• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

资源在多次攻击中的分配,其中攻击结果的检测不完美。

Resource distribution in multiple attacks with imperfect detection of the attack outcome.

机构信息

Collaborative Autonomic Computing Laboratory, School of Computer Science, University of Electronic Science and Technology of China, Chengdu, China.

出版信息

Risk Anal. 2012 Feb;32(2):304-18. doi: 10.1111/j.1539-6924.2011.01657.x. Epub 2011 Jul 30.

DOI:10.1111/j.1539-6924.2011.01657.x
PMID:21801189
Abstract

This article extends the previous research of consecutive attacks strategy by assuming that an attacker observes the outcome of each attack imperfectly. With given probabilities it may wrongly identify a destroyed target as undestroyed, and wrongly identify an undestroyed target as destroyed. The outcome of each attack is determined by a contest success function that depends on the amount of resources allocated by the defender and the attacker to each attack. The article suggests a probabilistic model of the multiple attacks and analyzes how the target destruction probability and the attacker's relative resource expenditure are impacted by the two probabilities of incorrect observation, the attacker's and defender's resource ratio, the contest intensity, the number of attacks, and the resource distribution across attacks. We analyze how the attacker chooses the number of attacks, the attack stopping rule, and the optimal resource distribution across attacks to maximize its utility.

摘要

本文通过假设攻击者对每次攻击的结果观察不完全,对连续攻击策略的先前研究进行了扩展。攻击者可能会错误地将已被摧毁的目标识别为未被摧毁,或者错误地将未被摧毁的目标识别为已被摧毁。每次攻击的结果由一个竞赛成功函数决定,该函数取决于防御者和攻击者在每次攻击中分配的资源量。本文提出了一个多攻击的概率模型,并分析了不正确观察的两个概率、攻击者和防御者的资源比例、竞赛强度、攻击次数以及攻击之间的资源分配如何影响目标破坏概率和攻击者的相对资源支出。我们分析了攻击者如何选择攻击次数、攻击停止规则和最优的攻击之间的资源分配,以最大化其效用。

相似文献

1
Resource distribution in multiple attacks with imperfect detection of the attack outcome.资源在多次攻击中的分配,其中攻击结果的检测不完美。
Risk Anal. 2012 Feb;32(2):304-18. doi: 10.1111/j.1539-6924.2011.01657.x. Epub 2011 Jul 30.
2
Resource distribution in multiple attacks against a single target.对单个目标的多次攻击中的资源分配。
Risk Anal. 2010 Aug;30(8):1231-9. doi: 10.1111/j.1539-6924.2010.01410.x. Epub 2010 Apr 20.
3
Choosing what to protect.选择要保护的内容。
Risk Anal. 2007 Jun;27(3):607-20. doi: 10.1111/j.1539-6924.2007.00906.x.
4
Defender-Attacker Games with Asymmetric Player Utilities.具有非对称玩家效用的防御-攻击博弈。
Risk Anal. 2020 Feb;40(2):408-420. doi: 10.1111/risa.13399. Epub 2019 Sep 17.
5
Robust allocation of a defensive budget considering an attacker's private information.考虑攻击者私人信息的防御性预算的稳健分配。
Risk Anal. 2012 May;32(5):930-43. doi: 10.1111/j.1539-6924.2011.01702.x. Epub 2011 Nov 2.
6
Defense resource distribution between protection and redundancy for constant resource stockpiling pace.在恒定的资源储备速度下,在保护和冗余之间分配防御资源。
Risk Anal. 2011 Oct;31(10):1632-45. doi: 10.1111/j.1539-6924.2011.01593.x. Epub 2011 Mar 9.
7
Efficiency of even separation of parallel elements with variable contest intensity.具有可变竞争强度的平行元素均匀分离效率。
Risk Anal. 2008 Oct;28(5):1477-86. doi: 10.1111/j.1539-6924.2008.01090.x. Epub 2008 Jul 9.
8
Modeling Resources Allocation in Attacker-Defender Games with "Warm Up" CSF.基于“热身”脑脊液的攻防博弈中的建模资源分配
Risk Anal. 2016 Apr;36(4):776-91. doi: 10.1111/risa.12502. Epub 2015 Dec 29.
9
Defender-Attacker Decision Tree Analysis to Combat Terrorism.防御方-攻击方决策树分析在反恐中的应用。
Risk Anal. 2016 Dec;36(12):2258-2271. doi: 10.1111/risa.12574. Epub 2016 Apr 1.
10
Modeling Adversaries in Counterterrorism Decisions Using Prospect Theory.运用前景理论对反恐决策中的对手进行建模。
Risk Anal. 2016 Apr;36(4):681-93. doi: 10.1111/risa.12254. Epub 2014 Jul 14.