Balancing Terrorism and Natural Disasters—Defensive Strategy with Endogenous Attacker Effort
From MaRDI portal
Publication:3392129
DOI10.1287/opre.1070.0434zbMath1167.91331OpenAlexW2047736339MaRDI QIDQ3392129
Publication date: 13 August 2009
Published in: Operations Research (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1287/opre.1070.0434
Noncooperative games (91A10) Applications of game theory (91A80) Other game-theoretic models (91A40)
Related Items (64)
The strategic interaction between a company and the government surrounding disasters ⋮ Allocating capacity in parallel queues to improve their resilience to deliberate attack ⋮ Infrastructure security games ⋮ Individual versus overarching protection and attack of assets ⋮ ACTIVE AND PASSIVE DEFENSE AGAINST MULTIPLE ATTACK FACILITIES ⋮ Static and dynamic resource allocation models for recovery of interdependent systems: application to the Deepwater Horizon oil spill ⋮ A medical resource allocation model for serving emergency victims with deteriorating health conditions ⋮ Modeling and mitigating the effects of supply chain disruption in a defender-attacker game ⋮ Modeling costly learning and counter-learning in a defender-attacker game with private defender information ⋮ ACTIVE VS. PASSIVE DEFENSE AGAINST A STRATEGIC ATTACKER ⋮ Historical evolution and benefit-cost explanation of periodical fluctuation in coal mine safety supervision: an evolutionary game analysis framework ⋮ On the value of exposure and secrecy of defense system: first-mover advantage vs. robustness ⋮ Optimal control of a terror queue ⋮ Multithreat multisite protection: a security case study ⋮ Information security: Designing a stochastic-network for throughput and reliability ⋮ Protection issues for supply systems involving random attacks ⋮ A two-resource allocation algorithm with an application to large-scale zero-sum defensive games ⋮ Natural disasters and their impact on cooperation against a common enemy ⋮ Network Inspection for Detecting Strategic Attacks ⋮ Validating game-theoretic models of terrorism: insights from machine learning ⋮ Bargaining model of labor disputes considering social mediation and bounded rationality ⋮ A Tullock-contest-based approach for cyber security investments ⋮ A decomposable resource allocation model with generalized overarching protections ⋮ Adversarial risk analysis under partial information ⋮ Military system of systems architecting with individual system contracts ⋮ Balancing congestion and security in the presence of strategic applicants with private information ⋮ A two‐stage network interdiction‐monitoring game ⋮ Resource Allocation for Homeland Defense: Dealing with the Team Effect ⋮ When Hackers Err: The Impacts of False Positives on Information Security Games ⋮ Role of Intelligence Inputs in Defending Against Cyber Warfare and Cyberterrorism ⋮ Optimizing system resilience: a facility protection model with recovery time ⋮ Two-Stage Invest–Defend Game: Balancing Strategic and Operational Decisions ⋮ Computational Efficiency in Multivariate Adversarial Risk Analysis Models ⋮ Shield versus sword resource distribution in \(K\)-round duels ⋮ A Stackelberg game model for resource allocation in cargo container security ⋮ Designing Response Supply Chain Against Bioattacks ⋮ Terrorism deterrence in a two country framework: strategic interactions between R\&D, defense and pre-emption ⋮ Publicity vs. impact in nonprofit disclosures and donor preferences: a sequential game with one nonprofit organization and \(N\) donors ⋮ A Dilemma in the Communication of a UAV with its Controller ⋮ Systems under attack-survivability rather than reliability: concept, results, and applications ⋮ An analytical approach to the protection planning of a rail intermodal terminal network ⋮ Multi-objective Stackelberg game model for water supply networks against interdictions with incomplete information ⋮ Non-convexities and the gains from concealing defenses from committed terrorists ⋮ Analysis of facility protection strategies against an uncertain number of attacks: the stochastic R-interdiction median problem with fortification ⋮ Defending against multiple different attackers ⋮ Revenge or continued attack and defense in defender-attacker conflicts ⋮ The role of customs in securing containerized global supply chains ⋮ Critical infrastructure protection using secrecy -- a discrete simultaneous game ⋮ Cybersecurity investments in the supply chain: coordination and a strategic attacker ⋮ On the learning patterns and adaptive behavior of terrorist organizations ⋮ Governments' and Terrorists' Defense and Attack in a T-Period Game ⋮ Target-Hardening Decisions Based on Uncertain Multiattribute Terrorist Utility ⋮ Regulation Games Between Government and Competing Companies: Oil Spills and Other Disasters ⋮ Modeling Credible Retaliation Threats in Deterring the Smuggling of Nuclear Weapons Using Partial Inspection—A Three-Stage Game ⋮ Information Security Investment When Hackers Disseminate Knowledge ⋮ Modeling Public–Private Partnerships in Disaster Management via Centralized and Decentralized Models ⋮ Modeling a Multitarget Attacker–Defender Game with Budget Constraints ⋮ A survey of network interdiction models and algorithms ⋮ COMBINED SERIES AND PARALLEL SYSTEMS SUBJECT TO INDIVIDUAL VERSUS OVERARCHING DEFENSE AND ATTACK ⋮ Interplay of rumor propagation and clarification on social media during crisis events -- a game-theoretic approach ⋮ Modeling secrecy and deception in a multiple-period attacker-defender signaling game ⋮ Augmented probability simulation methods for sequential games ⋮ A leader-follower partially observed, multiobjective Markov game ⋮ Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender-attacker game
This page was built for publication: Balancing Terrorism and Natural Disasters—Defensive Strategy with Endogenous Attacker Effort