{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T05:24:47Z","timestamp":1751433887218,"version":"3.37.3"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2018,8,30]],"date-time":"2018-08-30T00:00:00Z","timestamp":1535587200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2018,8,30]],"date-time":"2018-08-30T00:00:00Z","timestamp":1535587200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001474","name":"Singapore-MIT Alliance for Research and Technology Centre","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100001474","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS 1239054","CNS 1453126"],"award-info":[{"award-number":["CNS 1239054","CNS 1453126"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Dyn Games Appl"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1007\/s13235-018-0280-8","type":"journal-article","created":{"date-parts":[[2018,8,30]],"date-time":"2018-08-30T09:27:33Z","timestamp":1535621253000},"page":"984-1025","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Securing Infrastructure Facilities: When Does Proactive Defense Help?"],"prefix":"10.1007","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5334-4163","authenticated-orcid":false,"given":"Manxi","family":"Wu","sequence":"first","affiliation":[]},{"given":"Saurabh","family":"Amin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,30]]},"reference":[{"key":"280_CR1","doi-asserted-by":"publisher","first-page":"536","DOI":"10.1016\/j.jet.2016.09.009","volume":"166","author":"D Acemoglu","year":"2016","unstructured":"Acemoglu D, Malekian A, Ozdaglar A (2016) Network security and contagion. J Econ Theory 166:536\u2013585","journal-title":"J Econ Theory"},{"key":"280_CR2","doi-asserted-by":"publisher","DOI":"10.1287\/ics.2011.0047","volume-title":"Solving defender-attacker-defender models for infrastructure defense","author":"DL Alderson","year":"2011","unstructured":"Alderson DL, Brown GG, Carlyle WM, Wood RK (2011) Solving defender-attacker-defender models for infrastructure defense. Technical report, Naval Postgraduate School, Monterey, CA, Department of Operations Research"},{"issue":"4","key":"280_CR3","first-page":"739","volume":"52","author":"DL Alderson","year":"2017","unstructured":"Alderson DL, Brown GG, Carlyle WM, Wood RK (2017) Assessing and improving the operational resilience of a large highway infrastructure system to worst-case losses. Transp Sci 52(4):739\u20131034","journal-title":"Transp Sci"},{"key":"280_CR4","doi-asserted-by":"crossref","unstructured":"Alpcan T, Basar T (2003) A game theoretic approach to decision and analysis in network intrusion detection. In: Proceedings of the 42nd IEEE conference on decision and control, 2003, IEEE. 3:2595\u20132600","DOI":"10.1109\/CDC.2003.1273013"},{"key":"280_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17197-0","volume-title":"Network security: a decision and game-theoretic approach","author":"T Alpcan","year":"2010","unstructured":"Alpcan T, Ba\u015far T (2010) Network security: a decision and game-theoretic approach. Cambridge University Press, Cambridge"},{"issue":"1","key":"280_CR6","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1016\/j.automatica.2012.09.007","volume":"49","author":"S Amin","year":"2013","unstructured":"Amin S, Schwartz GA, Sastry SS (2013) Security of interdependent and identical networked control systems. Automatica 49(1):186\u2013192","journal-title":"Automatica"},{"issue":"2","key":"280_CR7","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1016\/S0899-8256(05)80001-6","volume":"8","author":"K Bagwell","year":"1995","unstructured":"Bagwell K (1995) Commitment and observability in games. Games Econ Behav 8(2):271\u2013280","journal-title":"Games Econ Behav"},{"key":"280_CR8","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611971132","volume-title":"Dynamic noncooperative game theory","author":"T Ba\u015far","year":"1998","unstructured":"Ba\u015far T, Olsder GJ (1998) Dynamic noncooperative game theory. SIAM, Philadelphia"},{"key":"280_CR9","unstructured":"Battigalli P, Gilli M, Molinari MC (1992) Learning and convergence to equilibrium in repeated strategic interactions: an introductory survey. Universit\u00e0 Commerciale\u201d L. Bocconi\u201d, Istituto di Economia Politica"},{"issue":"1","key":"280_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jet.2004.03.008","volume":"122","author":"AW Beggs","year":"2005","unstructured":"Beggs AW (2005) On the convergence of reinforcement learning. J Econ Theory 122(1):1\u201336","journal-title":"J Econ Theory"},{"issue":"1872","key":"280_CR11","doi-asserted-by":"publisher","first-page":"1893","DOI":"10.1098\/rsta.2008.0019","volume":"366","author":"MGH Bell","year":"2008","unstructured":"Bell MGH, Kanturska U, Schm\u00f6cker J-D, Fonzone A (2008) Attacker-defender models and road network vulnerability. Philos Trans R Soc Lond A: Math Phys Eng Sci 366(1872):1893\u20131906","journal-title":"Philos Trans R Soc Lond A: Math Phys Eng Sci"},{"issue":"4","key":"280_CR12","doi-asserted-by":"publisher","first-page":"563","DOI":"10.1111\/j.1467-9779.2007.00320.x","volume":"9","author":"V Bier","year":"2007","unstructured":"Bier V, Oliveros S, Samuelson L (2007) Choosing what to protect: strategic defensive allocation against an unknown attacker. J Public Econ Theory 9(4):563\u2013587","journal-title":"J Public Econ Theory"},{"key":"280_CR13","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1016\/j.ress.2012.11.016","volume":"112","author":"VM Bier","year":"2013","unstructured":"Bier VM, Hausken K (2013) Defending and attacking a network of two arcs subject to traffic congestion. Reliabil Eng Syst Saf 112:214\u2013224","journal-title":"Reliabil Eng Syst Saf"},{"key":"280_CR14","doi-asserted-by":"crossref","unstructured":"Blum A, Even-Dar E, Ligett K (2006) Routing without regret: on convergence to Nash equilibria of regret-minimizing algorithms in routing games. In : Proceedings of the 25th annual ACM symposium on principles of distributed computing. ACM, pp 45\u201352","DOI":"10.1145\/1146381.1146392"},{"issue":"1","key":"280_CR15","first-page":"374","volume":"13","author":"GW Brown","year":"1951","unstructured":"Brown GW (1951) Iterative solution of games by fictitious play. Act Anal Prod Alloc 13(1):374\u2013376","journal-title":"Act Anal Prod Alloc"},{"issue":"6","key":"280_CR16","doi-asserted-by":"publisher","first-page":"530","DOI":"10.1287\/inte.1060.0252","volume":"36","author":"G Brown","year":"2006","unstructured":"Brown G, Carlyle M, Salmer\u00f3n J, Wood K (2006) Defending critical infrastructure. Interfaces 36(6):530\u2013544","journal-title":"Interfaces"},{"key":"280_CR17","doi-asserted-by":"crossref","unstructured":"C\u00e1rdenas AA, Amin S, Lin Z-S, Huang Y-L, Huang C-Y, Sastry S (2011) Attacks against process control systems: risk assessment, detection, and response. In: Proceedings of the 6th ACM symposium on information, computer and communications security. ACM, pp 355\u2013366","DOI":"10.1145\/1966913.1966959"},{"issue":"2","key":"280_CR18","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1109\/TIFS.2009.2019154","volume":"4","author":"L Chen","year":"2009","unstructured":"Chen L, Leneutre J (2009) A game theoretical framework on intrusion detection in heterogeneous networks. IEEE Trans Inf Forensics Secur 4(2):165\u2013178","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"1","key":"280_CR19","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.geb.2008.11.012","volume":"70","author":"R Cominetti","year":"2010","unstructured":"Cominetti R, Melo E, Sorin S (2010) A payoff-based learning procedure and its application to traffic games. Games Econ Behav 70(1):71\u201383","journal-title":"Games Econ Behav"},{"key":"280_CR20","doi-asserted-by":"crossref","unstructured":"Cominetti R, Facchinei F, Lasserre JB (2012) Adaptive dynamics in traffic games. In: Modern optimization modelling techniques. Springer, pp 239\u2013257","DOI":"10.1007\/978-3-0348-0291-8_12"},{"key":"280_CR21","doi-asserted-by":"publisher","DOI":"10.1002\/9780470400531.eorms0962","volume-title":"Wardrop equilibria","author":"JR Correa","year":"2011","unstructured":"Correa JR, Stier-Moses NE (2011) Wardrop equilibria. Wiley Encyclopedia of Operations Research and Management Science, Hoboken"},{"key":"280_CR22","doi-asserted-by":"crossref","unstructured":"Dahan M, Amin S (2015) Network flow routing under strategic link disruptions. In: 53rd Annual Allerton conference on communication, control, and computing (Allerton), 2015. IEEE, pp 353\u2013360","DOI":"10.1109\/ALLERTON.2015.7447026"},{"key":"280_CR23","doi-asserted-by":"crossref","unstructured":"Dritsoula L, Loiseau P, Musacchio J (2012) A game-theoretical approach for finding optimal strategies in an intruder classification game. In: IEEE 51st Annual conference on decision and control (CDC), 2012. IEEE, pp 7744\u20137751","DOI":"10.1109\/CDC.2012.6426808"},{"issue":"12","key":"280_CR24","doi-asserted-by":"publisher","first-page":"3094","DOI":"10.1109\/TIFS.2017.2718494","volume":"12","author":"L Dritsoula","year":"2017","unstructured":"Dritsoula L, Loiseau P, Musacchio J (2017) A game-theoretic analysis of adversarial classification. IEEE Trans Inf Forensics Secur 12(12):3094\u20133109","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"280_CR25","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.geb.2012.12.007","volume":"79","author":"M Dziubi\u0144ski","year":"2013","unstructured":"Dziubi\u0144ski M, Goyal S (2013) Network design and defence. Games Econ Behav 79:30\u201343","journal-title":"Games Econ Behav"},{"issue":"1","key":"280_CR26","doi-asserted-by":"publisher","first-page":"331","DOI":"10.3982\/TE2088","volume":"12","author":"M Dziubi\u0144ski","year":"2017","unstructured":"Dziubi\u0144ski M, Goyal S (2017) How do you defend a network? Theor Econ 12(1):331\u2013376","journal-title":"Theor Econ"},{"issue":"1","key":"280_CR27","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1016\/S0899-8256(05)80016-8","volume":"8","author":"D Fudenberg","year":"1995","unstructured":"Fudenberg D, Kreps DM (1995) Learning in extensive-form games i. self-confirming equilibria. Games Econ Behav 8(1):20\u201355","journal-title":"Games Econ Behav"},{"issue":"5\u20137","key":"280_CR28","doi-asserted-by":"publisher","first-page":"1065","DOI":"10.1016\/0165-1889(94)00819-4","volume":"19","author":"D Fudenberg","year":"1995","unstructured":"Fudenberg D, Levine DK (1995) Consistency and cautious fictitious play. J Econ Dyn Control 19(5\u20137):1065\u20131089","journal-title":"J Econ Dyn Control"},{"issue":"4","key":"280_CR29","doi-asserted-by":"publisher","first-page":"1518","DOI":"10.1093\/restud\/rdu013","volume":"81","author":"S Goyal","year":"2014","unstructured":"Goyal S, Vigier A (2014) Attack, defence, and contagion in networks. Rev Econ Stud 81(4):1518\u20131542","journal-title":"Rev Econ Stud"},{"issue":"6","key":"280_CR30","doi-asserted-by":"publisher","first-page":"2265","DOI":"10.1111\/1468-0262.00376","volume":"70","author":"J Hofbauer","year":"2002","unstructured":"Hofbauer J, Sandholm WH (2002) On the global convergence of stochastic fictitious play. Econometrica 70(6):2265\u20132294","journal-title":"Econometrica"},{"issue":"5","key":"280_CR31","doi-asserted-by":"publisher","first-page":"1019","DOI":"10.2307\/2951492","volume":"61","author":"E Kalai","year":"1993","unstructured":"Kalai E, Lehrer E (1993) Rational learning leads to Nash equilibrium. Econometrica 61(5):1019\u20131045","journal-title":"Econometrica"},{"issue":"5","key":"280_CR32","doi-asserted-by":"publisher","first-page":"1231","DOI":"10.2307\/2951500","volume":"61","author":"E Kalai","year":"1993","unstructured":"Kalai E, Lehrer E (1993) Subjective equilibrium in repeated games. Econometrica 61(5):1231\u20131240","journal-title":"Econometrica"},{"key":"280_CR33","unstructured":"Kalai E, Shmaya E (2015) Learning and stability in big uncertain games. Technical report"},{"issue":"4","key":"280_CR34","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1016\/j.trb.2009.08.004","volume":"44","author":"G Laporte","year":"2010","unstructured":"Laporte G, Mesa JA, Perea F (2010) A game theoretic framework for the robust railway transit network design problem. Transp Res Part B Methodol 44(4):447\u2013459","journal-title":"Transp Res Part B Methodol"},{"issue":"3","key":"280_CR35","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1145\/2480741.2480742","volume":"45","author":"MH Manshaei","year":"2013","unstructured":"Manshaei MH, Zhu Q, Alpcan T, Bac\u015far T, Hubaux J-P (2013) Game theory meets network security and privacy. ACM Comput Surv (CSUR) 45(3):25","journal-title":"ACM Comput Surv (CSUR)"},{"key":"280_CR36","doi-asserted-by":"crossref","unstructured":"Marden JR, Arslan G, Shamma JS (2007) Regret based dynamics: convergence in weakly acyclic games. In: Proceedings of the 6th international joint conference on Autonomous agents and multiagent systems. ACM, p 42","DOI":"10.1145\/1329125.1329175"},{"issue":"2","key":"280_CR37","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1006\/jeth.2000.2785","volume":"100","author":"E Maskin","year":"2001","unstructured":"Maskin E, Tirole J (2001) Markov perfect equilibrium: I. observable actions. J Econ Theory 100(2):191\u2013219","journal-title":"J Econ Theory"},{"key":"280_CR38","unstructured":"Moteff J, Parfomak P (2004) Critical infrastructure and key assets: definition and identification. Library of Congress Washington, DC, Congressional Research Service"},{"key":"280_CR39","doi-asserted-by":"crossref","unstructured":"Nguyen KC, Alpcan T, Basar T (2009) Stochastic games for security in networks with interdependent nodes. In: International conference on game theory for networks, GameNets\u2019 09. IEEE, pp 697\u2013703","DOI":"10.1109\/GAMENETS.2009.5137463"},{"issue":"3","key":"280_CR40","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1017\/S0003055407070244","volume":"101","author":"R Powell","year":"2007","unstructured":"Powell R (2007) Defending against terrorist attacks with limited resources. Am Polit Sci Rev 101(3):527\u2013541","journal-title":"Am Polit Sci Rev"},{"issue":"6","key":"280_CR41","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/37.969131","volume":"21","author":"SM Rinaldi","year":"2001","unstructured":"Rinaldi SM, Peerenboom JP, Kelly TK (2001) Identifying, understanding, and analyzing critical infrastructure interdependencies. IEEE Control Syst 21(6):11\u201325","journal-title":"IEEE Control Syst"},{"issue":"3","key":"280_CR42","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/BF01763252","volume":"3","author":"RW Rosenthal","year":"1974","unstructured":"Rosenthal RW (1974) Correlated equilibria in some classes of two-person games. Int J Game Theory 3(3):119\u2013128","journal-title":"Int J Game Theory"},{"issue":"1","key":"280_CR43","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MCS.2014.2364708","volume":"35","author":"H Sandberg","year":"2015","unstructured":"Sandberg H, Amin S, Johansson KH (2015) Cyberphysical security in networked control systems: an introduction to the issue. IEEE Control Syst 35(1):20\u201323","journal-title":"IEEE Control Syst"},{"issue":"1","key":"280_CR44","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1006\/jeth.2000.2696","volume":"97","author":"WH Sandholm","year":"2001","unstructured":"Sandholm WH (2001) Potential games with continuous player sets. J Econ Theory 97(1):81\u2013108","journal-title":"J Econ Theory"},{"key":"280_CR45","doi-asserted-by":"crossref","unstructured":"Schwartz GA, Amin S, Gueye A, Walrand J (2011) Network design game with both reliability and security failures. In: 49th Annual Allerton conference on communication, control, and computing (Allerton), 2011. IEEE, pp 675\u2013681","DOI":"10.1109\/Allerton.2011.6120233"},{"key":"280_CR46","doi-asserted-by":"crossref","unstructured":"Sethi AR, Amin S, Schwartz G (2017) Value of intrusion detection systems for countering energy fraud. In: American Control Conference (ACC), 2017. IEEE, pp 2739\u20132746","DOI":"10.23919\/ACC.2017.7963366"},{"issue":"1","key":"280_CR47","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1109\/JPROC.2011.2165269","volume":"100","author":"S Sridhar","year":"2012","unstructured":"Sridhar S, Hahn A, Govindarasu M (2012) Cyber-physical system security for the electric power grid. Proc IEEE 100(1):210\u2013224","journal-title":"Proc IEEE"},{"key":"280_CR48","unstructured":"Von\u00a0Stengel B, Zamir S (2004) Leadership with commitment to mixed strategies"},{"issue":"2","key":"280_CR49","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1287\/opre.43.2.243","volume":"43","author":"A Washburn","year":"1995","unstructured":"Washburn A, Wood K (1995) Two-person zero-sum games for network interdiction. Oper Res 43(2):243\u2013251","journal-title":"Oper Res"}],"container-title":["Dynamic Games and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13235-018-0280-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13235-018-0280-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13235-018-0280-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,17]],"date-time":"2020-05-17T18:27:54Z","timestamp":1589740074000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13235-018-0280-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,30]]},"references-count":49,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["280"],"URL":"https:\/\/doi.org\/10.1007\/s13235-018-0280-8","relation":{},"ISSN":["2153-0785","2153-0793"],"issn-type":[{"type":"print","value":"2153-0785"},{"type":"electronic","value":"2153-0793"}],"subject":[],"published":{"date-parts":[[2018,8,30]]},"assertion":[{"value":"30 August 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}