Hausken, Kjell - In: Operations Research and Decisions 3 (2014), pp. 23-44
This paper models the situation where the attacker’s resources are unknown to the defender. Protecting assets … assets. The attacker’s resources and valuations of these assets are drawn probabilistically. We specify when the isoutility … stands in contrast to earlier research and results from the uncertainty regarding the level of the attacker’s resources. We …