Balancing Terrorism and Natural Disasters—Defensive Strategy with Endogenous Attacker Effort

From MaRDI portal
Publication:3392129


DOI10.1287/opre.1070.0434zbMath1167.91331MaRDI QIDQ3392129

Vicki M. Bier, Jun Zhuang

Publication date: 13 August 2009

Published in: Operations Research (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1287/opre.1070.0434


91A10: Noncooperative games

91A80: Applications of game theory

91A40: Other game-theoretic models


Related Items

Governments' and Terrorists' Defense and Attack in a T-Period Game, Target-Hardening Decisions Based on Uncertain Multiattribute Terrorist Utility, Regulation Games Between Government and Competing Companies: Oil Spills and Other Disasters, Modeling Credible Retaliation Threats in Deterring the Smuggling of Nuclear Weapons Using Partial Inspection—A Three-Stage Game, Information Security Investment When Hackers Disseminate Knowledge, Modeling Public–Private Partnerships in Disaster Management via Centralized and Decentralized Models, Modeling a Multitarget Attacker–Defender Game with Budget Constraints, Network Inspection for Detecting Strategic Attacks, When Hackers Err: The Impacts of False Positives on Information Security Games, Role of Intelligence Inputs in Defending Against Cyber Warfare and Cyberterrorism, Two-Stage Invest–Defend Game: Balancing Strategic and Operational Decisions, Computational Efficiency in Multivariate Adversarial Risk Analysis Models, Designing Response Supply Chain Against Bioattacks, A Dilemma in the Communication of a UAV with its Controller, Information security: Designing a stochastic-network for throughput and reliability, A two‐stage network interdiction‐monitoring game, A leader-follower partially observed, multiobjective Markov game, Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender-attacker game, The strategic interaction between a company and the government surrounding disasters, Infrastructure security games, Individual versus overarching protection and attack of assets, Static and dynamic resource allocation models for recovery of interdependent systems: application to the Deepwater Horizon oil spill, A medical resource allocation model for serving emergency victims with deteriorating health conditions, Modeling and mitigating the effects of supply chain disruption in a defender-attacker game, Modeling costly learning and counter-learning in a defender-attacker game with private defender information, Historical evolution and benefit-cost explanation of periodical fluctuation in coal mine safety supervision: an evolutionary game analysis framework, On the value of exposure and secrecy of defense system: first-mover advantage vs. robustness, Optimal control of a terror queue, Multithreat multisite protection: a security case study, Protection issues for supply systems involving random attacks, Balancing congestion and security in the presence of strategic applicants with private information, Optimizing system resilience: a facility protection model with recovery time, Shield versus sword resource distribution in \(K\)-round duels, Publicity vs. impact in nonprofit disclosures and donor preferences: a sequential game with one nonprofit organization and \(N\) donors, A Stackelberg game model for resource allocation in cargo container security, Analysis of facility protection strategies against an uncertain number of attacks: the stochastic R-interdiction median problem with fortification, Defending against multiple different attackers, The role of customs in securing containerized global supply chains, Critical infrastructure protection using secrecy -- a discrete simultaneous game, Military system of systems architecting with individual system contracts, Non-convexities and the gains from concealing defenses from committed terrorists, Modeling secrecy and deception in a multiple-period attacker-defender signaling game, A two-resource allocation algorithm with an application to large-scale zero-sum defensive games, Bargaining model of labor disputes considering social mediation and bounded rationality, Systems under attack-survivability rather than reliability: concept, results, and applications, An analytical approach to the protection planning of a rail intermodal terminal network, Multi-objective Stackelberg game model for water supply networks against interdictions with incomplete information, Revenge or continued attack and defense in defender-attacker conflicts, Interplay of rumor propagation and clarification on social media during crisis events -- a game-theoretic approach, Augmented probability simulation methods for sequential games, Natural disasters and their impact on cooperation against a common enemy, Adversarial risk analysis under partial information, Cybersecurity investments in the supply chain: coordination and a strategic attacker, On the learning patterns and adaptive behavior of terrorist organizations, A survey of network interdiction models and algorithms, Terrorism deterrence in a two country framework: strategic interactions between R\&D, defense and pre-emption, Validating game-theoretic models of terrorism: insights from machine learning, A Tullock-contest-based approach for cyber security investments, A decomposable resource allocation model with generalized overarching protections, COMBINED SERIES AND PARALLEL SYSTEMS SUBJECT TO INDIVIDUAL VERSUS OVERARCHING DEFENSE AND ATTACK, Allocating capacity in parallel queues to improve their resilience to deliberate attack, ACTIVE VS. PASSIVE DEFENSE AGAINST A STRATEGIC ATTACKER, Resource Allocation for Homeland Defense: Dealing with the Team Effect, ACTIVE AND PASSIVE DEFENSE AGAINST MULTIPLE ATTACK FACILITIES