Balancing Terrorism and Natural Disasters—Defensive Strategy with Endogenous Attacker Effort

From MaRDI portal
Publication:3392129

DOI10.1287/opre.1070.0434zbMath1167.91331OpenAlexW2047736339MaRDI QIDQ3392129

Vicki M. Bier, Jun Zhuang

Publication date: 13 August 2009

Published in: Operations Research (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1287/opre.1070.0434




Related Items (64)

The strategic interaction between a company and the government surrounding disastersAllocating capacity in parallel queues to improve their resilience to deliberate attackInfrastructure security gamesIndividual versus overarching protection and attack of assetsACTIVE AND PASSIVE DEFENSE AGAINST MULTIPLE ATTACK FACILITIESStatic and dynamic resource allocation models for recovery of interdependent systems: application to the Deepwater Horizon oil spillA medical resource allocation model for serving emergency victims with deteriorating health conditionsModeling and mitigating the effects of supply chain disruption in a defender-attacker gameModeling costly learning and counter-learning in a defender-attacker game with private defender informationACTIVE VS. PASSIVE DEFENSE AGAINST A STRATEGIC ATTACKERHistorical evolution and benefit-cost explanation of periodical fluctuation in coal mine safety supervision: an evolutionary game analysis frameworkOn the value of exposure and secrecy of defense system: first-mover advantage vs. robustnessOptimal control of a terror queueMultithreat multisite protection: a security case studyInformation security: Designing a stochastic-network for throughput and reliabilityProtection issues for supply systems involving random attacksA two-resource allocation algorithm with an application to large-scale zero-sum defensive gamesNatural disasters and their impact on cooperation against a common enemyNetwork Inspection for Detecting Strategic AttacksValidating game-theoretic models of terrorism: insights from machine learningBargaining model of labor disputes considering social mediation and bounded rationalityA Tullock-contest-based approach for cyber security investmentsA decomposable resource allocation model with generalized overarching protectionsAdversarial risk analysis under partial informationMilitary system of systems architecting with individual system contractsBalancing congestion and security in the presence of strategic applicants with private informationA two‐stage network interdiction‐monitoring gameResource Allocation for Homeland Defense: Dealing with the Team EffectWhen Hackers Err: The Impacts of False Positives on Information Security GamesRole of Intelligence Inputs in Defending Against Cyber Warfare and CyberterrorismOptimizing system resilience: a facility protection model with recovery timeTwo-Stage Invest–Defend Game: Balancing Strategic and Operational DecisionsComputational Efficiency in Multivariate Adversarial Risk Analysis ModelsShield versus sword resource distribution in \(K\)-round duelsA Stackelberg game model for resource allocation in cargo container securityDesigning Response Supply Chain Against BioattacksTerrorism deterrence in a two country framework: strategic interactions between R\&D, defense and pre-emptionPublicity vs. impact in nonprofit disclosures and donor preferences: a sequential game with one nonprofit organization and \(N\) donorsA Dilemma in the Communication of a UAV with its ControllerSystems under attack-survivability rather than reliability: concept, results, and applicationsAn analytical approach to the protection planning of a rail intermodal terminal networkMulti-objective Stackelberg game model for water supply networks against interdictions with incomplete informationNon-convexities and the gains from concealing defenses from committed terroristsAnalysis of facility protection strategies against an uncertain number of attacks: the stochastic R-interdiction median problem with fortificationDefending against multiple different attackersRevenge or continued attack and defense in defender-attacker conflictsThe role of customs in securing containerized global supply chainsCritical infrastructure protection using secrecy -- a discrete simultaneous gameCybersecurity investments in the supply chain: coordination and a strategic attackerOn the learning patterns and adaptive behavior of terrorist organizationsGovernments' and Terrorists' Defense and Attack in a T-Period GameTarget-Hardening Decisions Based on Uncertain Multiattribute Terrorist UtilityRegulation Games Between Government and Competing Companies: Oil Spills and Other DisastersModeling Credible Retaliation Threats in Deterring the Smuggling of Nuclear Weapons Using Partial Inspection—A Three-Stage GameInformation Security Investment When Hackers Disseminate KnowledgeModeling Public–Private Partnerships in Disaster Management via Centralized and Decentralized ModelsModeling a Multitarget Attacker–Defender Game with Budget ConstraintsA survey of network interdiction models and algorithmsCOMBINED SERIES AND PARALLEL SYSTEMS SUBJECT TO INDIVIDUAL VERSUS OVERARCHING DEFENSE AND ATTACKInterplay of rumor propagation and clarification on social media during crisis events -- a game-theoretic approachModeling secrecy and deception in a multiple-period attacker-defender signaling gameAugmented probability simulation methods for sequential gamesA leader-follower partially observed, multiobjective Markov gameHybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender-attacker game




This page was built for publication: Balancing Terrorism and Natural Disasters—Defensive Strategy with Endogenous Attacker Effort