Bayesian Stackelberg game model for water supply networks against interdictions with mixed strategies
暂无分享,去创建一个
[1] Alexandre Dolgui,et al. Review of quantitative methods for supply chain resilience analysis , 2019, Transportation Research Part E: Logistics and Transportation Review.
[2] Jun Zhuang,et al. European Journal of Operational Research on the Value of Exposure and Secrecy of Defense System: First-mover Advantage vs. Robustness , 2022 .
[3] Alexandre Dolgui,et al. Low-Certainty-Need (LCN) supply chains: a new perspective in managing disruption risks and resilience , 2018, Int. J. Prod. Res..
[4] Qing Li,et al. Locating and protecting facilities from intentional attacks using secrecy , 2018, Reliab. Eng. Syst. Saf..
[5] Mohammad Hadi Afshar,et al. Multi-period response management to contaminated water distribution networks: dynamic programming versus genetic algorithms , 2018 .
[6] Jun Zhuang,et al. Robust Allocation of a Defensive Budget Considering an Attacker's Private Information , 2012, Risk analysis : an official publication of the Society for Risk Analysis.
[7] Erik Jenelius,et al. Critical infrastructure protection under imperfect attacker perception , 2010, Int. J. Crit. Infrastructure Prot..
[8] M. Gümüş,et al. On the value of terrorist’s private information in a government’s defensive resource allocation problem , 2015 .
[9] Chi Zhang,et al. Critical infrastructure protection using secrecy - A discrete simultaneous game , 2015, Eur. J. Oper. Res..
[10] Maria Paola Scaparra,et al. Analysis of facility protection strategies against an uncertain number of attacks: The stochastic R-interdiction median problem with fortification , 2011, Comput. Oper. Res..
[11] Jing Zhang,et al. The role of risk preferences in a multi-target defender-attacker resource allocation game , 2018, Reliab. Eng. Syst. Saf..
[12] Maria Paola Scaparra,et al. Optimizing dynamic investment decisions for railway systems protection , 2016, Eur. J. Oper. Res..
[13] Vineet M. Payyappalli,et al. Deterrence and Risk Preferences in Sequential Attacker–Defender Games with Continuous Efforts , 2017, Risk analysis : an official publication of the Society for Risk Analysis.
[14] J. Jiang,et al. Multi-objective Stackelberg game model for water supply networks against interdictions with incomplete information , 2018, Eur. J. Oper. Res..
[15] Oguzhan Alagöz,et al. Modeling secrecy and deception in a multiple-period attacker-defender signaling game , 2010, Eur. J. Oper. Res..
[16] Jose Emmanuel Ramirez-Marquez,et al. Protecting critical infrastructures against intentional attacks: a two-stage game with incomplete information , 2013 .
[17] Rae Zimmerman,et al. Optimal Resource Allocation for Defense of Targets Based on Differing Measures of Attractiveness , 2008, Risk analysis : an official publication of the Society for Risk Analysis.
[18] Gerald G. Brown,et al. Defending Critical Infrastructure , 2006, Interfaces.
[19] Gerald G. Brown,et al. A Two-Sided Optimization for Theater Ballistic Missile Defense , 2005, Oper. Res..
[20] Alexandre Dolgui,et al. Literature review on disruption recovery in the supply chain* , 2017, Int. J. Prod. Res..
[21] V. Bier,et al. SECRECY AND DECEPTION AT EQUILIBRIUM, WITH APPLICATIONS TO ANTI‐TERRORISM RESOURCE ALLOCATION , 2011 .
[22] Yong Deng,et al. A novel matrix game with payoffs of Maxitive Belief Structure , 2018, Int. J. Intell. Syst..
[23] El-Houssaine Aghezzaf,et al. Optimising production and distribution operations in large water supply networks: A piecewise linear optimisation approach , 2013 .
[24] Min Ouyang,et al. Mitigating electric power system vulnerability to worst-case spatially localized attacks , 2017, Reliab. Eng. Syst. Saf..
[25] Dulcy M. Abraham,et al. Allocating security resources to a water supply network , 2007 .
[26] Vicki M. Bier,et al. Balancing Terrorism and Natural Disasters - Defensive Strategy with Endogenous Attacker Effort , 2007, Oper. Res..
[27] Vicki M. Bier,et al. Secrecy in Defensive Allocations as a Strategy for Achieving More Cost-Effec tive Att acker Dett errence , 2009 .