Strategic games on defense trees

S Bistarelli, M Dall'Aglio, P Peretti - Formal Aspects in Security and Trust …, 2007 - Springer
… To model the defense tree as a strategic game we consider the set of strategies for the
defender as composed by single countermeasures as represented in Figure 6. In a similar …

Optimizing security strategies: A game theoretic approach to attack defense trees

A Khan - 2024 - essay.utwente.nl
… to model an attack defense tree as a game and use game theoretic principles to calculate
optimal costs for the attacker and the defender. Utilizing strategic games on ADTs is not a new …

Strategic attack & defense in security diffusion games

M Waniek, TP Michalak, A Alshamsi - ACM Transactions on Intelligent …, 2019 - dl.acm.org
… However, for some simpler network structures, such as cliques, stars, and trees, we show that
… centrality-based defense is often effective when spread of attack is strategic, particularly for …

Attack–defense trees

B Kordy, S Mauw, S Radomirović… - Journal of Logic and …, 2014 - academic.oup.com
… (1) We develop an extension of attack trees with defense nodes. The new formalism is called
… We employ a standard proof strategy by transforming the equations into a rewriting system …

[HTML][HTML] Technology trees: Freedom and determinism in historical strategy games

T Ghys - Game Studies, 2012 - gamestudies.org
… in the overall game design. This article covers the question of how the tech tree determines
the possibilities for representing the history of technology in historical strategy games, using …

Defense trees for economic evaluation of security investments

S Bistarelli, F Fioravanti, P Peretti - … International Conference on …, 2006 - ieeexplore.ieee.org
… Each path from leaf nodes to the root ending in an achieved subgoal represents a different
attack strategy in the considered scenario. Below we provide examples of how attack …

Attack-Defense Trees with Offensive and Defensive Attributes

DV Copae - 2024 - essay.utwente.nl
… a numerical value, we analyze which vector pairs form a strategy in the next section. … This
chapter explores attack-defense trees with a tree structure and a fast bottom-up approach to …

Attack–defense trees and two-player binary zero-sum extensive form games are equivalent

B Kordy, S Mauw, M Melissen, P Schweitzer - … Game Theory for Security …, 2010 - Springer
… First we show that the player who wins the game is also the player for whom the … to their
strategy in the game. Then we show that if a player has a strategy in a game which guarantees …

Attacker-Manager Game Tree (AMGT): a new framework for visualizing and analysing the interactions between attacker and network security manager

A Arghavani, M Arghavani, M Ahmadi, P Crane - Computer Networks, 2018 - Elsevier
… In [22], the attack scenarios extracted from defence tree is analysed as a strategic game
where the players are attacker and manager which have opposite goals. Moreover, the …

Self-play Decision-making Method of Deep Reinforcement Learning Guided by Behavior Tree under Complex Environment

X Xiong, S Wang, B Wang - 2024 43rd Chinese Control …, 2024 - ieeexplore.ieee.org
… Subsequently, it traverses the behavior tree structure in a top-down and leftto-right manner.
(1) … This strategy, by employing behavior tree technology to decouple maneuvering and firing …