Balancing Terrorism and Natural Disasters—Defensive Strategy with Endogenous Attacker Effort
From MaRDI portal
Publication:3392129
DOI10.1287/OPRE.1070.0434zbMATH Open1167.91331OpenAlexW2047736339MaRDI QIDQ3392129FDOQ3392129
Authors: Jun Zhuang, Vicki M. Bier
Publication date: 13 August 2009
Published in: Operations Research (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1287/opre.1070.0434
Recommendations
- Modeling a multitarget attacker-defender game with budget constraints
- Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender-attacker game
- Weakest-link attacker-defender games with multiple attack technologies
- Two-stage invest-defend game: balancing strategic and operational decisions
- A game theoretic model for resource allocation among countermeasures with multiple attributes
Applications of game theory (91A80) Noncooperative games (91A10) Other game-theoretic models (91A40)
Cited In (67)
- A review of attacker-defender games: current state and paths forward
- Allocating capacity in parallel queues to improve their resilience to deliberate attack
- Fighting terrorism: how to position rapid response teams?
- Network inspection for detecting strategic attacks
- When hackers err: the impacts of false positives on information security games
- Information security: Designing a stochastic-network for throughput and reliability
- Computational efficiency in multivariate adversarial risk analysis models
- A decomposable resource allocation model with generalized overarching protections
- A dilemma in the communication of a UAV with its controller
- Modeling Public–Private Partnerships in Disaster Management via Centralized and Decentralized Models
- Combined series and parallel systems subject to individual versus overarching defense and attack
- A leader-follower partially observed, multiobjective Markov game
- Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender-attacker game
- Augmented probability simulation methods for sequential games
- Balancing congestion and security in the presence of strategic applicants with private information
- Optimizing system resilience: a facility protection model with recovery time
- A Stackelberg game model for resource allocation in cargo container security
- Validating game-theoretic models of terrorism: insights from machine learning
- Non-convexities and the gains from concealing defenses from committed terrorists
- Static and dynamic resource allocation models for recovery of interdependent systems: application to the Deepwater Horizon oil spill
- Analysis of facility protection strategies against an uncertain number of attacks: the stochastic R-interdiction median problem with fortification
- Modeling secrecy and deception in a multiple-period attacker-defender signaling game
- The strategic interaction between a company and the government surrounding disasters
- Designing response supply chain against bioattacks
- Multi-objective Stackelberg game model for water supply networks against interdictions with incomplete information
- The role of customs in securing containerized global supply chains
- Critical infrastructure protection using secrecy -- a discrete simultaneous game
- Infrastructure security games
- Revenge or continued attack and defense in defender-attacker conflicts
- Coordination of strategic responses to security threats: Laboratory evidence
- Shield versus sword resource distribution in \(K\)-round duels
- Role of intelligence inputs in defending against cyber warfare and cyberterrorism
- Individual versus overarching protection and attack of assets
- Governments' and terrorists' defense and attack in a \(T\)-period game
- Information security investment when hackers disseminate knowledge
- Target-hardening decisions based on uncertain multiattribute terrorist utility
- A medical resource allocation model for serving emergency victims with deteriorating health conditions
- Bargaining model of labor disputes considering social mediation and bounded rationality
- Modeling and mitigating the effects of supply chain disruption in a defender-attacker game
- Modeling costly learning and counter-learning in a defender-attacker game with private defender information
- Historical evolution and benefit-cost explanation of periodical fluctuation in coal mine safety supervision: an evolutionary game analysis framework
- On the value of exposure and secrecy of defense system: first-mover advantage vs. robustness
- Active vs. passive defense against a strategic attacker
- A Tullock-contest-based approach for cyber security investments
- A two-resource allocation algorithm with an application to large-scale zero-sum defensive games
- Cybersecurity investments in the supply chain: coordination and a strategic attacker
- A survey of network interdiction models and algorithms
- Publicity vs. impact in nonprofit disclosures and donor preferences: a sequential game with one nonprofit organization and \(N\) donors
- Optimal control of a terror queue
- Multithreat multisite protection: a security case study
- Natural disasters and their impact on cooperation against a common enemy
- Regulation games between government and competing companies: oil spills and other disasters
- Protection issues for supply systems involving random attacks
- Defending against multiple different attackers
- On the learning patterns and adaptive behavior of terrorist organizations
- Two-stage invest-defend game: balancing strategic and operational decisions
- Military system of systems architecting with individual system contracts
- Systems under attack-survivability rather than reliability: concept, results, and applications
- Modeling credible retaliation threats in deterring the smuggling of nuclear weapons using partial inspection -- a three-stage game
- An analytical approach to the protection planning of a rail intermodal terminal network
- Resource allocation for homeland defense: dealing with the team effect
- A two‐stage network interdiction‐monitoring game
- Modeling a multitarget attacker-defender game with budget constraints
- Interplay of rumor propagation and clarification on social media during crisis events -- a game-theoretic approach
- Adversarial risk analysis under partial information
- Terrorism deterrence in a two country framework: strategic interactions between R\&D, defense and pre-emption
- Active and passive defense against multiple attack facilities
This page was built for publication: Balancing Terrorism and Natural Disasters—Defensive Strategy with Endogenous Attacker Effort
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3392129)