A game theoretic model for resource allocation among countermeasures with multiple attributes
暂无分享,去创建一个
[1] Vicki M. Bier,et al. Trade-offs between target hardening and overarching protection , 2011, Eur. J. Oper. Res..
[2] John A. Major. Advanced Techniques for Modeling Terrorism Risk , 2002 .
[3] Chen Wang,et al. Target-Hardening Decisions Based on Uncertain Multiattribute Terrorist Utility , 2011, Decis. Anal..
[4] Vicki M. Bier,et al. Optimal Defensive Allocations in the Face of Uncertain Terrorist Preferences, with an Emphasis on Transportation , 2012 .
[5] Larry Samuelson,et al. Choosing What to Protect: Strategic Defensive Allocation Against an Unknown Attacker , 2005 .
[6] Xiaojun Shan,et al. Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender-attacker game , 2013, Eur. J. Oper. Res..
[7] Uriel G. Rothblum,et al. Nature plays with dice - terrorists do not: Allocating resources to counter strategic versus probabilistic risks , 2009, Eur. J. Oper. Res..
[8] Jose Emmanuel Ramirez-Marquez,et al. Protecting critical infrastructures against intentional attacks: a two-stage game with incomplete information , 2013 .
[9] Jesus Rios,et al. Adversarial Risk Analysis for Counterterrorism Modeling , 2012, Risk analysis : an official publication of the Society for Risk Analysis.
[10] Rae Zimmerman,et al. Optimal Resource Allocation for Defense of Targets Based on Differing Measures of Attractiveness , 2008, Risk analysis : an official publication of the Society for Risk Analysis.
[11] Kevin A. Kwiat,et al. Improving System Reliability Against Rational Attacks Under Given Resources , 2014, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[12] Oguzhan Alagöz,et al. Modeling secrecy and deception in a multiple-period attacker-defender signaling game , 2010, Eur. J. Oper. Res..
[13] Chen Wang,et al. Expert Elicitation of Adversary Preferences Using Ordinal Judgments , 2013, Oper. Res..
[14] Uriel G. Rothblum,et al. Allocating multiple defensive resources in a zero-sum game setting , 2015, Ann. Oper. Res..
[15] V. Bier,et al. SECRECY AND DECEPTION AT EQUILIBRIUM, WITH APPLICATIONS TO ANTI‐TERRORISM RESOURCE ALLOCATION , 2011 .
[16] Jie Xu,et al. Modeling costly learning and counter-learning in a defender-attacker game with private defender information , 2016, Ann. Oper. Res..
[17] Gilat Levy. Decision–Making Procedures for Committees of Careerist Experts , 2007 .
[18] R. Powell. Defending against Terrorist Attacks with Limited Resources , 2007, American Political Science Review.
[19] T. Sandler,et al. Terrorism & Game Theory , 2003 .
[20] David K. Y. Yau,et al. Markov Game Analysis for Attack-Defense of Power Networks Under Possible Misinformation , 2013, IEEE Transactions on Power Systems.
[21] Ian T. Jolliffe,et al. Principal Component Analysis , 2002, International Encyclopedia of Statistical Science.
[22] Gregory Levitin,et al. Optimal resource distribution between protection and redundancy considering the time and uncertainties of attacks , 2015, Eur. J. Oper. Res..
[23] V. Bier,et al. Reasons for Secrecy and Deception in Homeland‐Security Resource Allocation , 2010, Risk analysis : an official publication of the Society for Risk Analysis.
[24] Jun Zhuang,et al. European Journal of Operational Research on the Value of Exposure and Secrecy of Defense System: First-mover Advantage vs. Robustness , 2022 .
[25] Jun Zhuang,et al. Robust Allocation of a Defensive Budget Considering an Attacker's Private Information , 2012, Risk analysis : an official publication of the Society for Risk Analysis.
[26] Oliver J. Board. The Deception of the Greeks: Generalizing the Information Structure of Extensive Form Games , 2002 .
[27] R. Zeckhauser,et al. The Ecology of Terror Defense , 2003 .
[28] Daniel G. Arce,et al. Transnational public goods: Strategies and institutions , 2001 .
[29] Kevin Chlebik. Terrorism and Game Theory: From the Terrorists’ Point of View , 2010 .
[30] Gregory Levitin,et al. Protection vs. false targets in series systems , 2009, Reliab. Eng. Syst. Saf..
[31] Igor Linkov,et al. Risk Informed Decision Framework for Integrated Evaluation of Countermeasures against CBRN Threats , 2012 .
[32] V. Bier. Choosing What to Protect , 2007, Risk analysis : an official publication of the Society for Risk Analysis.