Military Defense Strategies: An Inspiration from Game Theoretic Analysis of the Immune Defense

被引:0
|
作者
Bewick, Sharon [1 ]
Wu, Jing [1 ]
Hamel, William [1 ]
Zhang, Mingjun [1 ]
机构
[1] Univ Tennessee, Dept Mech Aerosp & Biomed Engn, Knoxville, TN 37996 USA
关键词
HEPATITIS-B-VIRUS; VIRAL CLEARANCE; INFECTION; CHIMPANZEES; CELLS; HBV;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Based on our early studies on passive versus aggressive strategies, this paper proposes immune defense inspired game theoretic strategies for military defense. Similarities between the immune system and the military operations have been explored under a game theoretic framework and formulated as a min-max optimal control problem. This paper expands the early studies and offers detailed analysis of our predicted strategies by considering different parameter ranges. Simulation results have been presented to demonstrate the effectiveness of the idea.
引用
收藏
页码:6728 / 6733
页数:6
相关论文
共 50 条
  • [21] A Game-Theoretic Model for Defense of an Oceanic Bastion Against Submarines
    Brown, Gerald
    Kline, Jeff
    Thomas, Adam
    Washburn, Alan
    Wood, Kevin
    MILITARY OPERATIONS RESEARCH, 2011, 16 (04): : 25 - 40
  • [22] GAIT: A Game-Theoretic Defense Against Intellectual Property Theft
    Zhang, Youzhi
    Chen, Dongkai
    Jajodia, Sushil
    Pugliese, Andrea
    Subrahmanian, V. S.
    Xiong, Yanhai
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 1967 - 1980
  • [23] Game-Theoretic Threat Screening and Deceptive Techniques for Cyber Defense
    Schlenker, Aaron
    THIRTY-SECOND AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE / THIRTIETH INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE / EIGHTH AAAI SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2018, : 8034 - 8035
  • [24] A Game-theoretic View on Objective Function Attack and Its Defense
    Feng, Guangsheng
    Zhao, Xiaoyu
    Wang, Huiqiang
    Zhao, Qian
    2014 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2014, : 1152 - 1156
  • [25] A game-theoretic model for resource allocation with deception and defense efforts
    Zhang, Xiaoxiong
    Hipel, Keith W.
    Ge, Bingfeng
    Tan, Yuejin
    SYSTEMS ENGINEERING, 2019, 22 (03) : 282 - 291
  • [26] Game-theoretic defense of adversarial distributed support vector machines
    Zhang, Rui
    Zhu, Quanyan
    Journal of Advances in Information Fusion, 2019, 14 (01): : 3 - 21
  • [27] Resource Allocation in Pollution Attack and Defense: A Game-Theoretic Perspective
    Tong, Wei
    Zhong, Sheng
    2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2015, : 3057 - 3062
  • [28] Fight jamming with jamming - A game theoretic analysis of jamming attack in wireless networks and defense strategy
    Chen, Lin
    Leneutre, Jean
    COMPUTER NETWORKS, 2011, 55 (09) : 2259 - 2270
  • [29] Empirical Game-Theoretic Analysis of an Adaptive Cyber-Defense Scenario (Preliminary Report)
    Wellman, Michael P.
    Prakash, Achintya
    DECISION AND GAME THEORY FOR SECURITY, GAMESEC 2014, 2014, 8840 : 43 - 58
  • [30] WHEN DOES TERRORISM OCCUR: GAME-THEORETIC ANALYSIS AND OFFENSE-DEFENSE BALANCE
    Kim, Jin Yeub
    HITOTSUBASHI JOURNAL OF ECONOMICS, 2021, 62 (02) : 59 - 73