Optimal resource allocation for security in reliability systems
From MaRDI portal
Publication:877056
DOI10.1016/j.ejor.2006.03.057zbMath1131.90001OpenAlexW2089974433MaRDI QIDQ877056
Vicki M. Bier, M. Naceur Azaiez
Publication date: 19 April 2007
Published in: European Journal of Operational Research (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ejor.2006.03.057
Related Items (35)
The strategic interaction between a company and the government surrounding disasters ⋮ GAME THEORETIC ANALYSIS OF TWO-PERIOD-DEPENDENT DEGRADED MULTISTATE RELIABILITY SYSTEMS ⋮ Parallel systems under two sequential attacks with contest intensity variation ⋮ Individual versus overarching protection and attack of assets ⋮ Defense against an opportunistic challenger: theory and experiments ⋮ ACTIVE AND PASSIVE DEFENSE AGAINST MULTIPLE ATTACK FACILITIES ⋮ ACTIVE VS. PASSIVE DEFENSE AGAINST A STRATEGIC ATTACKER ⋮ Optimal resource distribution between protection and redundancy considering the time and uncertainties of attacks ⋮ A two-stage resource allocation model for lifeline systems quick response with vulnerability analysis ⋮ Two-stage security screening strategies in the face of strategic applicants, congestions and screening errors ⋮ Optimizing system resilience: a facility protection model with recovery time ⋮ Shield versus sword resource distribution in \(K\)-round duels ⋮ Models of the optimal resource allocation for the critical infrastructure protection ⋮ Game Theory and Cyber Defense ⋮ Strategic defense and attack for series and parallel reliability systems ⋮ False targets efficiency in defense strategy ⋮ Systems under attack-survivability rather than reliability: concept, results, and applications ⋮ Defense and attack for interdependent systems ⋮ Defense and attack of performance-sharing common bus systems ⋮ Unnamed Item ⋮ Analysis of facility protection strategies against an uncertain number of attacks: the stochastic R-interdiction median problem with fortification ⋮ Defending against multiple different attackers ⋮ AI-based competition of autonomous vehicle fleets with application to fleet modularity ⋮ Critical infrastructure protection using secrecy -- a discrete simultaneous game ⋮ Advances in Bayesian decision making in reliability ⋮ Governments' and Terrorists' Defense and Attack in a T-Period Game ⋮ Robust Adversarial Risk Analysis: A Level-k Approach ⋮ Modeling Public–Private Partnerships in Disaster Management via Centralized and Decentralized Models ⋮ Modeling a Multitarget Attacker–Defender Game with Budget Constraints ⋮ Allocating limited resources to protect a massive number of targets using a game theoretic model ⋮ Protecting complex infrastructures against multiple strategic attackers ⋮ COMBINED SERIES AND PARALLEL SYSTEMS SUBJECT TO INDIVIDUAL VERSUS OVERARCHING DEFENSE AND ATTACK ⋮ A note on ``optimal resource allocation for security in reliability systems ⋮ Separation in homogeneous systems with independent identical elements ⋮ Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender-attacker game
Cites Work
- Heuristic least-cost computation of discrete classification functions with uncertain argument values
- Optimal allocation of multi-state elements in linear consecutively connected systems with vulnerable nodes.
- Resource allocation decisions under various demands and cost requirements in an unreliable flow network
- Perfect aggregation for a class of general reliability models with Bayesian updating
- An efficient heuristic for series-parallel redundant reliability problems
- Reliability redundancy allocation: an improved realization for nonconvex nonlinear programming problems
- On the optimal allocation of two active redundancies in a two-component series system
- Optimal Testing Procedures for Special Structures of Coherent Systems
- Technical Note—Fault Testing for a k-out-of-n System
- The Sequential Covering Problem Under Uncertainty
- Some Reliability Fault-Testing Models
- Optimization limits in improving system reliability
This page was built for publication: Optimal resource allocation for security in reliability systems