{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T04:59:44Z","timestamp":1772600384563,"version":"3.50.1"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"1-2","license":[{"start":{"date-parts":[[2019,9,21]],"date-time":"2019-09-21T00:00:00Z","timestamp":1569024000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,9,21]],"date-time":"2019-09-21T00:00:00Z","timestamp":1569024000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ann Oper Res"],"published-print":{"date-parts":[[2020,11]]},"DOI":"10.1007\/s10479-019-03381-1","type":"journal-article","created":{"date-parts":[[2019,9,21]],"date-time":"2019-09-21T04:05:56Z","timestamp":1569038756000},"page":"741-767","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Discrete game-theoretic analysis of defense in correlated cyber-physical systems"],"prefix":"10.1007","volume":"294","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9092-1548","authenticated-orcid":false,"given":"Fei","family":"He","sequence":"first","affiliation":[]},{"given":"Jun","family":"Zhuang","sequence":"additional","affiliation":[]},{"given":"Nageswara S. V.","family":"Rao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,21]]},"reference":[{"key":"3381_CR1","doi-asserted-by":"crossref","unstructured":"Amin, S.\u00a0M. (2010). Electricity infrastructure security: Toward reliable, resilient and secure cyber-physical power and energy systems. In Proceedings of the power and energy society general meeting, IEEE. Minneapolis, MN.","DOI":"10.1109\/PES.2010.5589488"},{"issue":"6","key":"3381_CR2","doi-asserted-by":"publisher","first-page":"530","DOI":"10.1287\/inte.1060.0252","volume":"36","author":"G Brown","year":"2006","unstructured":"Brown, G., Carlyle, M., Salmeron, J., & Wood, K. (2006). Defending critical infrastructure. Interfaces, 36(6), 530\u2013544.","journal-title":"Interfaces"},{"key":"3381_CR3","doi-asserted-by":"crossref","unstructured":"Carreras, B.\u00a0A., Newman, D.\u00a0E., Gradney, P., Lynch, V.\u00a0E., & Dobson, I. (2007). Interdependent risk in interacting infrastructure systems. In 40th Annual Hawaii international conference on system sciences, 2007. HICSS 2007 (pp. 112\u2013112). IEEE.","DOI":"10.1109\/HICSS.2007.285"},{"key":"3381_CR4","unstructured":"Chertoff, M. (2009). National infrastructure protection plan. Department of Homeland Security (DHS), Washington, DC."},{"key":"3381_CR5","doi-asserted-by":"publisher","unstructured":"Colbert, E. J., Kott, A., & Knachel, L. P. (2018). The game-theoretic model and experimental investigation of cyber wargaming. The Journal of Defense Modeling and Simulation. https:\/\/doi.org\/10.1177\/1548512918795061.","DOI":"10.1177\/1548512918795061"},{"key":"3381_CR6","doi-asserted-by":"crossref","unstructured":"Depoy, J., Phelan, J., Sholander, P., Smith, B., Varnado, G. B., & Wyss, G. (2005). Risk assessment for physical and cyber attacks on critical infrastructures. In Military communications conference, 2005. IEEE (pp. 1961\u20131969). IEEE.","DOI":"10.1109\/MILCOM.2005.1605959"},{"issue":"1","key":"3381_CR7","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1016\/j.ejor.2007.09.001","volume":"192","author":"B Golany","year":"2009","unstructured":"Golany, B., Kaplan, E. H., Marmur, A., & Rothblum, U. G. (2009). Nature plays with dice-terrorists do not: Allocating resources to counter strategic versus probabilistic risks. European Journal of Operational Research, 192(1), 198\u2013208.","journal-title":"European Journal of Operational Research"},{"key":"3381_CR8","unstructured":"Govindarasu, M., Hann, A., & Sauer, P. (2012). Cyber-physical systems security for smart grid. Future Grid Initiative White Paper, PSERC, Feb."},{"issue":"1","key":"3381_CR9","doi-asserted-by":"publisher","first-page":"87","DOI":"10.3390\/en10010087","volume":"10","author":"J Guo","year":"2017","unstructured":"Guo, J., Han, Y., Guo, C., Lou, F., & Wang, Y. (2017). Modeling and vulnerability analysis of cyber-physical power systems considering network topology and power flow properties. Energies, 10(1), 87.","journal-title":"Energies"},{"issue":"1","key":"3381_CR10","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1287\/deca.1100.0194","volume":"8","author":"K Hausken","year":"2011","unstructured":"Hausken, K., & Zhuang, J. (2011). Governments\u2019 and terrorists\u2019 defense and attack in a t-period game. Decision Analysis, 8(1), 46\u201370.","journal-title":"Decision Analysis"},{"key":"3381_CR11","doi-asserted-by":"crossref","unstructured":"He, F., Agwuegbo, C.\u00a0J., Rao, N., & Ma, C.\u00a0Y.\u00a0T. (2018). A sequential game of defense and attack on an interdependent system of systems. In The 21st international conference on information fusion. Cambridge, UK.","DOI":"10.23919\/ICIF.2018.8455314"},{"issue":"6","key":"3381_CR12","doi-asserted-by":"publisher","first-page":"790","DOI":"10.1057\/jors.2011.49","volume":"63","author":"F He","year":"2012","unstructured":"He, F., & Zhuang, J. (2012). Modelling \u2018contracts\u2019 between a terrorist group and a government in a sequential game. Journal of the Operational Research Society, 63(6), 790\u2013809.","journal-title":"Journal of the Operational Research Society"},{"key":"3381_CR13","unstructured":"He, F., Zhuang, J., Rao, N. (2012). Game-theoretic analysis of attack and defense in cyber-physical network infrastructures. In Industrial and systems engineering research conference. Orlando, FL."},{"key":"3381_CR14","doi-asserted-by":"crossref","unstructured":"He, F., Zhuang, J., Rao, N.\u00a0S.\u00a0V., Ma, C.\u00a0Y.\u00a0T., & Yau, D.\u00a0K.\u00a0Y. (2013). Game-theoretic resilience analysis of cyber-physical systems. In The first IEEE international conference on cyber-physical systems, networks, and applications. Taipei, Taiwan.","DOI":"10.1109\/CPSNA.2013.6614252"},{"issue":"8","key":"3381_CR15","doi-asserted-by":"publisher","first-page":"2340","DOI":"10.1109\/TPDS.2014.2342740","volume":"26","author":"Z Huang","year":"2015","unstructured":"Huang, Z., Wang, C., Nayak, A., & Stojmenovic, I. (2015). Small cluster in cyber physical systems: Network topology, interdependence and cascading failures. IEEE Transactions on Parallel and Distributed Systems, 26(8), 2340\u20132351.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"3381_CR16","unstructured":"LaRocca, S., & Guikema, S. (2011). A survey of network theoretic approaches for risk analysis of complex infrastructure systems. In Vulnerability, uncertainty, and risk: Analysis, modeling, and management proceedings of the international conference on vulnerability and risk analysis and management (ICVRAM) and International symposium on uncertainty modeling and analysis (ISUMA). Hyattsville, MD."},{"issue":"2","key":"3381_CR17","doi-asserted-by":"publisher","first-page":"588","DOI":"10.1016\/j.ress.2008.06.006","volume":"94","author":"G Levitin","year":"2009","unstructured":"Levitin, G., & Hausken, K. (2009). False targets vs. redundancy in homogeneous parallel systems. Reliability Engineering & System Safety, 94(2), 588\u2013595.","journal-title":"Reliability Engineering & System Safety"},{"key":"3381_CR18","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.ijcip.2016.11.002","volume":"16","author":"X Liu","year":"2017","unstructured":"Liu, X., Zhang, J., & Zhu, P. (2017). Modeling cyber-physical attacks based on probabilistic colored petri nets and mixed-strategy game theory. International Journal of Critical Infrastructure Protection, 16, 13\u201325.","journal-title":"International Journal of Critical Infrastructure Protection"},{"issue":"3","key":"3381_CR19","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1145\/2480741.2480742","volume":"45","author":"MH Manshaei","year":"2013","unstructured":"Manshaei, M. H., Zhu, Q., Alpcan, T., Bac\u015far, T., & Hubaux, J.-P. (2013). Game theory meets network security and privacy. ACM Computing Surveys (CSUR), 45(3), 25.","journal-title":"ACM Computing Surveys (CSUR)"},{"issue":"1","key":"3381_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2200\/S00330ED1V01Y201101CNT009","volume":"4","author":"I Menache","year":"2011","unstructured":"Menache, I., & Ozdaglar, A. (2011). Network games: Theory, models, and dynamics. Synthesis Lectures on Communication Networks, 4(1), 1\u2013159.","journal-title":"Synthesis Lectures on Communication Networks"},{"issue":"1","key":"3381_CR21","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1109\/JPROC.2011.2161428","volume":"100","author":"Y Mo","year":"2012","unstructured":"Mo, Y., Kim, T. H.-J., Brancik, K., Dickinson, D., Lee, H., Perrig, A., et al. (2012). Cyber-physical security of a smart grid infrastructure. Proceedings of the IEEE, 100(1), 195\u2013209.","journal-title":"Proceedings of the IEEE"},{"key":"3381_CR22","volume-title":"Critical infrastructures: Background, policy, and implementation","author":"JD Moteff","year":"2010","unstructured":"Moteff, J. D. (2010). Critical infrastructures: Background, policy, and implementation. Darby: DIANE Publishing."},{"issue":"2","key":"3381_CR23","doi-asserted-by":"publisher","first-page":"286","DOI":"10.2307\/1969529","volume":"54","author":"J Nash","year":"1951","unstructured":"Nash, J. (1951). Non-cooperative games. The Annals of Mathematics, 54(2), 286\u2013295.","journal-title":"The Annals of Mathematics"},{"key":"3381_CR24","unstructured":"NITRD. (2015). Cyber physical systems vision statement. Accessed January 17, 2018, from http:\/\/www.nitrd.gov\/nitrdgroups\/images\/6\/6a\/Cyber_Physical_Systems_%28CPS%29_Vision_Statement.pdf."},{"key":"3381_CR25","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/j.compind.2017.03.007","volume":"88","author":"H Orojloo","year":"2017","unstructured":"Orojloo, H., & Azgomi, M. A. (2017). A game-theoretic approach to model and quantify the security of cyber-physical systems. Computers in Industry, 88, 44\u201357.","journal-title":"Computers in Industry"},{"key":"3381_CR26","doi-asserted-by":"crossref","unstructured":"Pasqualetti, F., D\u00f6rfler, F., & Bullo, F. (2011). Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design. In 2011 50th IEEE Conference on Decision and Control and European Control Conference (pp. 2195\u20132201). IEEE.","DOI":"10.1109\/CDC.2011.6160641"},{"key":"3381_CR27","doi-asserted-by":"crossref","unstructured":"Rao, N. S.\u00a0V., Poole, S.\u00a0W., Ma, C.\u00a0Y.\u00a0T., He, F., Zhuang, J., & Yau, D.\u00a0K.\u00a0Y. (2012). Cloud computing infrastructure robustness: A game theory approach. In Proceedings of the international conference on computing, networking and communications. Maui, Hawaii.","DOI":"10.1109\/ICCNC.2012.6167441"},{"key":"3381_CR28","doi-asserted-by":"publisher","first-page":"1421","DOI":"10.3390\/s18051421","volume":"18","author":"NSV Rao","year":"2018","unstructured":"Rao, N. S. V., Ma, C. Y. T., Hausken, K., He, F., Yau, D. K. Y., & Zhuang, J. (2018a). Defense strategies for asymmetric networked systems with discrete components. Sensors, 18, 1421.","journal-title":"Sensors"},{"key":"3381_CR29","doi-asserted-by":"crossref","unstructured":"Rao, N. S. V., Ma, C. Y. T., & He, F. (2018b). Defense strategies for multi-site cloud computing server infrastructures. In International conference on distributed computing and networking.","DOI":"10.1145\/3154273.3154344"},{"issue":"3","key":"3381_CR30","doi-asserted-by":"publisher","first-page":"52","DOI":"10.3390\/g9030052","volume":"9","author":"NSV Rao","year":"2018","unstructured":"Rao, N. S. V., Ma, C. Y. T., He, F., Yau, D. K. Y., & Zhuang, J. (2018c). Cyber-physical correlation effects in defense games for large discrete infrastructures. Games, 9(3), 52.","journal-title":"Games"},{"key":"3381_CR31","doi-asserted-by":"crossref","unstructured":"Roy, S., Ellis, C., Shiva, S., Dasgupta, D., Shandilya, V., & Wu, Q. (2010). A survey of game theory as applied to network security. In Hawaii international conference on system sciences (pp. 1\u201310). IEEE Computer Society.","DOI":"10.1109\/HICSS.2010.35"},{"key":"3381_CR32","unstructured":"Sanders, W. H. (2010). Progress towards a resilient power grid infrastructure. In Proceedings of the power and energy society general meeting, 2010 IEEE (pp. 1\u20133). Minneapolis, MN: IEEE."},{"key":"3381_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/JPROC.2010.2096270","volume":"99","author":"S Sridhar","year":"2011","unstructured":"Sridhar, S., Hahn, A., & Govindarasu, M. (2011). Cyber-physical system security for the electric power grid. Proceedings of the IEEE, 99, 1\u201315.","journal-title":"Proceedings of the IEEE"},{"issue":"1","key":"3381_CR34","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1016\/j.ejor.2014.10.001","volume":"242","author":"C Zhang","year":"2015","unstructured":"Zhang, C., Ramirez-Marquez, J. E., & Wang, J. (2015). Critical infrastructure protection using secrecy\u2014A discrete simultaneous game. European Journal of Operational Research, 242(1), 212\u2013221.","journal-title":"European Journal of Operational Research"},{"key":"3381_CR35","unstructured":"Zhu, Q., & Bushnell, L. (2013). Networked cyber-physical systems: Interdependence, resilience and information exchange. In 2013 51st Annual Allerton conference on communication, control, and computing (Allerton) (pp. 763\u2013769). IEEE."},{"issue":"2","key":"3381_CR36","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1016\/j.ejor.2009.07.028","volume":"203","author":"J Zhuang","year":"2010","unstructured":"Zhuang, J., Bier, V. M., & Alagoz, O. (2010). Modeling secrecy and deception in a multiple-period attacker-defender signaling game. European Journal of Operational Research, 203(2), 409\u2013418.","journal-title":"European Journal of Operational Research"},{"key":"3381_CR37","doi-asserted-by":"crossref","unstructured":"Zonouz, S.\u00a0A., Khurana, H., Sanders, W.\u00a0H., & Yardley, T.\u00a0M. (2009). Rre: A game-theoretic intrusion response and recovery engine. In IEEE\/IFIP international conference on dependable systems & networks, 2009. DSN\u201909 (pp. 439\u2013448). IEEE.","DOI":"10.1109\/DSN.2009.5270307"}],"container-title":["Annals of Operations Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10479-019-03381-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10479-019-03381-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10479-019-03381-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,10]],"date-time":"2020-11-10T23:15:30Z","timestamp":1605050130000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10479-019-03381-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,21]]},"references-count":37,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2020,11]]}},"alternative-id":["3381"],"URL":"https:\/\/doi.org\/10.1007\/s10479-019-03381-1","relation":{},"ISSN":["0254-5330","1572-9338"],"issn-type":[{"value":"0254-5330","type":"print"},{"value":"1572-9338","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,9,21]]},"assertion":[{"value":"21 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}