Les Inscriptions à la Bibliothèque sont ouvertes en
ligne via le site: https://biblio.enp.edu.dz
Les Réinscriptions se font à :
• La Bibliothèque Annexe pour les étudiants en
2ème Année CPST
• La Bibliothèque Centrale pour les étudiants en Spécialités
A partir de cette page vous pouvez :
Retourner au premier écran avec les recherches... |
Détail de l'auteur
Auteur G. Levitin
Documents disponibles écrits par cet auteur
Affiner la rechercheDefence and attack of systems with variable attacker system structure detection probability / G. Levitin in Journal of the operational research society (JORS), Vol. 61 N° 1 (Issue spécial) (Janvier 2010)
[article]
in Journal of the operational research society (JORS) > Vol. 61 N° 1 (Issue spécial) (Janvier 2010) . - pp. 124–133
Titre : Defence and attack of systems with variable attacker system structure detection probability Type de document : texte imprimé Auteurs : G. Levitin, Auteur ; K. Hausken, Auteur Année de publication : 2011 Article en page(s) : pp. 124–133 Note générale : Recherche opérationnelle Langues : Anglais (eng) Mots-clés : Attack Defence System demand Elements False targets Redundancy Index. décimale : 001.424 Résumé : A system consists of identical elements. The cumulative performance of these elements should meet a demand. The defender applies three types of defensive actions to reduce a damage associated with system performance reduction caused by an external attack: deploying separated redundant genuine system elements, deploying false elements, and protecting genuine elements. If the attacker cannot distinguish between genuine and false elements, he chooses a number of elements to attack and then selects the elements at random, distributing his resources equally across these elements. By obtaining intelligence data, the attacker can get full information about the system structure and identify false and unprotected genuine elements. The defender estimates the probability that the attacker can identify all system elements. This paper analyses the influence of this probability in a non-cooperative two-period minmax game between the defender and the attacker. DEWEY : 001.424 ISSN : 0160-5682 En ligne : http://www.palgrave-journals.com/jors/journal/v61/n1/abs/jors2008158a.html [article] Defence and attack of systems with variable attacker system structure detection probability [texte imprimé] / G. Levitin, Auteur ; K. Hausken, Auteur . - 2011 . - pp. 124–133.
Recherche opérationnelle
Langues : Anglais (eng)
in Journal of the operational research society (JORS) > Vol. 61 N° 1 (Issue spécial) (Janvier 2010) . - pp. 124–133
Mots-clés : Attack Defence System demand Elements False targets Redundancy Index. décimale : 001.424 Résumé : A system consists of identical elements. The cumulative performance of these elements should meet a demand. The defender applies three types of defensive actions to reduce a damage associated with system performance reduction caused by an external attack: deploying separated redundant genuine system elements, deploying false elements, and protecting genuine elements. If the attacker cannot distinguish between genuine and false elements, he chooses a number of elements to attack and then selects the elements at random, distributing his resources equally across these elements. By obtaining intelligence data, the attacker can get full information about the system structure and identify false and unprotected genuine elements. The defender estimates the probability that the attacker can identify all system elements. This paper analyses the influence of this probability in a non-cooperative two-period minmax game between the defender and the attacker. DEWEY : 001.424 ISSN : 0160-5682 En ligne : http://www.palgrave-journals.com/jors/journal/v61/n1/abs/jors2008158a.html Individual versus overarching protection against strategic attacks / G. Levitin in Journal of the operational research society (JORS), Vol. 63 N° 7 (Juillet 2012)
[article]
in Journal of the operational research society (JORS) > Vol. 63 N° 7 (Juillet 2012) . - pp. 969–981
Titre : Individual versus overarching protection against strategic attacks Type de document : texte imprimé Auteurs : G. Levitin, Auteur ; K. Hausken, Auteur Année de publication : 2012 Article en page(s) : pp. 969–981 Note générale : Opeartiona research Langues : Anglais (eng) Mots-clés : Vulnerability Defence Attack Redundancy protection Contest success function Index. décimale : 001.424 Résumé : This article considers a system consisting of elements that can be protected and attacked individually and collectively. To destroy the system, the attacker must always penetrate/destroy the collective (overarching) protection. In the case of the parallel system, it also must destroy all elements, whereas in the case of the series system, it must destroy at least one element. Both the attacker and the defender have limited resources and can distribute these freely between the two types of protection. The attacker chooses the resource distribution and the number of attacked elements to maximize the system destruction probability. The defender chooses the resource distribution and the number of protected elements to minimize the system destruction probability. The bi-contest minmax game is formulated and its analytical solutions are presented and analysed. The asymptotical analysis of the solutions is presented. The influence of the game parameters on the optimal defence and attack strategies is discussed. DEWEY : 001.424 ISSN : 0160-5682 En ligne : http://www.palgrave-journals.com/jors/journal/v63/n7/abs/jors201196a.html [article] Individual versus overarching protection against strategic attacks [texte imprimé] / G. Levitin, Auteur ; K. Hausken, Auteur . - 2012 . - pp. 969–981.
Opeartiona research
Langues : Anglais (eng)
in Journal of the operational research society (JORS) > Vol. 63 N° 7 (Juillet 2012) . - pp. 969–981
Mots-clés : Vulnerability Defence Attack Redundancy protection Contest success function Index. décimale : 001.424 Résumé : This article considers a system consisting of elements that can be protected and attacked individually and collectively. To destroy the system, the attacker must always penetrate/destroy the collective (overarching) protection. In the case of the parallel system, it also must destroy all elements, whereas in the case of the series system, it must destroy at least one element. Both the attacker and the defender have limited resources and can distribute these freely between the two types of protection. The attacker chooses the resource distribution and the number of attacked elements to maximize the system destruction probability. The defender chooses the resource distribution and the number of protected elements to minimize the system destruction probability. The bi-contest minmax game is formulated and its analytical solutions are presented and analysed. The asymptotical analysis of the solutions is presented. The influence of the game parameters on the optimal defence and attack strategies is discussed. DEWEY : 001.424 ISSN : 0160-5682 En ligne : http://www.palgrave-journals.com/jors/journal/v63/n7/abs/jors201196a.html Optimal defence of single object with imperfect false targets / Peng, R. in Journal of the operational research society (JORS), Vol. 62 N° 1 (Janvier 2011)
[article]
in Journal of the operational research society (JORS) > Vol. 62 N° 1 (Janvier 2011) . - pp. 134–141
Titre : Optimal defence of single object with imperfect false targets Type de document : texte imprimé Auteurs : Peng, R., Auteur ; G. Levitin, Auteur ; Xie, M., Auteur Année de publication : 2011 Article en page(s) : pp. 134–141 Note générale : Recherche opérationnelle Langues : Anglais (eng) Mots-clés : Vulnerability Attack Defence False target Index. décimale : 001.424 Résumé : The paper considers an object exposed to external intentional attacks. The defender distributes its resource between deploying false targets and protecting the object. The false targets are not perfect and there is a nonzero probability that a false target can be detected by the attacker. Once the attacker has detected a certain number of false targets, it ignores them and chooses such number of undetected targets to attack that maximizes the probability of the object destruction. The defender decides how many false targets to deploy in order to minimize the probability of the object destruction assuming that the attacker uses the most harmful strategy to attack. The optimal number of false targets and the optimal number of attacked targets are obtained for the case of single and multiple types of the false targets. A methodology of finding the optimal defence strategy under uncertain contest intensity is suggested. DEWEY : 001.424 ISSN : 0160-5682 En ligne : http://www.palgrave-journals.com/jors/journal/v62/n1/abs/jors2009171a.html [article] Optimal defence of single object with imperfect false targets [texte imprimé] / Peng, R., Auteur ; G. Levitin, Auteur ; Xie, M., Auteur . - 2011 . - pp. 134–141.
Recherche opérationnelle
Langues : Anglais (eng)
in Journal of the operational research society (JORS) > Vol. 62 N° 1 (Janvier 2011) . - pp. 134–141
Mots-clés : Vulnerability Attack Defence False target Index. décimale : 001.424 Résumé : The paper considers an object exposed to external intentional attacks. The defender distributes its resource between deploying false targets and protecting the object. The false targets are not perfect and there is a nonzero probability that a false target can be detected by the attacker. Once the attacker has detected a certain number of false targets, it ignores them and chooses such number of undetected targets to attack that maximizes the probability of the object destruction. The defender decides how many false targets to deploy in order to minimize the probability of the object destruction assuming that the attacker uses the most harmful strategy to attack. The optimal number of false targets and the optimal number of attacked targets are obtained for the case of single and multiple types of the false targets. A methodology of finding the optimal defence strategy under uncertain contest intensity is suggested. DEWEY : 001.424 ISSN : 0160-5682 En ligne : http://www.palgrave-journals.com/jors/journal/v62/n1/abs/jors2009171a.html Parallel systems under two sequential attacks with imperfect detection of the first attack outcome / G. Levitin in Journal of the operational research society (JORS), Vol. 63 N° 11 (Novembre 2012)
[article]
in Journal of the operational research society (JORS) > Vol. 63 N° 11 (Novembre 2012) . - pp. 1545–1555
Titre : Parallel systems under two sequential attacks with imperfect detection of the first attack outcome Type de document : texte imprimé Auteurs : G. Levitin, Auteur ; K. Hausken, Auteur Année de publication : 2012 Article en page(s) : pp. 1545–1555 Note générale : operational research Langues : Anglais (eng) Mots-clés : attack; defence; parallel system; identification error; survivability; minmax Index. décimale : 001.424 Résumé : The paper compares the efficiency of single and double attack against a system consisting of identical parallel elements. An attacker maximizes the system vulnerability (probability of total destruction). In order to destroy the system, the attacker distributes its constrained resource optimally across two attacks and chooses the number of elements to be attacked in the first attack. The attacker observes which elements are destroyed and not destroyed in the first attack and allocates its remaining resource into attacking the remaining elements in the second attack. The paper considers two types of identification errors: wrong identification of a destroyed element as not destroyed, and wrong identification of a not destroyed element as destroyed. First, the influence of the identification error probabilities on the optimal attack strategy against a system with a fixed number of elements is analysed. Thereafter, a minmax two-period game between the attacker and the defender is considered, in which the defender in the first period distributes its constrained resource between deploying redundant elements and protecting them against the attack in the second period. It is shown how the identification error probabilities affect the defence strategy. DEWEY : 001.424 ISSN : 0160-5682 En ligne : http://www.palgrave-journals.com/jors/journal/v63/n11/abs/jors20124a.html [article] Parallel systems under two sequential attacks with imperfect detection of the first attack outcome [texte imprimé] / G. Levitin, Auteur ; K. Hausken, Auteur . - 2012 . - pp. 1545–1555.
operational research
Langues : Anglais (eng)
in Journal of the operational research society (JORS) > Vol. 63 N° 11 (Novembre 2012) . - pp. 1545–1555
Mots-clés : attack; defence; parallel system; identification error; survivability; minmax Index. décimale : 001.424 Résumé : The paper compares the efficiency of single and double attack against a system consisting of identical parallel elements. An attacker maximizes the system vulnerability (probability of total destruction). In order to destroy the system, the attacker distributes its constrained resource optimally across two attacks and chooses the number of elements to be attacked in the first attack. The attacker observes which elements are destroyed and not destroyed in the first attack and allocates its remaining resource into attacking the remaining elements in the second attack. The paper considers two types of identification errors: wrong identification of a destroyed element as not destroyed, and wrong identification of a not destroyed element as destroyed. First, the influence of the identification error probabilities on the optimal attack strategy against a system with a fixed number of elements is analysed. Thereafter, a minmax two-period game between the attacker and the defender is considered, in which the defender in the first period distributes its constrained resource between deploying redundant elements and protecting them against the attack in the second period. It is shown how the identification error probabilities affect the defence strategy. DEWEY : 001.424 ISSN : 0160-5682 En ligne : http://www.palgrave-journals.com/jors/journal/v63/n11/abs/jors20124a.html