Critical infrastructure protection under imperfect attacker perception

This paper considers the problem of allocating finite resources among the elements of a critical infrastructure system in order to protect it from antagonistic attacks. Previous studies have assume ...

[1]  K. Hausken Income, interdependence, and substitution effects affecting incentives for security investment , 2006 .

[2]  Scott Beveridge,et al.  Income , 2002 .

[3]  Todd Sandler,et al.  The calculus of dissent: An analysis of terrorists' choice of targets , 1988, Synthese.

[4]  Joe Straw,et al.  Insurance , 2003, Washington Information Directory 2021–2022.

[5]  Ward Hanson,et al.  Optimizing Multinomial Logit Profit Functions , 1996 .

[6]  Larry Samuelson,et al.  Choosing What to Protect: Strategic Defensive Allocation Against an Unknown Attacker , 2005 .

[7]  Robert Powell,et al.  Allocating Defensive Resources with Private Information about Vulnerability , 2007, American Political Science Review.

[8]  Åke J. Holmgren,et al.  Evaluating Strategies for Defending Electric Power Networks Against Antagonistic Attacks , 2007, IEEE Transactions on Power Systems.

[9]  Drew Fudenberg,et al.  Game theory (3. pr.) , 1991 .

[10]  William M. Landes,et al.  An Economic Study of U. S. Aircraft Hijacking, 1961-1976 , 1978, The Journal of Law and Economics.

[11]  H. Kunreuther,et al.  Interdependent Security , 2003 .

[12]  Ferenc Jordán Predicting target selection by terrorists: a network analysis of the 2005 London underground attacks , 2008, Int. J. Crit. Infrastructures.

[13]  White House Administrative Office The national strategy for the physical protection of critical infrastructures and key assets , 2003 .

[14]  Vicki M. Bier,et al.  Balancing Terrorism and Natural Disasters - Defensive Strategy with Endogenous Attacker Effort , 2007, Oper. Res..

[15]  R. Powell Defending against Terrorist Attacks with Limited Resources , 2007, American Political Science Review.

[16]  Vicki M. Bier,et al.  Protection of simple series and parallel systems with components of different values , 2005, Reliab. Eng. Syst. Saf..

[17]  T. G. Lewis,et al.  A general defender-attacker risk model for networks , 2008 .

[18]  Göran Grimvall Risks in technological systems , 2010 .

[19]  Richard L. Church,et al.  Protecting Critical Assets: The r-interdiction median problem with fortification , 2007 .

[20]  R. Powell,et al.  Defending Against Strategic Terrorists Over the Long Run: A Basic Approach to Resource Allocation , 2006 .

[21]  B. Frey,et al.  How to Fight Terrorism: Alternatives to Deterrence , 2003 .

[22]  Gerald G. Brown,et al.  Defending Critical Infrastructure , 2006, Interfaces.

[23]  Richard Wilson Risk analysis , 1986, Nature.