Balancing Terrorism and Natural Disasters—Defensive Strategy with Endogenous Attacker Effort
From MaRDI portal
Publication:3392129
DOI10.1287/OPRE.1070.0434zbMATH Open1167.91331OpenAlexW2047736339MaRDI QIDQ3392129FDOQ3392129
Authors: Jun Zhuang, Vicki M. Bier
Publication date: 13 August 2009
Published in: Operations Research (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1287/opre.1070.0434
Recommendations
- Modeling a multitarget attacker-defender game with budget constraints
- Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender-attacker game
- Weakest-link attacker-defender games with multiple attack technologies
- Two-stage invest-defend game: balancing strategic and operational decisions
- A game theoretic model for resource allocation among countermeasures with multiple attributes
Applications of game theory (91A80) Noncooperative games (91A10) Other game-theoretic models (91A40)
Cited In (67)
- Modeling Public–Private Partnerships in Disaster Management via Centralized and Decentralized Models
- Combined series and parallel systems subject to individual versus overarching defense and attack
- A leader-follower partially observed, multiobjective Markov game
- Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender-attacker game
- Augmented probability simulation methods for sequential games
- Balancing congestion and security in the presence of strategic applicants with private information
- Regulation Games Between Government and Competing Companies: Oil Spills and Other Disasters
- Resource Allocation for Homeland Defense: Dealing with the Team Effect
- Optimizing system resilience: a facility protection model with recovery time
- A Stackelberg game model for resource allocation in cargo container security
- Validating game-theoretic models of terrorism: insights from machine learning
- Non-convexities and the gains from concealing defenses from committed terrorists
- Static and dynamic resource allocation models for recovery of interdependent systems: application to the Deepwater Horizon oil spill
- Analysis of facility protection strategies against an uncertain number of attacks: the stochastic R-interdiction median problem with fortification
- Modeling secrecy and deception in a multiple-period attacker-defender signaling game
- The strategic interaction between a company and the government surrounding disasters
- Two-Stage Invest–Defend Game: Balancing Strategic and Operational Decisions
- Multi-objective Stackelberg game model for water supply networks against interdictions with incomplete information
- The role of customs in securing containerized global supply chains
- Critical infrastructure protection using secrecy -- a discrete simultaneous game
- Modeling Credible Retaliation Threats in Deterring the Smuggling of Nuclear Weapons Using Partial Inspection—A Three-Stage Game
- Infrastructure security games
- Revenge or continued attack and defense in defender-attacker conflicts
- Coordination of strategic responses to security threats: Laboratory evidence
- Shield versus sword resource distribution in \(K\)-round duels
- Individual versus overarching protection and attack of assets
- A medical resource allocation model for serving emergency victims with deteriorating health conditions
- Modeling a Multitarget Attacker–Defender Game with Budget Constraints
- Bargaining model of labor disputes considering social mediation and bounded rationality
- Modeling and mitigating the effects of supply chain disruption in a defender-attacker game
- Modeling costly learning and counter-learning in a defender-attacker game with private defender information
- Historical evolution and benefit-cost explanation of periodical fluctuation in coal mine safety supervision: an evolutionary game analysis framework
- On the value of exposure and secrecy of defense system: first-mover advantage vs. robustness
- Active vs. passive defense against a strategic attacker
- A Tullock-contest-based approach for cyber security investments
- A two-resource allocation algorithm with an application to large-scale zero-sum defensive games
- Cybersecurity investments in the supply chain: coordination and a strategic attacker
- A survey of network interdiction models and algorithms
- Publicity vs. impact in nonprofit disclosures and donor preferences: a sequential game with one nonprofit organization and \(N\) donors
- Optimal control of a terror queue
- Multithreat multisite protection: a security case study
- Natural disasters and their impact on cooperation against a common enemy
- Protection issues for supply systems involving random attacks
- Defending against multiple different attackers
- On the learning patterns and adaptive behavior of terrorist organizations
- Military system of systems architecting with individual system contracts
- Systems under attack-survivability rather than reliability: concept, results, and applications
- An analytical approach to the protection planning of a rail intermodal terminal network
- A two‐stage network interdiction‐monitoring game
- Interplay of rumor propagation and clarification on social media during crisis events -- a game-theoretic approach
- Adversarial risk analysis under partial information
- Designing Response Supply Chain Against Bioattacks
- Terrorism deterrence in a two country framework: strategic interactions between R\&D, defense and pre-emption
- Governments' and Terrorists' Defense and Attack in a T-Period Game
- Information Security Investment When Hackers Disseminate Knowledge
- Target-Hardening Decisions Based on Uncertain Multiattribute Terrorist Utility
- Active and passive defense against multiple attack facilities
- Role of Intelligence Inputs in Defending Against Cyber Warfare and Cyberterrorism
- A review of attacker-defender games: current state and paths forward
- Allocating capacity in parallel queues to improve their resilience to deliberate attack
- Network Inspection for Detecting Strategic Attacks
- Fighting terrorism: how to position rapid response teams?
- When Hackers Err: The Impacts of False Positives on Information Security Games
- Computational Efficiency in Multivariate Adversarial Risk Analysis Models
- A Dilemma in the Communication of a UAV with its Controller
- Information security: Designing a stochastic-network for throughput and reliability
- A decomposable resource allocation model with generalized overarching protections
This page was built for publication: Balancing Terrorism and Natural Disasters—Defensive Strategy with Endogenous Attacker Effort
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3392129)