الف. منابع فارسی
- بیگدلی، حمید و طیبی، جواد (1396)، ارائه یک الگو و روش حل بازی های امنیتی فازی و کاربرد آن در آینده پژوهی تهدیدات امنیتی، آینده پژوهی دفاعی، 2(6)، ص 7–29.
- خاتمی، سیدمهدی و انوشه، ابراهیم (1398)، تحلیل منازعه ایران و رژیم صهیونیستی در زمینه برنامه هسته ای ایران با استفاده از نظریه بازی ها، آینده پژوهی دفاعی، 4(13)، ص 7–39
- رحالگو، ناصر؛ کامکار، مهدی و یزدانیان، حمید (1399)، ویژگی های دفاع دانش بنیان از منظر مقام معظم رهبری، فصلنامه علمی مطالعات مدیریت راهبردی دفاع ملی، 4(13)، ص 297–
- شورای عالی علوم تحقیقات و فناوری (1396)، سیاست ها و اولویت های پژوهش و فناوری کشور در بازه زمانی 96 تا 1400. ایران.
- کلانتری، فتح الله، (1398)، مدیریت جنگ احتمالی آینده با توجه به روندها و پیشران های موجود، فصلنامه علمی مدیریت راهبردی دفاع ملی، 3(12)، ص 245–
- عبادی زاده، حجت الله، (1398)، شبیه سازی ریاضی تعاملات و راهبردهای جمهوری اسلامی ایران و عربستان سعودی به کمک نظریه بازیها، فصلنامه علمی مطالعات بین رشته ای دانش راهبردی، 9(35)، ص 35–
- متقی، افشین، کاویانی، مراد و نجفی، سجاد، (1394)، رابطه امنیت زیست محیطی با امنیت ملی، فصلنامه مجلس و راهبرد، 22(83)، ص 75-100.
- محمدپور، مطهره و دشتی، سولماز (1397)، شبیه سازی و پهنه بندی گسترش آتش سوزی در اکوسیستم جنگل به کمک الگو FARSITE (مطالعه موردی: جنگل های استان ایلام)، جغرافیا و مخاطرات محیطی، 32، ص 87–
ب. منابع انگلیسی
- Abbasi, Y. (2016). Modeling Human Bounded Rationality in Opportunistic Security Games (Doctoral dissertation). University of Southern California.
- All Nobel Prizes. (n.d.). https://www.nobelprize.org/prizes/lists/all-nobel-prizes/
- Alpas, H., Berkowicz, S. M., & Ermakova, I. (Eds.). (2011). Environmental Security and Ecoterorrism. Springer.
- Axelsson, J. (2019). Game theory applications in systems-of-systems engineering: A literature review and synthesis. Procedia Computer Science, 153, 154–165. https://doi.org/10.1016/j.procs.2019.05.066
- Basak, A., Fang, F., Nguyen, T. H., & Kiekintveld, C. (2016). Abstraction methods for solving graph-based security games. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 10003 LNAI, 13–33. https://doi.org/10.1007/978-3-319-46840-2_2
- Basar, T. (2010). Lecture Notes on Game Theory. Game Theory Module of the Graduate Program in Network Mathematics, 3–6.
- Ben Yaghlane, A., & Azaiez, M. N. (2017). Systems under attack-survivability rather than reliability: Concept, results, and applications. European Journal of Operational Research, 258(3), 1156–1164. https://doi.org/10.1016/j.ejor.2016.09.041
- Bier, V. M., Cox, L. A., & Azaiez, M. N. (2009). Why Both Game Theory and Reliability Theory Are Important in Defending Infrastructure against Intelligent Attacks. In Game theoretic risk analysis of security threats (pp. 1-11 TS-CrossRef). https://doi.org/10.1007/978-0-387-87767-9_1
- Bricha, N., & Nourelfath, M. (2013). Critical supply network protection against intentional attacks: A game-theoretical model. Reliability Engineering and System Safety, 119, 1–10. https://doi.org/10.1016/j.ress.2013.05.001
- Casorrán-Amilburu, C. (2017). Formulations and Algorithms for General and Security Stackelberg Games (Doctoral dessertation). Université libre de Bruxelles.
- Catharina, R., Gortnitzki, C., Larsson, A., & Wadskog, D. (2014). Bibliometric Handbook for Karolinska Institutet. Research Evaluation, 41. https://doi.org/10.1093/reseval/rvt018
- Chengcheng, H., & Xiagwei, Q. (2020). A review of games and resource allocation algorithms oriented public security. In 2020 International Conference on Computer Engineering and Application (ICCEA), IEEE, 373–378.
- Cobo, M. J., López-Herrera, A. G., Herrera-Viedma, E., & Herrera, F. (2011). Science mapping software tools: Review, analysis, and cooperative study among tools. Journal of the American Society for Information Science and Technology, 62(7), 1382–1402. https://doi.org/10.1002/asi.21525
- (2020). Scopus Content Coverage Guide. https://www.elsevier.com/__data/assets/pdf_file/0017/114533/Scopus_GlobalResearch_Factsheet2019_FINAL_WEB.pdf
- Fahimnia, B., Tang, C. S., Davarzani, H., & Sarkis, J. (2015). Quantitative models for managing supply chain risks: A review. European Journal of Operational Research, 247(1), 1–15. https://doi.org/10.1016/j.ejor.2015.04.034
- Fakoorian, S. A. A., & Swindlehurst, A. L. (2013). Competing for secrecy in the MISO interference channel. IEEE Transactions on Signal Processing, 61(1), 170–181. https://doi.org/10.1109/TSP.2012.2223689
- Fang, F., & Nguyen, T. (2016). Green security games: apply game theory to addressing green security challenges. ACM SIGecom Exchanges, 15(1), 78–83. https://doi.org/10.1145/2994501.2994507
- Farooqui, A. D., & Niazi, M. A. (2016). Game theory models for communication between agents: a review. In Complex Adaptive Systems Modeling (Vol. 4, Issue 1). Springer Berlin Heidelberg. https://doi.org/10.1186/s40294-016-0026-7
- Fujiwara-Greve, T. (2015). Non-Cooperative Game Theory. Springer.
- Gatmiry, Z. S., Hafezalkotob, A., Khakzar bafruei, M., & Soltani, R. (2021). Food web conservation vs. strategic threats: A security game approach. Ecological Modelling, 442(May 2020), 109426. https://doi.org/10.1016/j.ecolmodel.2021.109426
- Grigoryan, G., & Collins, A. J. (2021). Game theory for systems engineering: A survey. International Journal of System of Systems Engineering, 11(2), 121–158. https://doi.org/10.1504/IJSSE.2021.116044
- Hao, M., Jin, S., & Zhuang, J. (2009). Robustness of Optimal Defensive Resource Allocations in the Face of Less Fully Rational Attacker. IIE Annual Conference, 886–891.
- Hausken, K. (2013). Combined series and parallel systems subject to individual versus overarching defense and attack. Asia-Pacific Journal of Operational Research, 30(2). https://doi.org/10.1142/S021759591250056X
- Hausken, K. (2014). Choosing What to Protect When Attacker Resources and Asset Valuations are Uncertain. Operations Research and Decisions, 24(3), 23–44. https://doi.org/10.5277/ord140302
- Hausken, K. (2017a). Defense and attack for interdependent systems. European Journal of Operational Research, 256(2), 582–591. https://doi.org/10.1016/j.ejor.2016.06.033
- Hausken, K. (2017b). Special versus general protection and attack of parallel and series components. Reliability Engineering and System Safety, 165(August 2016), 239–256. https://doi.org/10.1016/j.ress.2017.03.027
- Hausken, K. (2019). Defence and attack of complex interdependent systems. Journal of the Operational Research Society, 70(3), 364–376. https://doi.org/10.1080/01605682.2018.1438763
- Hausken, K., & Levitin, G. (2012). Review of systems defense and attack models. International Journal of Performability Engineering, 8(4), 355–366.
- Jacomy, M., Venturini, T., Heymann, S., & Bastian, M. (2014). ForceAtlas2, a continuous graph layout algorithm for handy network visualization designed for the Gephi software. PLoS ONE, 9(6), 1–12. https://doi.org/10.1371/journal.pone.0098679
- Jain, M., An, B., & Tambe, M. (2013). Security Games Applied to Real-World: Research Contributions and Challenges. In X. S. Wang (Ed.), Moving Target Defense II:Application of Game Theory and Adversarial Modeling (Vol. 100, pp. 15–39). Springer New York.
- Jiang, G., Shen, S., Hu, K., Huang, L., Li, H., & Han, R. (2015). Evolutionary game-based secrecy rate adaptation in wireless sensor networks. International Journal of Distributed Sensor Networks, 2015. https://doi.org/10.1155/2015/975454
- Kar, D., Nguyen, T. H., Fang, F., Brown, M., Sinha, A., Tambe, M., & Jiang, A. X. (2018). Trends and applications in stackelberg security games. Handbook of Dynamic Game Theory, 1223–1269. https://doi.org/10.1007/978-3-319-44374-4_27
- Kovenock, D., & Roberson, B. (2012). Strategic Defense and Attack for Series and Parallel Reliability Systems: Comment. Defence and Peace Economics, 23(5), 517–519. https://doi.org/10.1080/10242694.2012.660606
- Li, Y., Shi, L., Cheng, P., Chen, J., & Quevedo, D. E. (2015). Jamming attacks on remote state estimation in cyber-physical systems: A game-theoretic approach. IEEE Transactions on Automatic Control, 60(10), 2831–2836. https://doi.org/10.1109/TAC.2015.2461851
- Liang, X., & Xiao, Y. (2013). Game theory for network security. IEEE Communications Surveys and Tutorials, 15(1), 472–486. https://doi.org/10.1109/SURV.2012.062612.00056
- Lins, I. D., Rêgo, L. C., Moura, M. D. C., & Droguett, E. L. (2013). Selection of security system design via games of imperfect information and multi-objective genetic algorithm. Reliability Engineering and System Safety, 112, 59–66. https://doi.org/10.1016/j.ress.2012.11.021
- Manshaei, M. H., Zhu, Q., Alpcan, T., Basar, T., & Hubaux, J. P. (2013). Game theory meets network security and privacy. In ACM Computing Surveys (Vol. 45, Issue 3). https://doi.org/10.1145/2480741.2480742
- McCarthy, S., Tambe, M., Kiekintveld, C., Gore, M. L., & Killion, A. (2016). Preventing Illegal Logging: Simultaneous Optimization of Resource Teams and Tactics for Security. Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 3880–3886. http://dl.acm.org/citation.cfm?id=3016450
- Mo, H., Xie, M., & Levitin, G. (2015). Optimal resource distribution between protection and redundancy considering the time and uncertainties of attacks. European Journal of Operational Research, 243(1), 200–210. https://doi.org/10.1016/j.ejor.2014.12.006
- Mukherjee, A., Fakoorian, S. A. A., Huang, J., & Swindlehurst, A. L. (2014). Principles of physical layer security in multiuser wireless networks: A survey. IEEE Communications Surveys and Tutorials, 16(3), 1550–1573. https://doi.org/10.1109/SURV.2014.012314.00178
- Neumann, V., & Morgenstern, O. (1944). Theory of Games and Economic Behavior.
- Nikoofal, M. E., & Zhuang, J. (2012). Robust Allocation of a Defensive Budget Considering an Attacker’s Private Information. Risk Analysis, 32(5), 930–943. https://doi.org/10.1111/j.1539-6924.2011.01702.x
- Rahman, M. A., Manshaei, M. H., Al-Shaer, E., & Shehab, M. (2017). Secure and private data aggregation for energy consumption scheduling in smart grids. IEEE Transactions on Dependable and Secure Computing, 14(2), 221–234. https://doi.org/10.1109/TDSC.2015.2446492
- Rao, N. S. V., Ma, C. Y. T., Hausken, K., He, F., & Zhuang, J. (2016). Defense strategies for infrastructures with multiple systems of components. FUSION 2016 - 19th International Conference on Information Fusion, Proceedings, October, 270–277.
- Reniers, G. L. L. (2012). Security of multimodal hazmat transports: Empirical findings and future directions. International Journal of Safety and Security Engineering, 2(1), 69–79. https://doi.org/10.2495/SAFE-V2-N1-69-79
- Sanchez-Soriano, J. (2013). An overview on game theory applications to engineering. International Game Theory Review, 15(3), 1–18. https://doi.org/10.1142/S0219198913400197
- Sandler, T., & Arce, D. G. M. (2003). Terrorism & game theory. Simulation and Gaming, 34(3), 319–337. https://doi.org/10.1177/1046878103255492
- Seaberg, D., Devine, L., & Zhuang, J. (2017). A review of game theory applications in natural disaster management research. Natural Hazards, 89(3), 1461–1483. https://doi.org/10.1007/s11069-017-3033-x
- Shan, X., & Zhuang, J. (2013). Cost of equity in homeland security resource allocation in the face of a strategic attacker. Risk Analysis, 33(6), 1083–1099. https://doi.org/10.1111/j.1539-6924.2012.01919.x
- Stanojev, I., & Yener, A. (2013). Improving secrecy rate via spectrum leasing for friendly jamming. IEEE Transactions on Wireless Communications, 12(1), 134–145. https://doi.org/10.1109/TWC.2012.120412.112001
- Talarico, L., Reniers, G., Sörensen, K., & Springael, J. (2015). MISTRAL: A game-theoretical model to allocate security measures in a multi-modal chemical transportation network with adaptive adversaries. Reliability Engineering and System Safety, 138, 105–114. https://doi.org/10.1016/j.ress.2015.01.022
- Tambe, M. (2012). Security and Game Theory. In cambridge university press.
- Tang, L., Gong, X., Wu, J., & Zhang, J. (2013). Target detection in bistatic radar networks: Node placement and repeated security game. IEEE Transactions on Wireless Communications, 12(3), 1279–1289. https://doi.org/10.1109/TWC.2013.011713.120892
- Thomé, A. M. T., Scavarda, L. F., & Scavarda, A. J. (2016). Conducting systematic literature review in operations management. Production Planning and Control, 27(5), 408–420. https://doi.org/10.1080/09537287.2015.1129464
- Trejo, K. K., Clempner, J. B., & Poznyak, A. S. (2015). A Stackelberg security game with random strategies based on the extraproximal theoretic approach. Engineering Applications of Artificial Intelligence, 37, 145–153. https://doi.org/10.1016/j.engappai.2014.09.002
- Wang, L., Ren, S., Korel, B., Kwiat, K. A., & Salerno, E. (2014). Improving system reliability against rational attacks under given resources. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 44(4), 446–456. https://doi.org/10.1109/TSMC.2013.2263126
- Wang, Y., Wang, Y., Liu, J., Huang, Z., & Xie, P. (2017). A survey of game theoretic methods for cyber security. Proceedings - 2016 IEEE 1st International Conference on Data Science in Cyberspace, DSC 2016, 631–636. https://doi.org/10.1109/DSC.2016.90
- Wilczyński, A., Jakóbik, A., & Kołodziej, J. (2016). Stackelberg security games: Models, applications and computational aspects. Journal of Telecommunications and Information Technology, 2016(3), 70–79.
- Wu, Y., Wang, B., Liu, K. J. R., & Clancy, T. C. (2012). Anti-jamming games in multi-channel cognitive radio networks. IEEE Journal on Selected Areas in Communications, 30(1), 4–15.
- Zagare, F. C. (2019). Game Theory and Security Studies. In Game Theory, Diplomatic History and Security Studies (Issue January, pp. 7–24). Oxford University Press. https://doi.org/10.1093/oso/9780198831587.003.0002
Zhang, H., Wang, T., Song, L., & Han, Z. (2016). Interference Improves PHY Security for Cognitive Radio Networks. IEEE Transactions on Information Forensics and Security, 11(3), 609–620. https://doi.org/10.1109/TIFS.2015.2500184.
|