Game-Theoretic and Reliability Methods in Counterterrorism and Security

As noted above, protecting engineered systems against intentional attacks is likely to require a combination of game theory and reliability analysis. Risk and reliability analysis by itself will likely not be sufficient to address many critical security challenges, since it does not take into account the attacker’s response to the implementation of reliability or security improvements. However, most current applications of game theory to security deal with individual components or assets in isolation, and hence could benefit from the use of reliability analysis tools and methods to more fully model the risks to complex networked systems such as computer systems, electricity transmission systems, or transportation systems. In the long run, approaches that embed systems reliability models in a game-theoretic framework may make it possible to take advantage of the strengths of both approaches.

[1]  Gregory Levitin Maximizing survivability of acyclic transmission networks with multi-state retransmitters and vulnerable nodes , 2002, Reliab. Eng. Syst. Saf..

[2]  Steven J. Brams,et al.  Superpower Games: Applying Game Theory to Superpower Conflict , 1985 .

[3]  Gregory Levitin,et al.  Optimal multilevel protection in series-parallel systems , 2003, Reliab. Eng. Syst. Saf..

[4]  John C. Hershey,et al.  The Roles of Altruism, Free Riding, and Bandwagoning in Vaccination Decisions , 1994 .

[5]  Ross J. Anderson Why information security is hard - an economic perspective , 2001, Seventeenth Annual Computer Security Applications Conference.

[6]  Vicki M. Bier,et al.  Optimal Allocation of Resources for Defense of Simple Series and Parallel Systems from Determined Adversaries , 2003 .

[7]  Steve Y. Chiu,et al.  Least-cost failure diagnosis in uncertain reliability systems , 1996 .

[8]  Gregory Levitin,et al.  Survivability maximization for vulnerable multi-state systems with bridge topology , 2000, Reliab. Eng. Syst. Saf..

[9]  Larry Samuelson,et al.  Choosing What to Protect: Strategic Defensive Allocation Against an Unknown Attacker , 2005 .

[10]  Howard Raiffa,et al.  Decision analysis: introductory lectures on choices under uncertainty. 1968. , 1969, M.D.Computing.

[11]  Gregory Levitin,et al.  Optimal separation of elements in vulnerable multi-state systems , 2001, Reliab. Eng. Syst. Saf..

[12]  Vicki M. Bier,et al.  Protection of simple series and parallel systems with components of different values , 2005, Reliab. Eng. Syst. Saf..

[13]  John V. Farr,et al.  Infrastructure Risk Analysis Model , 2000 .

[14]  K. Hausken Probabilistic Risk Analysis and Game Theory , 2002, Risk analysis : an official publication of the Society for Risk Analysis.

[15]  T. Sandler,et al.  An economic perspective on transnational terrorism , 2004 .

[16]  T. Philipson Economic Epidemiology and Infectious Diseases , 1999 .

[17]  Edward M. Roche,et al.  Critical Foundations: Protecting America's Infrastructures , 1998 .

[18]  Bruce Schneier,et al.  Managed Security Monitoring: Network Security for the 21st Centur , 2001, Comput. Secur..

[19]  G. Woo Quantitative Terrorism Risk Assessment , 2002 .

[20]  Nikolaos Limnios,et al.  Modern Statistical and Mathematical Methods in Reliability , 2005, Series on Quality, Reliability and Engineering Statistics.

[21]  James H. Lambert,et al.  Reducing vulnerability of water supply systems to attack , 1998 .

[22]  Yacov Y. Haimes,et al.  Strategic Responses to Risks of Terrorism to Water Resources , 2002 .

[23]  Gregory Levitin,et al.  Optimizing survivability of vulnerable series-parallel multi-state systems , 2003, Reliab. Eng. Syst. Saf..

[24]  Vicki Bier An Overview Of Probabilistic Risk Analysis For Complex Engineered Systems , 1996 .

[25]  Melvin Dresher,et al.  Allocation of Two Types of Aircraft in Tactical Air War , 1959 .

[26]  Gregory Levitin,et al.  Optimizing survivability of multi-state systems with multi-level protection by multi-processor genetic algorithm , 2003, Reliab. Eng. Syst. Saf..

[27]  T. Sandler,et al.  What do we know about the substitution effect in transnational terrorism , 2003 .

[28]  Simon Luechinger,et al.  Terrorism: Deterrence May Backfire , 2002 .

[29]  Jack Hirshleifer,et al.  From weakest-link to best-shot: Correction , 1985 .

[30]  O. G. Haywood Military Decision and Game Theory , 1954, Oper. Res..

[31]  Mark E. Johnson,et al.  Risk Analysis of Terrorist Attacks , 1987 .

[32]  T. Sandler,et al.  Terrorism & Game Theory , 2003 .

[33]  Douglas M. Lemon A methodology for the identification of critical locations in infrastructures , 2004 .

[34]  R. Zeckhauser,et al.  The Ecology of Terror Defense , 2003 .

[35]  G. Levitin,et al.  Multi-state system reliabilit y , 2003 .

[36]  Steven D. Levitt,et al.  Measuring Positive Externalities from Unobservable Victim Precaution: An Empirical Analysis of Lojack , 1997 .

[37]  M. Naceur Azaiez,et al.  Optimal resource allocation for security in reliability systems , 2007, Eur. J. Oper. Res..

[38]  J. Hirshleifer From weakest-link to best-shot: The voluntary provision of public goods , 1983 .

[39]  Carol Smidts,et al.  Performance based fire safety regulation under intentional uncertainty , 1999 .

[40]  Daniel G. Arce,et al.  Transnational public goods: Strategies and institutions , 2001 .

[41]  Vicki M. Bier,et al.  Subsidies in Interdependent Security With Heterogeneous Discount Rates , 2007 .

[42]  John V. Farr,et al.  Infrastructure Risk Analysis of Municipal Water Distribution System , 2000 .

[43]  D Warner North,et al.  A discussion of findings and their possible implications from a workshop on bioterrorism threat assessment and risk management. , 2004, Risk analysis : an official publication of the Society for Risk Analysis.

[44]  I. M. Destler,et al.  Protecting the American Homeland , 2003 .

[45]  Game-theoretic Risk Management for Counterterrorism , 2022 .

[46]  Y. Haimes,et al.  A Survey of Approaches for Assessing and Managing the Risk of Extremes , 1999 .

[47]  Morton D. Davis,et al.  Games of Strategy: Theory and Application. , 1962 .

[48]  Louis Anthony Cox,et al.  New Risks: Issues and Management , 1990, Advances in Risk Analysis.

[49]  Detlof von Winterfeldt,et al.  Anniversary Article: Decision Analysis in Management Science , 2004, Manag. Sci..

[50]  John A. Major Advanced Techniques for Modeling Terrorism Risk , 2002 .

[51]  James H. Lambert,et al.  Risk Analysis and Society: Risk of Extreme and Rare Events: Lessons from a Selection of Approaches , 2003 .

[52]  Louis Anthony Cox A Probabilistic Risk Assessment Program for Analyzing Security Risks , 1990 .

[53]  J. Scott Armstrong,et al.  Long-Range Forecasting: From Crystal Ball to Computer , 1981 .

[54]  Gregory Levitin,et al.  Optimal allocation of multi-state elements in linear consecutively connected systems with vulnerable nodes , 2003, Eur. J. Oper. Res..

[55]  Robert J. Genetski,et al.  Long-Range Forecasting: From Crystal Ball to Computer , 1981 .

[56]  Jurgen Brauer,et al.  Peace as an international public good: An application to Southern Africa , 2000 .

[57]  William D. Rowe Vulnerability to Terrorism: Addressing the Human Variables , 2003 .

[58]  D. Weber,et al.  Evaluation and comparison of spatial interpolators II , 1992 .

[59]  H. Kunreuther,et al.  Interdependent Security , 2003 .

[60]  Y. Haimes,et al.  The Role of Risk Analysis in the Protection of Critical Infrastructures Against Terrorism , 2002, Risk analysis : an official publication of the Society for Risk Analysis.

[61]  G. Fechner Elemente der Psychophysik , 1998 .

[62]  Fred Cohen Feature: Managing network security: Attack and defence strategies , 1999 .

[63]  Yosi Ben-Dov Optimal Testing Procedures for Special Structures of Coherent Systems , 1981 .

[64]  Bruce Schneier,et al.  Secrets and Lies: Digital Security in a Networked World , 2000 .

[65]  Melvin Dresher,et al.  A Game Theory Analysis of Tactical Air War , 1959 .

[66]  B John Garrick Perspectives on the use of risk assessment to address terrorism. , 2002, Risk analysis : an official publication of the Society for Risk Analysis.

[67]  M. Dresher Games of Strategy: Theory and Applications , 2007 .

[68]  L. A. Cox,et al.  Heuristic least-cost computation of discrete classification functions with uncertain argument values , 1990 .

[69]  Yacov Y. Haimes,et al.  Roadmap for Modeling Risks of Terrorism to the Homeland , 2002 .

[70]  Martin Shubik,et al.  What is an application and when is theory a waste of time , 1987 .

[71]  Steven J. Brams,et al.  Game Theory and National Security , 1988 .

[72]  Seth D. Guikema,et al.  Probabilistic Modeling of Terrorist Threats: A Systems Analysis Approach to Setting Priorities Among Countermeasures , 2002 .

[73]  Vlasta Molak,et al.  Fundamentals of Risk Analysis and Risk Management , 1996 .

[74]  R. Cooke Experts in Uncertainty: Opinion and Subjective Probability in Science , 1991 .

[75]  T. Bedford,et al.  Probabilistic Risk Analysis: Foundations and Methods , 2001 .

[76]  David A. Moser,et al.  Risk-Based Decisionmaking in Water Resources IX , 2001 .

[77]  Gerald J. Lieberman,et al.  Optimal Composition and Deployment of a Heterogeneous Local Air-Defense System , 1960 .

[78]  Vicki M. Bier,et al.  Subsidized Security and Stability of Equilibrium Solutions in an N-Player Game with Errors ⁄ , 2006 .

[79]  James H. Lambert,et al.  Risks of Cyber Attack to Water Utility Supervisory Control and Data Acquisition Systems , 2001 .

[80]  B. Frey,et al.  How to Fight Terrorism: Alternatives to Deterrence , 2003 .

[81]  H. Kunreuther,et al.  You Only Die Once: Managing Discrete Interdependent Risks , 2003 .