Using game theory to optimize allocation of defensive resources to protect multiple chemical facilities in a city against terrorist attacks
暂无分享,去创建一个
Zhilong Chen | Qilin Feng | Xudong Zhao | Yicun Chen | Zhilong Chen | H. Cai | Xudong Zhao | Yicun Chen | Hao Cai | Qilin Feng
[1] Uriel G. Rothblum,et al. Nature plays with dice - terrorists do not: Allocating resources to counter strategic versus probabilistic risks , 2009, Eur. J. Oper. Res..
[2] Genserik Reniers,et al. A sequential-move game for enhancing safety and security cooperation within chemical clusters. , 2011, Journal of hazardous materials.
[3] Jun Zhuang,et al. Cost of Equity in Homeland Security Resource Allocation in the Face of a Strategic Attacker , 2013, Risk analysis : an official publication of the Society for Risk Analysis.
[4] Jr. Louis Anthony Cox,et al. Game Theory and Risk Analysis , 2009 .
[5] Abdul-Akeem Sadiq,et al. Assessing the Chemical Facility Anti-Terrorism Standards after 5 Years: Achievements, Challenges, and Risks Ahead , 2013 .
[6] Vicki M. Bier,et al. Balancing Terrorism and Natural Disasters - Defensive Strategy with Endogenous Attacker Effort , 2007, Oper. Res..
[7] Oguzhan Alagöz,et al. Modeling secrecy and deception in a multiple-period attacker-defender signaling game , 2010, Eur. J. Oper. Res..
[8] E. Rasmusen. Games and Information: An Introduction to Game Theory , 2006 .
[9] Henry H. Willis. Guiding Resource Allocations Based on Terrorism Risk , 2007, Risk analysis : an official publication of the Society for Risk Analysis.
[10] Ali Khavanin,et al. Comprehensive risk assessment and management of petrochemical feed and product transportation pipelines , 2009 .
[11] Calvin D Jaeger. Chemical facility vulnerability assessment project. , 2003, Journal of hazardous materials.
[12] Ciwei Gao,et al. Risk Assessment of Malicious Attacks Against Power Systems , 2009, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[13] M Sam Mannan,et al. Lessons to be learned from an analysis of ammonium nitrate disasters in the last 100 years. , 2014, Journal of hazardous materials.
[14] David A Moore. The new risk paradigm for chemical process security and safety. , 2004, Journal of hazardous materials.
[15] H. Vincent Poor,et al. Infrastructure security games , 2014, Eur. J. Oper. Res..
[16] Shi-Woei Lin,et al. Should the Model for Risk‐Informed Regulation be Game Theory Rather than Decision Theory? , 2013, Risk analysis : an official publication of the Society for Risk Analysis.
[17] Karel Soudan,et al. A game-theoretical approach for reciprocal security-related prevention investment decisions , 2010, Reliab. Eng. Syst. Saf..
[18] Louis Anthony Tony Cox,et al. Some Limitations of “Risk = Threat × Vulnerability × Consequence” for Risk Analysis of Terrorist Attacks , 2008 .
[19] Genserik Reniers,et al. Using Game Theory to Improve Safety Within Chemical Industrial Parks , 2013 .
[20] M Sam Mannan,et al. Initial perspectives on process threat management. , 2004, Journal of hazardous materials.
[21] Genserik Reniers,et al. A Game-Theoretical Model to Improve Process Plant Protection from Terrorist Attacks. , 2016, Risk analysis : an official publication of the Society for Risk Analysis.
[22] Quentin A. Baker,et al. Vapor cloud explosion analysis , 1996 .
[23] John C. McDonald,et al. Confronting the risks of terrorism: making the right decisions , 2004, Reliab. Eng. Syst. Saf..
[24] Jai P. Gupta,et al. Terror-Proofing Chemical Process Industries , 2007 .
[25] Valerio Cozzani,et al. The assessment of the attractiveness of process facilities to terrorist attacks , 2015 .
[26] Brian Veitch,et al. A Grid Based Approach for Fire and Explosion Consequence Analysis , 2006 .
[27] Guowei Ma,et al. New correlation for vapor cloud explosion overpressure calculation at congested configurations , 2014 .
[28] R. Powell. Defending against Terrorist Attacks with Limited Resources , 2007, American Political Science Review.
[29] Ashwani Srivastava,et al. New methodologies for security risk assessment of oil and gas industry , 2010 .
[30] M. Naceur Azaiez,et al. Game Theoretic Risk Analysis of Security Threats , 2009 .
[31] Richard White,et al. A computational asset vulnerability model for the strategic protection of the critical infrastructure , 2014, Int. J. Crit. Infrastructure Prot..
[32] J. P. Gupta,et al. Security risk assessment: applying the concepts of fuzzy logic. , 2010, Journal of hazardous materials.
[33] M. Sam Mannan,et al. Case study: Assessment on large scale LPG BLEVEs in the 2011 Tohoku earthquakes , 2015 .
[34] Jun Zhuang,et al. Modeling Resources Allocation in Attacker-Defender Games with "Warm Up" CSF. , 2016, Risk analysis : an official publication of the Society for Risk Analysis.
[35] Ilan Adler. The equivalence of linear programs and zero-sum games , 2013, Int. J. Game Theory.
[36] Gerald G. Brown,et al. How Probabilistic Risk Assessment Can Mislead Terrorism Risk Analysts , 2011, Risk analysis : an official publication of the Society for Risk Analysis.
[37] Henry H. Willis,et al. Estimating Terrorism Risk , 2002 .
[38] Gerald G. Brown,et al. Defending Critical Infrastructure , 2006, Interfaces.
[39] John A. Sokolowski,et al. Probabilistic Risk Analysis and Terrorism Risk , 2010, Risk analysis : an official publication of the Society for Risk Analysis.
[40] Kwang-Cheng Chen,et al. Smart attacks in smart grid communication networks , 2012, IEEE Communications Magazine.
[41] Jun Bi,et al. A two-scale system to identify environmental risk of chemical industry clusters. , 2011, Journal of hazardous materials.
[42] Uriel G. Rothblum,et al. Allocating multiple defensive resources in a zero-sum game setting , 2015, Ann. Oper. Res..
[43] Uday Kumar Chakrabarti,et al. Route risk evaluation on class-2 hazmat transportation , 2011 .
[44] J. Vrijling,et al. An overview of quantitative risk measures for loss of life and economic damage. , 2003, Journal of hazardous materials.
[45] Jun Zhuang,et al. Robust Allocation of a Defensive Budget Considering an Attacker's Private Information , 2012, Risk analysis : an official publication of the Society for Risk Analysis.
[46] Doug Stephens,et al. Chemical Plants Remain Vulnerable to Terrorists: A Call to Action , 2006, Environmental health perspectives.
[47] Xiaojun Shan,et al. Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender-attacker game , 2013, Eur. J. Oper. Res..
[48] V. Bier,et al. SECRECY AND DECEPTION AT EQUILIBRIUM, WITH APPLICATIONS TO ANTI‐TERRORISM RESOURCE ALLOCATION , 2011 .
[49] Jun Zhuang,et al. Modeling Arbitrary Layers of Continuous‐Level Defenses in Facing with Strategic Attackers , 2011, Risk analysis : an official publication of the Society for Risk Analysis.
[50] David A. Moore. Security Risk Assessment Methodology for the petroleum and petrochemical industries , 2013 .
[51] Shahid Abbas Abbasi,et al. Major accidents in process industries and an analysis of causes and consequences , 1999 .