{"id":"https://openalex.org/W2528481484","doi":"https://doi.org/10.1109/soscyps.2016.7579997","title":"Security games on infrastructure networks","display_name":"Security games on infrastructure networks","publication_year":2016,"publication_date":"2016-04-11","ids":{"openalex":"https://openalex.org/W2528481484","doi":"https://doi.org/10.1109/soscyps.2016.7579997","mag":"2528481484"},"language":"en","primary_location":{"id":"doi:10.1109/soscyps.2016.7579997","is_oa":false,"landing_page_url":"https://doi.org/10.1109/soscyps.2016.7579997","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 Science of Security for Cyber-Physical Systems Workshop (SOSCYPS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112133200","display_name":"Saurabh Amin","orcid":"https://orcid.org/0000-0003-1554-015X"},"institutions":[{"id":"https://openalex.org/I63966007","display_name":"Massachusetts Institute of Technology","ror":"https://ror.org/042nb2s44","country_code":"US","type":"education","lineage":["https://openalex.org/I63966007"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Saurabh Amin","raw_affiliation_strings":["Department of Civil and Environmental Engineering, Massachusetts Institute of Technology"],"affiliations":[{"raw_affiliation_string":"Department of Civil and Environmental Engineering, Massachusetts Institute of Technology","institution_ids":["https://openalex.org/I63966007"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5112133200"],"corresponding_institution_ids":["https://openalex.org/I63966007"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.14727629,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"43","issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11807","display_name":"Infrastructure Resilience and Vulnerability Analysis","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11807","display_name":"Infrastructure Resilience and Vulnerability Analysis","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9907000064849854,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7214046716690063},{"id":"https://openalex.org/keywords/interdiction","display_name":"Interdiction","score":0.7143484354019165},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.712904691696167},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6966722011566162},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5551264882087708},{"id":"https://openalex.org/keywords/critical-infrastructure","display_name":"Critical infrastructure","score":0.5489780902862549},{"id":"https://openalex.org/keywords/interdependence","display_name":"Interdependence","score":0.5106294751167297},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5032126307487488},{"id":"https://openalex.org/keywords/sequential-game","display_name":"Sequential game","score":0.4105268716812134},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.38541263341903687},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1370871365070343},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.11093190312385559}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7214046716690063},{"id":"https://openalex.org/C124119293","wikidata":"https://www.wikidata.org/wiki/Q6046081","display_name":"Interdiction","level":2,"score":0.7143484354019165},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.712904691696167},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6966722011566162},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5551264882087708},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.5489780902862549},{"id":"https://openalex.org/C185874996","wikidata":"https://www.wikidata.org/wiki/Q269699","display_name":"Interdependence","level":2,"score":0.5106294751167297},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5032126307487488},{"id":"https://openalex.org/C73795354","wikidata":"https://www.wikidata.org/wiki/Q287618","display_name":"Sequential game","level":3,"score":0.4105268716812134},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.38541263341903687},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1370871365070343},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.11093190312385559},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/soscyps.2016.7579997","is_oa":false,"landing_page_url":"https://doi.org/10.1109/soscyps.2016.7579997","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 Science of Security for Cyber-Physical Systems Workshop (SOSCYPS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.6200000047683716,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W1493661587","https://openalex.org/W1592657892","https://openalex.org/W1738845896","https://openalex.org/W1857269571","https://openalex.org/W1998077620","https://openalex.org/W1998960699","https://openalex.org/W2000050888","https://openalex.org/W2005924162","https://openalex.org/W2067064328","https://openalex.org/W2098716819","https://openalex.org/W2118130602","https://openalex.org/W2125815685","https://openalex.org/W2153561032","https://openalex.org/W2205386399","https://openalex.org/W2288333746","https://openalex.org/W2411924383","https://openalex.org/W3103720881","https://openalex.org/W4205311788","https://openalex.org/W4301478651","https://openalex.org/W6637741074","https://openalex.org/W6687761335","https://openalex.org/W6818546672"],"related_works":["https://openalex.org/W4230475103","https://openalex.org/W2897362009","https://openalex.org/W1459477531","https://openalex.org/W2135039713","https://openalex.org/W3199529363","https://openalex.org/W2411035334","https://openalex.org/W1972753128","https://openalex.org/W96808323","https://openalex.org/W2323817629","https://openalex.org/W2388524615"],"abstract_inverted_index":{"The":[0,16],"theory":[1,57],"of":[2,18,31,55,72,91,93,98,114,161,181],"robust":[3],"control":[4,163],"models":[5,71,111,122,169],"the":[6,29,53,66,120,175],"controller-disturbance":[7],"interaction":[8],"as":[9],"a":[10,19,179],"game":[11,56,69,128,147,160],"where":[12],"disturbance":[13],"is":[14,62],"nonstrategic.":[15],"proviso":[17],"deliberately":[20],"malicious":[21],"(strategic)":[22],"attacker":[23],"should":[24],"be":[25,171],"considered":[26],"to":[27,48,148,173],"increase":[28],"robustness":[30],"infrastructure":[32,115],"systems.":[33],"This":[34,101],"has":[35],"become":[36],"especially":[37],"important":[38],"since":[39],"many":[40],"IT":[41],"systems":[42,164],"supporting":[43],"critical":[44],"functionalities":[45],"are":[46,75,123],"vulnerable":[47],"exploits":[49],"by":[50],"attackers.":[51],"While":[52],"usefulness":[54],"methods":[58],"for":[59,77,112],"modeling":[60],"cyber-security":[61],"well":[63],"established":[64],"in":[65,89,108,178],"literature,":[67],"new":[68],"theoretic":[70],"cyber-physical":[73,182],"security":[74,113,127,159,183],"needed":[76],"deriving":[78],"useful":[79],"insights":[80,118],"on":[81,129,139],"\"optimal\"":[82],"attack":[83],"plans":[84],"and":[85,95,106,156],"defender":[86],"responses,":[87],"both":[88],"terms":[90],"allocation":[92],"resources":[94],"operational":[96],"strategies":[97],"these":[99],"players.":[100],"whitepaper":[102],"presents":[103],"some":[104],"progress":[105],"challenges":[107],"using":[109],"game-theoretic":[110],"networks.":[116],"Main":[117],"from":[119],"following":[121],"presented:":[124],"(i)":[125],"Network":[126],"flow":[130],"networks":[131,141],"under":[132,142,165],"strategic":[133],"edge":[134],"disruptions;":[135,144],"(ii)":[136],"Interdiction":[137],"problem":[138],"distribution":[140],"node":[143],"(iii)":[145],"Inspection":[146],"monitor":[149],"commercial":[150],"non-technical":[151],"losses":[152],"(e.g.":[153],"energy":[154],"diversion);":[155],"(iv)":[157],"Interdependent":[158],"networked":[162],"communication":[166],"failures.":[167],"These":[168],"can":[170],"used":[172],"analyze":[174],"attacker-defender":[176],"interactions":[177],"class":[180],"scenarios.":[184]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
