• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

攻防博弈综述:现状与未来发展路径

A review of attacker-defender games: Current state and paths forward.

作者信息

Hunt Kyle, Zhuang Jun

机构信息

Department of Management Science and Systems, University at Buffalo, United States.

Department of Industrial and Systems Engineering, University at Buffalo, United States.

出版信息

Eur J Oper Res. 2024 Mar;313(2):401-417. doi: 10.1016/j.ejor.2023.04.009.

DOI:10.1016/j.ejor.2023.04.009
PMID:40842825
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC12366505/
Abstract

In this article, we review the literature which proposes attacker-defender games to protect against strategic adversarial threats. More specifically, we follow the systematic literature review methodology to collect and review 127 journal articles that have been published over the past 15 years. We start by briefly discussing the common application areas that are addressed in the literature, although our focus in this review lies heavily in the approaches that have been adopted to model and solve attacker-defender games. In studying these approaches, we begin by analyzing the following features of the proposed game formulations: the sequence of moves, number of players, nature of decision variables and objective functions, and time horizons. We then analyze the common assumptions of perfect rationality, risk neutrality, and complete information that are enforced within the majority of the articles, and report on state-of-the-art research which has begun relaxing these assumptions. We find that relaxing these assumptions presents further challenges, such as enforcing new assumptions regarding how uncertainties are modeled, and issues with intractability when models are reformulated to account for considerations such as risk preferences. Finally, we examine the methods that have been adopted to solve attacker-defender games. We find that the majority of the articles obtain closed-form solutions to their models, while there are also many articles that developed novel solution algorithms and heuristics. Upon synthesizing and analyzing the literature, we expose open questions in the field, and present promising future research directions that can advance current knowledge.

摘要

在本文中,我们回顾了提出攻防博弈以防范战略对抗威胁的文献。更具体地说,我们遵循系统的文献综述方法,收集并回顾了过去15年发表的127篇期刊文章。我们首先简要讨论文献中涉及的常见应用领域,尽管在本综述中我们主要关注用于建模和解决攻防博弈的方法。在研究这些方法时,我们首先分析所提出的博弈公式的以下特征:行动顺序、参与者数量、决策变量和目标函数的性质以及时间范围。然后,我们分析大多数文章中所采用的完全理性、风险中性和完全信息的常见假设,并报告已开始放宽这些假设的前沿研究。我们发现放宽这些假设带来了进一步的挑战,例如在对不确定性进行建模时需要强化新的假设,以及在重新构建模型以考虑风险偏好等因素时出现的难处理问题。最后,我们研究了用于解决攻防博弈的方法。我们发现大多数文章都为其模型获得了闭式解,同时也有许多文章开发了新颖的求解算法和启发式方法。在综合和分析文献后,我们揭示了该领域的开放性问题,并提出了可以推动当前知识发展的有前景的未来研究方向。

相似文献

1
A review of attacker-defender games: Current state and paths forward.攻防博弈综述:现状与未来发展路径
Eur J Oper Res. 2024 Mar;313(2):401-417. doi: 10.1016/j.ejor.2023.04.009.
2
Prescription of Controlled Substances: Benefits and Risks管制药品的处方:益处与风险
3
Short-Term Memory Impairment短期记忆障碍
4
The Lived Experience of Autistic Adults in Employment: A Systematic Search and Synthesis.成年自闭症患者的就业生活经历:系统检索与综述
Autism Adulthood. 2024 Dec 2;6(4):495-509. doi: 10.1089/aut.2022.0114. eCollection 2024 Dec.
5
Behavioral interventions to reduce risk for sexual transmission of HIV among men who have sex with men.降低男男性行为者中艾滋病毒性传播风险的行为干预措施。
Cochrane Database Syst Rev. 2008 Jul 16(3):CD001230. doi: 10.1002/14651858.CD001230.pub2.
6
How lived experiences of illness trajectories, burdens of treatment, and social inequalities shape service user and caregiver participation in health and social care: a theory-informed qualitative evidence synthesis.疾病轨迹的生活经历、治疗负担和社会不平等如何影响服务使用者和照顾者参与健康和社会护理:一项基于理论的定性证据综合分析
Health Soc Care Deliv Res. 2025 Jun;13(24):1-120. doi: 10.3310/HGTQ8159.
7
Healthcare workers' informal uses of mobile phones and other mobile devices to support their work: a qualitative evidence synthesis.医护人员非正规使用手机和其他移动设备来支持工作:定性证据综合评价。
Cochrane Database Syst Rev. 2024 Aug 27;8(8):CD015705. doi: 10.1002/14651858.CD015705.pub2.
8
Thromboprophylaxis during pregnancy and the puerperium: a systematic review and economic evaluation to estimate the value of future research.妊娠期和产褥期的血栓预防:一项系统评价和经济评估,以估算未来研究的价值。
Health Technol Assess. 2024 Mar;28(9):1-176. doi: 10.3310/DFWT3873.
9
Fabricating mice and dementia: opening up relations in multi-species research制造小鼠与痴呆症:开启多物种研究中的关联
10
The quantity, quality and findings of network meta-analyses evaluating the effectiveness of GLP-1 RAs for weight loss: a scoping review.评估胰高血糖素样肽-1受体激动剂(GLP-1 RAs)减肥效果的网状Meta分析的数量、质量及结果:一项范围综述
Health Technol Assess. 2025 Jun 25:1-73. doi: 10.3310/SKHT8119.

本文引用的文献

1
Deterrence against Terrorist Attacks in Sports-Mega Events: A Method to Identify the Optimal Portfolio of Defensive Countermeasures.体育大型赛事中的恐怖袭击防范:识别最佳防御性对策组合的方法。
Risk Anal. 2022 Mar;42(3):522-543. doi: 10.1111/risa.13794. Epub 2021 Jul 16.
2
An Attacker-defender Resource Allocation Game with Substitution and Complementary Effects.具有替代和互补效应的攻击者-防御者资源分配博弈
Risk Anal. 2020 Jul;40(7):1481-1506. doi: 10.1111/risa.13483. Epub 2020 May 19.
3
Defender-Attacker Games with Asymmetric Player Utilities.
具有非对称玩家效用的防御-攻击博弈。
Risk Anal. 2020 Feb;40(2):408-420. doi: 10.1111/risa.13399. Epub 2019 Sep 17.
4
A Study on a Sequential One-Defender-N-Attacker Game.关于一种连续的一防御者对N攻击者博弈的研究。
Risk Anal. 2019 Jun;39(6):1414-1432. doi: 10.1111/risa.13257. Epub 2019 Jan 2.
5
Modeling Precheck Parallel Screening Process in the Face of Strategic Applicants with Incomplete Information and Screening Errors.面对存在信息不完整和筛选错误的策略性申请人,对预检查并行筛选过程进行建模。
Risk Anal. 2018 Jan;38(1):118-133. doi: 10.1111/risa.12822. Epub 2017 May 29.
6
Deterrence and Risk Preferences in Sequential Attacker-Defender Games with Continuous Efforts.连续努力的序贯攻防博弈中的威慑与风险偏好
Risk Anal. 2017 Nov;37(11):2229-2245. doi: 10.1111/risa.12768. Epub 2017 Mar 17.
7
A Game-Theoretical Model to Improve Process Plant Protection from Terrorist Attacks.一种改进工厂过程保护以抵御恐怖袭击的博弈论模型。
Risk Anal. 2016 Dec;36(12):2285-2297. doi: 10.1111/risa.12569. Epub 2016 Feb 17.
8
Modeling Resources Allocation in Attacker-Defender Games with "Warm Up" CSF.基于“热身”脑脊液的攻防博弈中的建模资源分配
Risk Anal. 2016 Apr;36(4):776-91. doi: 10.1111/risa.12502. Epub 2015 Dec 29.
9
Modeling Opponents in Adversarial Risk Analysis.对抗风险分析中的对手建模
Risk Anal. 2016 Apr;36(4):742-55. doi: 10.1111/risa.12439. Epub 2015 Jul 2.
10
On the Effectiveness of Security Countermeasures for Critical Infrastructures.论关键基础设施安全对策的有效性
Risk Anal. 2016 Apr;36(4):711-26. doi: 10.1111/risa.12318. Epub 2014 Dec 9.