Hemmati, Mehdi; Smith, J. Cole; Thai, My - In: Computational Optimization and Applications 57 (2014) 1, pp. 71-104
We consider a two-stage defender-attacker game that takes place on a network, in which the attacker seeks to take control over (or “influence”) as many nodes as possible. The defender acts first in this game by protecting a subset of nodes that cannot be influenced by the attacker. With full...