Table 2.
Title | Authors | Classification Code Using Table 1 |
---|---|---|
Game Theoretic analysis of adaptive radar jamming |
Bachmann et al. | T-N-IW-NCo-Sim- -D-ZS-2P |
Target selection for tracking in multifunction radar networks: Nash and Correlated equilibria |
Bogdanovic et al. | T-A-AMW-NCo- -Sim-D-ZS-NP |
Power allocation game between a radar network and multiple jammers |
Deligiannis et al. | T-A-IW-NCo-Sim-D-ZS-NP |
Strategies for defending a coastline against multiple attackers |
Garcia et al. | T-A-IW-NCo-Sim-C-ZS-3P |
A game theory approach to target tracking in sensor networks |
Gu et al. | T-L-IW-NCo-Sim-D-ZS-NP |
Joint Power allocation and beamforming between a multi-static-radar and jammer based on game theory |
He et al. | T-A-IW-NCo-Sim-D-ZS-2P |
Game theoretic situation and transmission in unattended ground sensor networks: a correlated equilibrium approach |
Krishnamurthy et al. | T-L-(RAW & AMW)- -NCo-Sim-D-ZS-NP |
Network enabled missile deflection: games and correlated equilibrium |
Maskery et al. 2007 a | T-N-(RAW & IW) -Co-Sim-D-NZS-NP |
Decentralised algorithms for netcentric Force Protection against anti-ship missiles |
Maskery et al. 2007 b | T-N-(RAW & IW)- -Co-Sim-D-NZS-NP |
Search and Screening | Koopman | T-(LSA)-AMW-NCo- -Slt-D-ZS-NP |
Optimal Strategy for Target Protection with a defender in the pursuit-evasion scenario |
Qilong et al. | T-A-WCW- -NCo-Sim-C-ZS-3P |
Differential game theory with applications to missiles and autonomous systems guidance |
Faruqi | T-A-(AMW,WCW)- -NCo-Slt-C-ZS- -(2P,3P,NP) |
A game theoretical interceptor guidance law for ballistic missile defence. |
Shinar et al. | T-A-(AMW,WCW)- -NCo-Slt-C-ZS-2P |
Pursuit-Evasion games: a tractable framework for anti-jamming in aerial attacks |
Parras et al. | T-A-(WCW,IW) -NCo-Slt-C-ZS-2P |
A simple game theoretic approach to suppression of enemy defences and other time-critical target analyses |
Hamilton et al. | T-A-(RAW,WCW)- -NCo-Slt-D-ZS-2P |
Choosing What to Protect: Strategic Defence allocation against an unknown attacker |
Bier et al. | T-L-RAW-NCo- -Slt-D-ZS-2P |
Considerations on Optimal Resource allocation in avation security |
Cioaca | M-C-RAW-NCo -Slt-D-ZS-2P |
Horsemen and the empty city: A game theoretic examination of deception in Chinese military legend |
Cotten et al. | T-L-RAW- -NCo-Slt-D-ZS-2P |
An Economic Theory of Destabilisation War |
Gries et al. | (T,M)-(IW,RAW)- -NCo-Slt-D-ZS-NP |
Game theoretic approach towards network security: A review |
Litti | M-C-IW-NCo-Slt-D-ZS-2P |
Automating cyber defence responses using attack-defence trees and game theory |
Jhawar et al. | M-C-RAW-NCo- -Slt-D-ZS-2P |
From individual decisions from experience to behavioural game theory |
Gonzalez | M-C-IW-NCo- -Slt-D-ZS-2P |
Game Theoretic Approaches to Attack Surface Shifting. Moving Target Defense II |
Manadhata | M-C-IW-NCo- -Slt-D-ZS-2P |
Improving reliability through Multi-Path routing and Link Defence: An Application of Game Theory to Transport |
Kanturska et al. | M-C-RAW- -NCo-Slt-D-ZS-2P |
Game Theoretic and Reliability’ models in counter-terrorism and security |
Bier et al. | M-C-RAW- -NCo-Slt-D-ZS-2P |
Changing behaviours in defence acqusition: a game theory approach |
Gardener et al. | (T,M)- -(L,A,S,C,Sp)- -IW-NCo- -Slt-D-ZS-NP |
Joint Transmit Power and Bandwidth Allocation for Cognitive Satellite Network based on Bargaining Game Theory |
Zhong et al. | M-Sp-RAW-Co- -Slt-D-NZS-NP |
The Research and Simulation of a Satellite Routing Algorithm based on Game Theory |
Qiao et al. | M-Sp-WCW- -NCo-Slt-D-ZS-NP |
A survey of multiple unmanned vehicles formation control and coordiation. Normal and fault situations |
Zhang et al. | T-A-WCW-Co- -Slt-D-NZS-NP |