53],"how":[54,180],"both":[55,81,218],"sides":[56,219],"more":[58],"effective":[59],"according":[61],"previous":[63,164,211],"fights.":[64],"Design/methodology/approach":[65],"A":[66],"stochastic":[67],"game\u2010theoretic":[68],"approach":[69],"proposed":[71],"modeling":[73],"attacker\u2010defender":[74,184],"conflicts.":[75,185],"supposed":[80],"be":[83,130,221],"strategic":[84,215],"decision":[85],"makers":[86],"partially":[88],"aware":[89],"adversary's":[91],"compared":[96],"with":[97],"different":[98],"inflexible":[99,137],"in":[101],"a":[102],"fortification\u2010patrol":[103],"problem,":[104],"where":[105],"the":[106,109,115,118,126,151,173,214],"fortification":[107],"affects":[108],"security":[110],"vulnerability":[111],"patrol":[116],"indicates":[117],"defensive":[119],"signal.":[120],"Findings":[121],"result":[123],"shows":[124],"that":[125,150],"risk":[128],"would":[129],"elevated":[131],"by":[132,161,208],"adaptive":[133,181],"attack":[134],"strategies.":[135],"An":[136],"strategy":[139],"fails":[141],"when":[142],"facing":[143],"uncertainties":[144],"adversary.":[146],"It":[147],"shown":[149],"optimal":[152],"response":[153],"adjust":[158,205],"learning":[162,209],"from":[163,210],"games":[165],"assessing":[167],"behaviors":[168],"adversaries":[170],"minimize":[172],"expected":[174],"loss.":[175],"Originality/value":[176],"This":[177],"explores":[179],"affect":[183],"key":[187],"issue":[188],"defense":[190],"mitigation":[197],"threats.":[200],"can":[204],"their":[206],"fights,":[212],"adjustment":[216],"may":[220],"asynchronous.":[222]},"counts_by_year":[{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
