Robust Allocation of a Defensive Budget Considering an Attacker's Private Information
暂无分享,去创建一个
[1] Jr. Louis Anthony Cox,et al. Game Theory and Risk Analysis , 2009 .
[2] Seth D. Guikema,et al. Probabilistic Modeling of Terrorist Threats: A Systems Analysis Approach to Setting Priorities Among Countermeasures , 2002 .
[3] Niyazi Onur Bakir. A Decision Tree Model for Evaluating Countermeasures to Secure Cargo at United States Southwestern Ports of Entry , 2008, Decis. Anal..
[4] J. Harsanyi. Games with Incomplete Information Played by 'Bayesian' Players, Part III. The Basic Probability Distribution of the Game , 1968 .
[5] Vicki M. Bier,et al. Secrecy in Defensive Allocations as a Strategy for Achieving More Cost-Effec tive Att acker Dett errence , 2009 .
[6] Jun Zhuang,et al. Impacts of Subsidized Security on Stability and Total Social Costs of Equilibrium Solutions in an N-Player Game with Errors , 2010 .
[7] Arkadi Nemirovski,et al. Robust solutions of uncertain linear programs , 1999, Oper. Res. Lett..
[8] K. Hausken. Probabilistic Risk Analysis and Game Theory , 2002, Risk analysis : an official publication of the Society for Risk Analysis.
[9] Melvyn Sim,et al. Robust discrete optimization and network flows , 2003, Math. Program..
[10] Rae Zimmerman,et al. Optimal Resource Allocation for Defense of Targets Based on Differing Measures of Attractiveness , 2008, Risk analysis : an official publication of the Society for Risk Analysis.
[11] Gerald G. Brown,et al. Defending Critical Infrastructure , 2006, Interfaces.
[12] Gregory S Parnell,et al. Intelligent Adversary Risk Analysis: A Bioterrorism Risk Management Model , 2009, Risk analysis : an official publication of the Society for Risk Analysis.
[13] Jason R. W. Merrick,et al. A Comparative Analysis of PRA and Intelligent Adversary Methods for Counterterrorism Risk Management , 2011, Risk analysis : an official publication of the Society for Risk Analysis.
[14] Larry Samuelson,et al. Choosing What to Protect: Strategic Defensive Allocation Against an Unknown Attacker , 2005 .
[15] John R Hall. The elephant in the room is called game theory. , 2009, Risk analysis : an official publication of the Society for Risk Analysis.
[16] V. Bier,et al. SECRECY AND DECEPTION AT EQUILIBRIUM, WITH APPLICATIONS TO ANTI‐TERRORISM RESOURCE ALLOCATION , 2011 .
[17] Chen Wang,et al. Impact of intelligence on target-hardening decisions , 2009, 2009 IEEE Conference on Technologies for Homeland Security.
[18] John A. Major. Advanced Techniques for Modeling Terrorism Risk , 2002 .
[19] Dimitris Bertsimas,et al. A Robust Optimization Approach to Inventory Theory , 2006, Oper. Res..
[20] Arkadi Nemirovski,et al. Robust Convex Optimization , 1998, Math. Oper. Res..
[21] Oguzhan Alagöz,et al. Modeling secrecy and deception in a multiple-period attacker-defender signaling game , 2010, Eur. J. Oper. Res..
[22] Gregory Levitin,et al. Redundancy vs. Protection in Defending Parallel Systems Against Unintentional and Intentional Impacts , 2009, IEEE Transactions on Reliability.
[23] Vicki M. Bier,et al. Balancing Terrorism and Natural Disasters - Defensive Strategy with Endogenous Attacker Effort , 2007, Oper. Res..
[24] Melvyn Sim,et al. The Price of Robustness , 2004, Oper. Res..
[25] R. Powell. Defending against Terrorist Attacks with Limited Resources , 2007, American Political Science Review.
[26] Allen L. Soyster,et al. Technical Note - Convex Programming with Set-Inclusive Constraints and Applications to Inexact Linear Programming , 1973, Oper. Res..
[27] Gregory Levitin,et al. False targets efficiency in defense strategy , 2009, Eur. J. Oper. Res..
[28] Jun Zhuang,et al. Modeling Arbitrary Layers of Continuous‐Level Defenses in Facing with Strategic Attackers , 2011, Risk analysis : an official publication of the Society for Risk Analysis.
[29] Henry H. Willis,et al. Estimating Terrorism Risk , 2002 .
[30] B. Roberson. The Colonel Blotto game , 2006 .
[31] George B. Dantzig,et al. Linear Programming Under Uncertainty , 2004, Manag. Sci..
[32] Peter Kall,et al. Stochastic Programming , 1995 .
[33] Dimitris Bertsimas,et al. Robust game theory , 2006, Math. Program..
[34] Ralph L Keeney,et al. Modeling Values for Anti‐Terrorism Analysis , 2007, Risk analysis : an official publication of the Society for Risk Analysis.
[35] Martin Shubik,et al. Systems Defense Games: Colonel Blotto, Command and Control , 1981 .
[36] Jun Zhuang,et al. Robustness of Optimal Defensive Resource Allocations in the Face of Less Fully Rational Attacker , 2009 .
[37] John A. Sokolowski,et al. Probabilistic Risk Analysis and Terrorism Risk , 2010, Risk analysis : an official publication of the Society for Risk Analysis.
[38] Roberto Szechtman,et al. Confronting Entrenched Insurgents , 2010, Oper. Res..
[39] Vicki M. Bier,et al. Analytical method to identify the number of containers to inspect at U.S. ports to deter terrorist attacks , 2011, Ann. Oper. Res..
[40] Bernard Harris. Mathematical methods in combatting terrorism. , 2004, Risk analysis : an official publication of the Society for Risk Analysis.
[41] Gregory Levitin,et al. Resource Distribution in Multiple Attacks Against a Single Target , 2010, Risk analysis : an official publication of the Society for Risk Analysis.
[42] Kai A. Konrad. The Investment Problem in Terrorism , 2004 .
[43] Uriel G. Rothblum,et al. Nature plays with dice - terrorists do not: Allocating resources to counter strategic versus probabilistic risks , 2009, Eur. J. Oper. Res..
[44] John C. Harsanyi,et al. Games with Incomplete Information Played by "Bayesian" Players, I-III: Part I. The Basic Model& , 2004, Manag. Sci..
[45] Donald Goldfarb,et al. Robust convex quadratically constrained programs , 2003, Math. Program..