Multithreat multisite protection: a security case study
DOI10.1016/J.EJOR.2016.01.041zbMATH Open1346.90444OpenAlexW2326564807MaRDI QIDQ322995FDOQ322995
Authors: David Ríos Insua, Javier Cano, Michael Pellot, Ricardo Ortega
Publication date: 7 October 2016
Published in: European Journal of Operational Research (Search for Journal in Brave)
Full work available at URL: http://hdl.handle.net/10261/196678
Recommendations
- Security economics: an adversarial risk analysis approach to airport protection
- A decomposable resource allocation model with generalized overarching protections
- Models of the optimal resource allocation for the critical infrastructure protection
- Allocating multiple defensive resources in a zero-sum game setting
- Optimal resource allocation for security in reliability systems
risk analysistransportationadversarial risk analysismultiple intelligent attackersmultisite protection
Management decision making, including multiple objectives (90B50) Case-oriented studies in operations research (90B90) Resource and cost allocation (including fair division, apportionment, etc.) (91B32)
Cites Work
- Title not available (Why is that?)
- A Bayesian analysis of some nonparametric problems
- Balancing Terrorism and Natural Disasters—Defensive Strategy with Endogenous Attacker Effort
- Multi-agent influence diagrams for representing and solving games.
- Relative Risk Aversion
- Patrolling games
- State of the Art—Utility Assessment Methods
- Measurable Multiattribute Value Functions
- Individual versus overarching protection and attack of assets
- Patrolling a perimeter
- Title not available (Why is that?)
- Adversarial Risk Analysis
- Expert Elicitation of Adversary Preferences Using Ordinal Judgments
- Probabilistic Inversion of Expert Judgments in the Quantification of Model Uncertainty
- Improving resource allocation strategies against human adversaries in security games: an extended study
- Uncertain Judgements: Eliciting Experts' Probabilities
- Defending against multiple different attackers
Cited In (5)
This page was built for publication: Multithreat multisite protection: a security case study
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q322995)