Article ID: | iaor2014151 |
Volume: | 57 |
Issue: | 1 |
Start Page Number: | 71 |
End Page Number: | 104 |
Publication Date: | Jan 2014 |
Journal: | Computational Optimization and Applications |
Authors: | Cole Smith J, Hemmati Mehdi, Thai My |
Keywords: | military & defence, security |
We consider a two‐stage defender‐attacker game that takes place on a network, in which the attacker seeks to take control over (or ‘influence’) as many nodes as possible. The defender acts first in this game by protecting a subset of nodes that cannot be influenced by the attacker. With full knowledge of the defender’s action, the attacker can then influence an initial subset of unprotected nodes. The influence then spreads over a finite number of time stages, where an uninfluenced node becomes influenced at time