Modeling Arbitrary Layers of Continuous‐Level Defenses in Facing with Strategic Attackers
暂无分享,去创建一个
[1] V. Bier,et al. SECRECY AND DECEPTION AT EQUILIBRIUM, WITH APPLICATIONS TO ANTI‐TERRORISM RESOURCE ALLOCATION , 2011 .
[2] Vicki M. Bier,et al. Secrecy in Defensive Allocations as a Strategy for Achieving More Cost-Effec tive Att acker Dett errence , 2009 .
[3] Jun Zhuang,et al. Impacts of Subsidized Security on Stability and Total Social Costs of Equilibrium Solutions in an N-Player Game with Errors , 2010 .
[4] Larry Samuelson,et al. Choosing What to Protect: Strategic Defensive Allocation Against an Unknown Attacker , 2005 .
[5] Laura A. McLay,et al. Interdicting nuclear material on cargo containers using knapsack problem models , 2011, Ann. Oper. Res..
[6] M. Naceur Azaiez,et al. Optimal resource allocation for security in reliability systems , 2007, Eur. J. Oper. Res..
[7] Rae Zimmerman,et al. Optimal Resource Allocation for Defense of Targets Based on Differing Measures of Attractiveness , 2008, Risk analysis : an official publication of the Society for Risk Analysis.
[8] Paul B. Kantor,et al. A Large-Scale Linear Programming Model for Finding Optimal Container Inspection Strategies , 2009 .
[9] Kjell Hausken,et al. Defending Against Terrorism, Natural Disaster, and All Hazards , 2009 .
[10] V. Bier. Choosing What to Protect , 2007, Risk analysis : an official publication of the Society for Risk Analysis.
[11] Vicki M. Bier,et al. Analytical method to identify the number of containers to inspect at U.S. ports to deter terrorist attacks , 2011, Ann. Oper. Res..
[12] Gregory Levitin,et al. Resource Distribution in Multiple Attacks Against a Single Target , 2010, Risk analysis : an official publication of the Society for Risk Analysis.
[13] Kai A. Konrad. The Investment Problem in Terrorism , 2004 .
[14] R Avenhaus. Playing for time: A sequential inspection game , 2004 .
[15] Vicki M. Bier,et al. Balancing Terrorism and Natural Disasters - Defensive Strategy with Endogenous Attacker Effort , 2007, Oper. Res..
[16] R. Powell. Defending against Terrorist Attacks with Limited Resources , 2007, American Political Science Review.
[17] Gregory Levitin,et al. Optimal multilevel protection in series-parallel systems , 2003, Reliab. Eng. Syst. Saf..
[18] Uriel G. Rothblum,et al. Nature plays with dice - terrorists do not: Allocating resources to counter strategic versus probabilistic risks , 2009, Eur. J. Oper. Res..
[19] Gregory Levitin,et al. Survivability of systems under multiple factor impact , 2007, Reliab. Eng. Syst. Saf..
[20] Oguzhan Alagöz,et al. Modeling secrecy and deception in a multiple-period attacker-defender signaling game , 2010, Eur. J. Oper. Res..
[21] S. Skaperdas. Contest success functions , 1996 .
[22] Kjell Hausken,et al. Protection vs. redundancy in homogeneous parallel systems , 2008, Reliab. Eng. Syst. Saf..