Optimal resource allocation for security in reliability systems
From MaRDI portal
Publication:877056
DOI10.1016/J.EJOR.2006.03.057zbMATH Open1131.90001OpenAlexW2089974433MaRDI QIDQ877056FDOQ877056
Authors: Vicki M. Bier, M. Naceur Azaiez
Publication date: 19 April 2007
Published in: European Journal of Operational Research (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ejor.2006.03.057
Recommendations
- Optimal and game-theoretic deployment of security investments in interdependent assets
- Game-theoretic and reliability methods in counter-terrorism and security
- Strategic defense and attack for series and parallel reliability systems
- A Tullock-contest-based approach for cyber security investments
- A note on ``optimal resource allocation for security in reliability systems
Cites Work
- Optimal allocation of multi-state elements in linear consecutively connected systems with vulnerable nodes.
- An efficient heuristic for series-parallel redundant reliability problems
- Reliability redundancy allocation: an improved realization for nonconvex nonlinear programming problems
- Optimal Testing Procedures for Special Structures of Coherent Systems
- Some Reliability Fault-Testing Models
- On the optimal allocation of two active redundancies in a two-component series system
- Heuristic least-cost computation of discrete classification functions with uncertain argument values
- Resource allocation decisions under various demands and cost requirements in an unreliable flow network
- Perfect aggregation for a class of general reliability models with Bayesian updating
- Technical Note—Fault Testing for a k-out-of-n System
- The Sequential Covering Problem Under Uncertainty
- Optimization limits in improving system reliability
Cited In (43)
- Modeling Public–Private Partnerships in Disaster Management via Centralized and Decentralized Models
- False targets efficiency in defense strategy
- Combined series and parallel systems subject to individual versus overarching defense and attack
- Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender-attacker game
- Security investment over networks with bounded rational agents: analysis and distributed algorithm
- Optimizing system resilience: a facility protection model with recovery time
- Two-stage security screening strategies in the face of strategic applicants, congestions and screening errors
- Analysis of facility protection strategies against an uncertain number of attacks: the stochastic R-interdiction median problem with fortification
- Defense and attack for interdependent systems
- The strategic interaction between a company and the government surrounding disasters
- Resource allocation for restoration of compromised systems
- Advances in Bayesian decision making in reliability
- Critical infrastructure protection using secrecy -- a discrete simultaneous game
- Can less be more? A game-theoretic analysis of filtering vs. investment
- AI-based competition of autonomous vehicle fleets with application to fleet modularity
- Game theoretic analysis of two-period-dependent degraded multistate reliability systems
- Robust adversarial risk analysis: a level-\(k\) approach
- Shield versus sword resource distribution in \(K\)-round duels
- Parallel systems under two sequential attacks with contest intensity variation
- Individual versus overarching protection and attack of assets
- Governments' and terrorists' defense and attack in a \(T\)-period game
- Optimal resource distribution between protection and redundancy considering the time and uncertainties of attacks
- Active vs. passive defense against a strategic attacker
- Game-theoretic and reliability methods in counter-terrorism and security
- A Tullock-contest-based approach for cyber security investments
- Defense against an opportunistic challenger: theory and experiments
- A two-stage resource allocation model for lifeline systems quick response with vulnerability analysis
- Multithreat multisite protection: a security case study
- Strategic defense and attack for series and parallel reliability systems
- Optimal and game-theoretic deployment of security investments in interdependent assets
- Defending against multiple different attackers
- A note on ``optimal resource allocation for security in reliability systems
- Separation in homogeneous systems with independent identical elements
- Minimizing expected attacking cost in networks
- Systems under attack-survivability rather than reliability: concept, results, and applications
- Models of the optimal resource allocation for the critical infrastructure protection
- Game theory and cyber defense
- Research on the optimal allocation of security resources in complex network information systems
- Defense and attack of performance-sharing common bus systems
- Modeling a multitarget attacker-defender game with budget constraints
- Allocating limited resources to protect a massive number of targets using a game theoretic model
- Active and passive defense against multiple attack facilities
- Protecting complex infrastructures against multiple strategic attackers
This page was built for publication: Optimal resource allocation for security in reliability systems
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q877056)